My device keeps getting malware - how to fix it?

It’s super annoying when your device is clean but keeps getting hit with malware. If this keeps happening, it’s a sign of a serious security issue. You need to figure out what’s going on ASAP to protect your stuff.

Check for backdoors

If malware keeps coming back, a backdoor could be the culprit. A backdoor is basically a secret way someone can get into your device without your permission. Hackers can use these backdoors to reinstall malware even after you’ve cleaned things up.

Backdoors like RATs (Remote Access Trojans) are a major threat. Signs of a hacked device include overheating, weird pop-ups, and apps crashing. If you see these even after removing malware, suspect a backdoor. Here’s how to deal with it:

  • Scan your device properly: Install a good antivirus program with malware scanning, like Kaspersky or Malwarebytes. These tools can find and remove threats. Windows Defender is a decent option if you don’t want third-party software.

  • Get a specialized rootkit-detecting program: Malwarebytes Anti-Rootkit can find and remove rootkits on Windows. For Linux, try chkrootkit.

  • Check startup and registry entries: Malware can hide in startup processes. Use tools like Autoruns or Windows Task Manager to find and remove anything suspicious.

  • Take a look at system logs: Regularly check your system logs for weird activity, like login attempts you don’t recognize. On Windows, use Event Viewer.

To prevent backdoors, scan, monitor, and analyze your device regularly. You might need professional help to remove a backdoor for good.

Use external devices with caution

External devices are a common way malware spreads. Plugging an infected USB drive, SD card, or external disk into your machine can infect it. Be careful when sharing devices.

USB hacking tools like OMG Cables and Rubber Duckies, plus keyloggers, make USB devices easy targets. Check the source of any external device before you plug it in. If you’ve cleaned your device, prevent reinfection by:

  • Enable Write Protection: Write protection stops connected devices from making changes to your system. This prevents malware from activating on your device.

  • Turning off Autoplay and Autorun: Autoplay and Autorun let malware run automatically when you plug in a device. Disable these features for all devices.

  • Separate work and personal devices: Keep work devices separate from home computers to limit the spread of malware. Use a separate external drive for personal stuff to avoid cross-contamination.

  • Get cloud storage: Cloud storage is a good alternative to physical drives. It lets you share files easily. Just scan downloaded files for safety.

Adopt safe browsing habits

Safe browsing can protect you from phishing, malicious sites, and other threats. Use a modern browser like Firefox or Chrome, which have built-in safety features like pop-up blockers. They also get frequent updates that patch vulnerabilities.

Be careful when clicking download links. Check the destination and avoid anything that looks suspicious. Download apps and files from trusted sources, like official websites and app stores. When visiting sites, check the URL. Secure sites use https:// and encrypt user data. Modern browsers warn you about unencrypted sites.

Avoid granting admin privileges

Malware often needs admin rights to do damage. Restricting these privileges limits what malware can do. Understand the Principle of Least Privilege (PoLP), which means giving users only the access they need. This helps minimize the damage if your device gets infected. Here’s how to implement PoLP:

  • Restrict other users from installing programs: On shared machines, limit software installations to the admin account. This prevents others from installing programs that could compromise your system.

  • Set up regular accounts: Use regular accounts for everyday tasks. Only use the admin account for security-related actions.

  • Review user permissions: On shared devices, regularly review permissions. Restrict accounts, remove unused ones, and set passwords.

  • Educate others: Make sure everyone knows the safety rules to protect your device. Teach them not to share network passwords and to avoid downloading software from unknown sources.

Install the latest updates

Keep your system and apps updated, whether you’re using Android, Windows, or something else. Outdated software has vulnerabilities that can be exploited. Updates include security patches that fix these issues. If you’re worried about update compatibility, back up your system first. Get updates from official sources only.

Reformat your device

If you can’t clean your device using the other methods, reformatting might be necessary. This should be a last resort, as it removes all your apps, settings, and customizations. However, it will also get rid of any remaining malware. You might need to reformat other connected devices too.

Things to know

  • When downloading third-party malware removal tools, verify their authenticity. Malware is often disguised as legitimate tools.

  • Always use a VPN when visiting websites over the Tor network for extra safety and privacy. This hides your IP address and prevents malicious websites from accessing your device’s information.

  • Utilities like System Restore on Windows and Timeshift on Linux let you revert your system to an earlier state. This can help remove apps that installed themselves without your knowledge.

  • Keep a backup of your system on a separate disk or cloud storage. This lets you restore everything quickly if you need to reformat.