Tackling malware: My Journey with “Great Discover”
In the ever-evolving landscape of cybersecurity, encountering malware can be a daunting experience, especially for those who haven’t faced it in many years. After a lengthy hiatus from dealing with viruses, I recently found myself grappling with a trojan known as “Great Discover.” This article details my process in attempting to eradicate this pest and aims to assist anyone else dealing with similar issues.
A Word of Caution
Prior to this incident, it had been seven years since I last encountered malware, and that was a different world filled with various viruses. Although I used to navigate through those threats, diving into trojans was a fresh challenge, and I was largely unfamiliar with antivirus tools and scanning techniques. With a steep learning curve ahead of me, my goal was to share my experience in hopes it will help others facing the same plight.
The Discovery
This morning started like any other until I unwittingly downloaded a piece of malware named “Great Discover.” Unfortunately, information about this specific trojan was scarce, with only one how-to-remove guide and a few YouTube videos available online. Therefore, I embarked on my own journey of discovery and remediation.
Upon noticing an unfamiliar program residing in my system tray, I attempted to follow the instructions displayed in a pop-up for its deletion. However, an impossible captcha challenge halted my progress, leading me to identify the threat as a cryptocurrency mining trojan—a term I was still struggling to fully grasp.
Steps Taken to Ensure Safety
1. Cleaning Up My Browser:
I quickly realized that the malware had begun altering my browser behavior, so my first step was to clear my browsing history and reset all browser settings to their default configurations. I also scrutinized the extensions tab, removing anything that seemed suspicious or unfamiliar.
2. File Deletion:
Next, I ventured into the directories located at C:\Program Files and C:\Program Files (x86). Here, I encountered numerous random folders created without my consent, including some dated months prior. With a sense of determination, I deleted all the unidentified folders.
3. Control Panel Inspection:
Following this, I accessed the Control Panel and examined the Programs and Features section. I removed any programs that didn’t appear recognizable or useful.
4. Scanning for viruses:
With the basic cleanup complete, I understood the importance of a thorough security scan. I downloaded Malwarebytes and performed a full scan, which
Share this content: