This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Post Incident Forensics for Fake-AV - Remote Employee

Hi Folks!  We have a remote user (works in her home office) who came into contact with a variant of the Fake-AV malware/scareware and it ended up causing a nasty infection.  We're trying to improve our knowledge of forensics and also want to understand exactly what happened so that we can protect better and educate the user.

Does anyone have any proven steps for identifying how a computer was infected in a remote worker scenario?  We may not have the ability to have her ship her laptop to our HQ for analysis and since she works at her home office, we don't have all of the network capture capabilities we have at our office locations.

Thanks,

CTD

:41531


This thread was automatically locked due to age.
Parents Reply Children
No Data