Removing Malicious IM

Typically, IM programs are used to install normal (non-IM) Trojans or viruses, and if so, they follow the removal instructions of those chapters. If, however, your IM software has been maliciously modified, follow these instructions:

  1. Use an antivirus scanner.

    If the antivirus scanner recognizes the IM malicious code, let the scanner attempt to remove it.

  2. Delete IM software.

    If you believe that IM client software has been compromised, delete the entire program. There is no easy way, without checking everything to know what has been compromised and how. Search for and clean up any other system manipulations by following the steps recommended in the chapters on viruses and worms. Restore the IM program or the entire system from backup, if needed. Only reinstall the IM software if you absolutely need to.

Get Malicious Mobile Code now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.