how to remove malware

How to Remove Malware – An Epic Guide For All Devices

You may probably be aware of cyberattacks and breaches transpiring all around the world. In fact, the chances are that you may have also been a victim of an attack, whether you are aware of it or not.

Regardless, cyber breaches are usually executed through the use of Malicious Software, aka malware. Phishing, ransomware, viruses…do these ring any bells? Yes, all such threats come under the big lousy umbrella of malware attacks.

The different types of malware, signs of malware, preventive tips, and how to remove malware, are some of the many areas that we will be covering in this epic guide. So, here it goes:

Table of Contents

Recent Malware Attacks

Types of Malware

Signs of Malware

How to Prevent a Malware Attack

How to Remove Malware from Operating Systems

How to Remove Malware from Devices

How to Remove Malware from Browsers

Recent Malware Attacks

According to a  recent report by G Data Software, Malware Trends 2017,  a new malware emerges in every 4.2 seconds. Surprisingly, the figure represents the statistics of only the 1st quarter of 2017, and it is expected to increase.

With malware popping up at such an alarming rate, it is not unusual for us not to hear about a new malware attack transpiring somewhere in the world. However, the growing number of attacks isn’t the only thing we should be worried about. In fact, the most troubling aspect is the sophistication of the attack.

In 2017, researchers at a security firm, Morphisec, came across a potentially dangerous malware that could infect a device easily by circumventing the anti-virus. While discussing the attack on the official blog, Michael Gorelik, Morphisec’s VP of Research and Development, said that such attacks “pose a severe risk to enterprises.”

Unfortunately, enterprises aren’t the only targets of malware. In fact, malware attacks are carried out indiscriminately, i.e., on any and every system or infrastructure that can be infiltrated to gain either valuable data or a ransom. One such attack, the WannaCry ransomware attack, hit the world in May 2017, infecting hundreds of thousands of systems in almost 150 countries. The attack was not limited to huge corporations and also ended up affecting many healthcare centers, such as the NHS centers in the UK.

Just a month after Wannacry, another ransomware named Petya or not Petya attacked and infected multiple networks in many countries like the US (Merck Pharmaceutical Company), Denmark (Maersk Shipping Company) and Ukraine (numerous utility companies including power companies, airports, public transit, and the central bank). This ransomware was more destructive than WannaCry in many ways.

Ransomware is one of the many types of malware attacks that are carried out by cybercriminals or opportunist hackers. Every malware is built for different purposes or targets.

[Back to Top]

Common Types of Malware

To learn how to remove malware, you first have to understand how it works. So, let’s take a look at the most prevalent malware that are commonly used for hacking, data theft, or any other cyberattack.

  • Trojan: Considered as one of the most dangerous types of malware, it can mimic a particular program or application that runs in the background without any hindrance. Since it is spread and installed with malicious intent, it can infect the system, create vulnerabilities in the software, delete files, and cause much more damage than you could afford.
  • Spyware: As the name suggests, it is used for secretly spying on your activities on the internet. Unlike Trojans, spyware doesn’t infect systems or delete files. These tools sit back and relay all your online activities to a host system (spy). As a result, you may end up unintentionally sharing your credit card information, personal data, or any other sensitive information with someone.
  • Adware: Unlike other malware, Adware is not malicious and only serves adverts on the infected systems. However, due to the massive volume of adverts resulting from adware, the infected system is likely to experience a significant decline in performance.
  • Worm: It is a type of virus that can self-replicated and then spread its clones to other systems on a network. In short, it prospers with duplication.
  • Rootkit: A dangerous malware, Rootkits are remotely operated malicious tools that can easily infiltrate a system by circumventing security programs. It can be used to take control of your system remotely, and access information or even change system configurations.
  • Ransomware: It is yet another dangerous malware that acts like a Worm to spread on a network, infecting systems, and locking down essential files or data in exchange for a ransom. You can only access your data once you pay the desired ransom amount.
[Back to Top]

Important Signs of Malware

Detecting malware can be quite tricky since some malware can bypass security programs. However, there are some common symptoms exhibited somewhat similarly in almost all malware infections. If you detect any of the following traits in your system or device, know that your system is infected by malware:

  • Slow Performance: The first thing you may notice in a malware-infected device is slower performance. After all, different malware behaves differently. Some malware eats up your RAM while others consume space on your hard drive.
  • Browser Redirect: Since some malware hijacks your browser navigation, you may see continuous redirects while browsing. The malware may send you to fraudulent or adverts-filled links due to redirection.
  • Continuous Crashes: If your system is infected with a highly infectious virus, you may experience frequent system crashes.
  • Annoying Popups: You may experience inappropriate adverts popping up on your screen, even when the browser is closed.
  • Ransom Popup: If your important files are locked and show a warning screen asking for a ransom to be paid, you are a victim of a ransomware attack.
[Back to Top]

How to Prevent a Malware Attack

As the adage goes, prevention is better than cure. Before we move to the malware removal process for different devices and operating systems, let’s see some preventive measures first:

  1. Use Firewall: Always keep your Firewall on so that you can limit or restrict any uninitiated remote access or traffic.
  2. Update Software: Malware are usually aimed at systems that have software vulnerabilities. Therefore, regular security updates are the only way to patch those security holes.
  3. Take Backups: If you don’t want a malware attack to affect your business operations or your online activities, always take regular backups of your relevant data.
  4. Use Anti-Malware/Anti-Virus: Security programs like anti-malware are built exclusively to fight off viruses or malware attacks. So, install an anti-malware tool and always keep its security database updated.
  5. Practice Internet Safety: Many experts have published internet safety measures for users to follow. Understand those measures and practice online safety tips to avoid a malware disaster.
[Back to Top]

How to Remove Malware from Operating Systems

More often than not, operating systems are infected with malware because of a security vulnerability. Once the OS is infected, it affects all the system operations such as performance, behavior, etc. The malware removal process may vary in different operating systems.

How to Remove Malware from Windows 7

Are you wondering, “How do I remove a virus from my computer running Windows 7? Follow the steps mentioned below:

Step 1: Unplug Network Cable

Your laptop is continuously affected by malware as long as it is connected to a network. Therefore, to remove the malware, you first have to disconnect your network connection.

You can disconnect the physical cable by unplugging it from the system. However, to remove a wireless connection, you need to go through the following steps on Windows 7.

  1. Go to Start, then Control Panel > Network and Internet and then Network and Sharing Center
  2. Next, go to the Change adapter settings which you can find on the left-side panel
  3. You will now see a new window, showing you different network connections. Disable the Wireless Network Connection by right-clicking it

Step 2: Turn off System Restore

In the next step, you need to disable the System Restore before proceeding with the malware removal process. To disable it, here’s what you need to do:

  1. First of all, go to Start > Control Panel and then System and Security
  2. Now go to System Protection from the new window
  3. Check under Protection Settings and look for devices that have Protection activated or turned on. Click Configure
  4. Under the Restore Settings on the selected device, click Turn Off System Restore
  5. Click OK and confirm Yes to the new settings

Step 3: Run Security Tools

Now comes the scanning part. Make sure that you have downloaded an anti-malware and anti-virus tool to scan and remove the malware from your system.

However, before you run the anti-malware, reboot your system and start it in Safe Mode. Here are the steps to restart your PC in Safe Mode:

  1. Restart your PC and repeatedly hit F8. You will shortly see Advanced Boot Options
  2. In the boot option, click Safe Mode and hit Enter

Once you are in, it is now time to install the anti-malware. After the installation is completed, perform a complete system scan to detect potential malware in your system and delete them.

Once you are done with the malware scan, it is time to install the anti-virus tool. Unlike malware installation, you need to restart your PC in normal mode to install the anti-virus. After the installation, you have to again restart and use the PC in Safe Mode for an anti-virus scan.

Step 5: Turn on System Restore

Now, it is time to enable the System Restore settings, and for that, you have to follow the same steps you took in Step 2 when disabling the setting.

However, when you are in the Restore Settings in the System Protection windows, click Restore system settings and previous versions of files.

Step 6: Plug Network Cable

Re-plug the physical network cable to connect your computer with the network. However, if you are using a wireless connection and you disabled it in Step 1, Turn On the settings again.

Go to the Change Adapter Settings, and Connect the network by right-clicking the Wireless Network Connection option

Step 7: Turn On Automatic Updates

It is a fact that malware usually targets security vulnerabilities to infect a system. Therefore, if you patch those vulnerabilities, you close their way in. For this reason, it is imperative to keep the system up to date with the latest security updates.

You can set Windows 7 automatic updates with the following steps:

  1. Go to Windows Update which you can find by going to Start > Control Panel and System and Security
  2. Click Change Settings from the left-side panel. Once you click it, a Choose how Windows can install updates screen will open
  3. Click Install Updates Automatically. You can also set the schedule you want your system to start the update
  4. Click OK
[Back to Top]

How to Remove Malware from Windows 8

Removing malware from Windows 8 is easy because the steps are somewhat similar to those taken for Windows 7.

Step 1: Disconnect Network

Make sure that your computer isn’t connected to the internet or the local network. Unplug it, until you remove the malware from your Windows 8.

To disconnect a wireless connection, go through the following steps.

  1. Click the Windows icon on the left side of the Task Bar. Or, you can press the Windows key on your keyboard to access the start menu
  2. Now type, Wireless
  3. You will see Turn wireless communication on or off on the start menu search result
  4. Toggle off the Wi-Fi

Step 2: Deactivate System Restore

  1. Start by Pressing the Windows key + “X” on your keyboard. A mini screen will pop up on the extreme left of the screen. Click System
  2. A new window will open from where you can click System protection
  3. In the new window, check under the Protection settings and choose the drive that has Protection On
  4. Turn Off System Protection under the Restore settings
  5. Click OK, followed by Yes and then click OK again

Step 3: Install Security Tools and Scan

To install the anti-malware tool on your system, you need to restart it and open it in Safe Mode.

  1. Press the Windows key on your Keyboard along with L
  2. Now select the Power button and click Restart while holding the shift key
  3. You will see a blue screen with the title “Choose an Option,” select Troubleshoot
  4. Click Advanced Options and then click Startup settings
  5. Now restart again, and when it is done, press F4 you will be able to use the Safe Mode

Now, install the anti-malware to find and delete infected files.

To install and use the anti-virus tool, you need to restart the system again in Normal mode. However, to scan the order using the anti-virus, you need to reset it in Safe Mode.

Step 5: Turn on System Restore

Once you are done with the installation of the security tools and have completed the system scan, toggle on the System Restore. To do that, follow the same steps as in Step 2. However, when you are in the Restore Settings option, click Restore system settings and previous versions of files. Once done, press OK.

Step 6: Plug Network Cable

To reconnect the Wireless network connection that you toggled off, perform the same procedure discussed in the first step.

  1. Windows Key > type and search “Wireless.
  2. Choose “Turn wireless communication on or off” from the search
  3. Toggle On Wi-Fi

Step 7: Turn On Automatic Updates

Once your system is cleaned from any malware, turn on the Automatic update to install occasional security patches.

  1. Click Windows icon and type to search Settings
  2. Click Change PC Settings and choose Update and Recovery
  3. Select Choose how updates get installed
  4. Click Install updates automatically
  5. Click OK
[Back to Top]

How to Remove Malware from Windows 10

If you notice any suspicious activity or experience slow performance, know that there is a malware in your system.

Step 1: Delete Malware from the System

Start with identifying any suspicious programs in your system and uninstalling them

  1. Press the Windows Key. Type and search “Control Panel.
  2. In the Control Panel window, select Uninstall a Program under the Programs heading
  3. Upon clicking Uninstall a Program, a Program and Feature screen will open listing all the installed applications.
  4. Scan through the list and right-click any program that looks suspicious and clicks Uninstall

(Optional) Step 2: Use Anti-Adware

If your system is plagued with continuous and inappropriate popups, your order may be infected with adware. To clean the adware from the system, you need to install an anti-adware.

Install the tool and scan the system to find and quarantine or delete any adware.

Step 3: Use Anti-Malware

Often anti-malware comes with anti-adware. It makes it easier for you to install a single tool and scan the system against both the malware and adware.

Perform a complete system scan so that you leave no space for any malware to continue the infection.

Step 6: Change Browser Settings to Default

If the popups continue to infect your browser, reset the browser to default.

Resetting Google Chrome

  1. Open the Chrome browser
  2. Open the menu by clicking the three horizontal dots on the right side
  3. Click Settings
  4. Scroll down on the new window to search and click Show Advanced Settings
  5. Scroll down again to search and select Restore Settings
  6. A message will pop up confirming the reset. Select Reset to continue

Resetting Mozilla Firefox

  1. Click the three horizontal lines on the right side of the window to access the Firefox menu
  2. Click the “?” to open the Help menu
  3. Now select Troubleshooting Information
  4. Click the Refresh Firefox
  5. A popup will open to confirm the reset. Click Refresh Firefox

Resetting Internet Explorer

  1. Click the gear icon and select Internet Options
  2. Click the Advanced tab
  3. Select Reset
  4. Click Reset again on the popup to continue
[Back to Top]

How to Remove Malware from Mac

Mac users assume that their OS is safe from malware. Although it may be true that malware or viruses attacks are rare on Mac, but they do happen. If you know the application that is infecting your system, here’s how to remove it.

  1. Go the Go menu on your Mac navigation and then click Utilities
  2. Search for and double-click the Activity Monitor
  3. In the Activity Monitor screen, look for the suspicious app that is infecting your system
  4. Select the desired app and click Quit Process
  5. Select Force Quit
  6. Go back to the Go menu again and click Applications
  7. On the next screen, search for the suspicious entry and click Move to Trash
  8. Open up the Apple menu and click System Preferences
  9. Select the desired Account and then select Login Items
  10. Select the malicious application and click the subtract icon ()
[Back to Top]

How to Remove Malware from Devices

Smartphones and tabs are also amongst those devices that are targeted for malware attacks. The attacks are carried out for either data theft or any other privacy or security breach. Here’s how you can get rid your device from malware:

How to Remove Malware from iPhone/iPad

Start with updating the device’s iOS first to render the malware paralyze.

