Hi Folks! We have a remote user (works in her home office) who came into contact with a variant of the Fake-AV malware/scareware and it ended up causing a nasty infection. We're trying to improve our knowledge of forensics and also want to understand exactly what happened so that we can protect better and educate the user.
Does anyone have any proven steps for identifying how a computer was infected in a remote worker scenario? We may not have the ability to have her ship her laptop to our HQ for analysis and since she works at her home office, we don't have all of the network capture capabilities we have at our office locations.
Thanks,
CTD
This thread was automatically locked due to age.