Tag

malware removal

0 views collected around this technical thread.

Java Captain
Java Captain
Sep 14, 2022 · Information Security

Server Intrusion Investigation and Remediation on a Compromised Linux Host

This article documents a recent Linux server compromise, detailing observed symptoms, investigative commands, discovered malicious scripts, and step‑by‑step remediation actions such as restricting SSH access, unlocking and restoring system utilities, removing malicious cron jobs, and hardening the system against future attacks.

CronLinuxSSH
0 likes · 13 min read
Server Intrusion Investigation and Remediation on a Compromised Linux Host
Ops Development Stories
Ops Development Stories
Jan 22, 2020 · Information Security

How to Detect and Eradicate Hidden Windows Server Mining Malware

This article walks through the discovery, analysis, and complete removal of a stealthy Windows Server mining malware, detailing suspicious processes, malicious scheduled tasks, registry modifications, WMI persistence, and post‑infection hardening steps to secure the system.

Windows Servermalware removalscheduled tasks
0 likes · 25 min read
How to Detect and Eradicate Hidden Windows Server Mining Malware
Efficient Ops
Efficient Ops
Dec 5, 2019 · Information Security

Master Linux Incident Response: Step‑by‑Step Virus Detection and Removal

This guide walks you through a complete Linux emergency response workflow—identifying suspicious behavior, terminating malicious processes, removing infected files, eliminating persistence mechanisms, hardening the system, and adding command auditing—using practical shell commands and examples.

LinuxShell Commandsincident response
0 likes · 9 min read
Master Linux Incident Response: Step‑by‑Step Virus Detection and Removal