  1. Open the device’s Settings menu
  2. Tap the General option
  3. Tap Software Update

If you are aware of the infected application, you can delete it. However, if you are not sure which app is causing the disturbance, then the best way to remove the malware is by a factory reset.

  1. Turn on your Mac and open iTunes
  2. Connect your iPhone or iPad
  3. Select the device from iTunes
  4. Click the Restore iPhone/iPad from the Summary tab
  5. Click again if the application asks for confirmation
  6. It will take a few minutes to reset your device
[Back to Top]

How to Remove Malware from Android Phones

Android malware can listen to your private conversations, expose personal data to hackers, and do much more damage than you realize. Here’s how to get rid of malware on Android:

  1. Go to the Settings of your Android device
  2. Look for Apps and click it to open
  3. Go to the Downloaded tab, and you will see all the lists of apps you have in your Android
  4. Tap the app you want to delete
  5. First Clear Cache
  6. Click Clear data
  7. Finally, click Uninstall

If you are not sure of the app causing havoc on your Android, you may try scanning the device against an anti-malware tool.

[Back to Top]

How to Remove Malware from Browsers

Your browsers are also not safe from malware attacks. Browser hijacking is amongst the highly frequent attacks.

How to Remove Malware from Chrome

  1. You may install and run an anti-adware tool to detect and delete adware on your Google Chrome browser
  2. If you are not sure if it is an adware or any other malware, then install an anti-malware application for scanning the system

You may also reset your Chrome’s setting if the methods mentioned above fail to show any good results.

  1. Open up Google Chrome
  2. Go to the Settings by clicking the three dots at the top right corner
  3. Now, click Show Advanced Settings
  4. Click Reset Settings
[Back to Top]

How to Remove Malware from Mozilla Firefox

First of all, try scanning the system against an anti-virus or malware tool for any malicious application. However, if the method fails to show any improvement, then try resetting the Firefox browser.

  1. Go to the menu option of Firefox by clicking the three horizontal lines at the top right corner
  2. Click the (?) link
  3. Select the Troubleshooting Information
  4. Click Refresh Firefox
  5. Click it again if the option pops up in a dialogue box
[Back to Top]

How to Remove Malware from Safari

If your Safari browser is infected with an adware or malware, you may start with deleting any suspicious extension.

  1. Go to the Safari Menu
  2. Select Preferences
  3. Choose the Extensions tab
  4. See if you have any unfamiliar extension in the list. If you find any, uninstall it

If the problem persists, try restoring the settings to default.

  1. Go to the Safari Menu again
  2. Select Reset Safari
  3. A dialogue box will open containing different checklists
  4. Check all the boxes and click Reset

To make sure that you leave no stone unturned, install an anti-malware tool, and scan the system for malware.

Learn about Internet Privacy and Why it Matters in 2020.

Frequent Asked Questions

What Is Malware And What Does It Do?

Malicious Software, aka Malware, is built to harm users in a plethora of ways. Every malware that is created by hackers, cybercriminals, or secretive agencies alike serves a different purpose. Some malware are built to steal the online identity of the victim. With the stolen identity, the hacker can steal personal data, credit card number, or even money, blackmail the victim, etc. Some malware can be used to obtain ransoms, while others can damage the entire IT infrastructure of a company.

What Is the Difference Between Malware and Virus?

Malware is the umbrella term for all kinds of malicious software, tools, codes, or scripts. Therefore, a virus is one of the many types of malware, such as worms, spyware, etc. Every malware is built to serve a specific purpose. Since a virus can replicate itself, hackers make viruses so that they can infect many systems with a single tool.

How Do I Know If My Computer Has a Virus?

Whether your computer is infected with a virus or any other malware, you may experience the following signs:

  • An abrupt decline in the performance of your computer.
  • Applications or software don’t run even when you try to open them.
  • Your important files are automatically encrypted and ask a ransom to decrypt.

Your internet browser is bombarded with ad pop-ups.

An information security analyst in the making, a father of an adorable kid and a technology writer (Contributor). He can be found lurking around top network security blogs, looking for scoops on information security and privacy trends.

Have Your Say!!

  1. frex says:

    thanks for the guide

  2. John says:

    Nice write up…

Join 3 million+ users to embrace internet freedom

Signup for PureVPN to get complete online security and privacy with a hidden IP address and encrypted internet traffic.