Safe Mode Archives – Gridinsoft Blog Welcome to the Gridinsoft Blog, where we share posts about security solutions to keep you, your family and business safe. Tue, 16 Jul 2024 14:27:39 +0000 en-US hourly 1 https://wordpress.org/?v=93240 200474804 How to Remove a Virus From a Computer in Safe Mode https://gridinsoft.com/blogs/remove-viruses-safe-mode/ https://gridinsoft.com/blogs/remove-viruses-safe-mode/#respond Mon, 15 Jul 2024 14:36:17 +0000 https://gridinsoft.com/blogs/?p=6654 In quite a few cases, you can see advice on using Safe Mode for malware removal. While generally good advice, this practice requires quite a bit of skill and knowledge on where to seek for malicious files. And in the selection of cases, manual approach is counterproductive, due to the complexity of the operation. But… Continue reading How to Remove a Virus From a Computer in Safe Mode

The post How to Remove a Virus From a Computer in Safe Mode appeared first on Gridinsoft Blog.

]]>
In quite a few cases, you can see advice on using Safe Mode for malware removal. While generally good advice, this practice requires quite a bit of skill and knowledge on where to seek for malicious files. And in the selection of cases, manual approach is counterproductive, due to the complexity of the operation. But let me show you a step-by-step guide on how to remove malware in Safe Mode, that should work against the vast majority of malicious programs.

Is Safe Mode Good for Malware Removal?

Despite being quite useful for malware removal operations, Safe Mode was not meant for this kind of activities. Its main purpose is troubleshooting: in this mode, Windows starts without quite a few modules, startup programs and things planned in Task Scheduler. This, however, is exactly what prevents malicious programs from executing, since the majority of them rely on either startup or the Scheduler.

Why would one need all this during malware removal? While active, viruses may block executable files from running, or overload the system making any operations impossible to accomplish. The latter is characteristic of coin miners and, in some cases, proxyware. This makes installing antivirus and anti-malware programs nearly impossible, and Safe Mode allows omitting these problems altogether.

How To Run Windows in Safe Mode

There are several ways to enter Safe Mode, which vary depending on certain factors. One particular thing I recommend you to stick to is using Safe Mode with Networking, as it allows connecting to the Internet. If you are using Windows without a password on your user account, it will be much easier to get into Safe Mode. For Windows 10/11 without a user account password, you can follow these steps:

Method 1. Using the Restart Option

Click “Start”, click “Power”, and then click “Restart” while holding the Shift key.

Press Shift + restart to open Windows Recovery menu

In the menu that appears, select “Troubleshoot” → “Advanced options” → “Startup Settings” → “Restart”.

Advanced options on the recovery menu

Then choose the Safe Mode with Networking and press the corresponding key (usually F4 or F5, depending on Windows version).

Startup settings

Method 2. Using Settings

Click “Start” and open “Settings”. In the left menu, click “System”, then scroll down and click “Recovery”.

System settings screenshot

Under “Recovery options”, select “Advanced startup” and click “Restart now”. Then follow steps 2 and 3 from the first method.

Advanced startup menu screenshot

Method 3. Interrupting Normal Boot

Another way to get into Safe Mode is to interrupt the normal boot process three times in a row. In case of three consecutive unsuccessful boots, the OS will automatically enter the Windows Recovery Environment (WinRE), which is useful if you are unable to start Windows for some reason. After this, follow steps 2 and 3 from the first method.

Windows with a User Account Password

If your device is protected by a user account password, you will not be able to use the previous methods. This is related to Windows security and BitLocker, which encrypts all disks. The only way to enter Safe Mode in this case is through System Configuration. Follow these steps:

Press the Win key + R, and in the window that opens, type “msconfig”.

Run menu screenshot

In the System Configuration window, go to the “Boot” tab. Under Boot options, check the “Safe boot” checkbox.

System configuration screenshot

Click “Apply”, then click “Restart”. Now your system will default to booting in Safe Mode until you perform the first two steps again and uncheck the “Safe boot” checkbox.

How to Remove Malware and Viruses in Safe Mode?

If you’ve decided to remove malware from your device with the use of Safe Mode, you may need to know where to look for malware. There are several locations as well as visual signs that may help you with locating the threat. However, I still recommend combining this mode with an anti-malware scan, which I will show later.

Typically, the majority of malware follows certain patterns in where it stores its file. Knowing even a few key locations can help detect the threat in just a few clicks. Malware often uses temporary or hard-to-reach system folders, such as AppData\Roaming\Temp, root directory of AppData\Roaming, and AppData/Local. By default, these folders are hidden from the user, so you need to enable the display of hidden files in the File Explorer settings to access them.

In addition to the location, it is important to pay attention to files with strange or unfamiliar names. Malware usually uses random combinations of letters or numbers to make them look like some generic log files. Another thing to check is the digital signature certificates of the files, especially if there’s a suspiciously looking file that has a valid name. If the certificate issuance date indicates the future, or the issuer is an unrelated company, it is most definitely malware.

However, detecting and removing malware manually is not only an extremely labor-intensive process but also not always effective. Malicious programs often create copies of themselves in the system and regenerate from them after deletion. This is why using specialized tools that automatically and reliably detect and remove malware is the best solution. As mentioned earlier, Safe Mode disables most Windows services, including Microsoft Defender. It cannot be enabled until you boot the computer in standard Windows mode.

To remove malware in this mode, you need to install third-party solutions. This is why network access is necessary after entering Safe Mode—the malware might block the installation. GridinSoft Anti-Malware is an excellent solution for removing malware in Safe Mode. The detection databases of this antivirus are updated hourly; additionally, it offers a Proactive Protection feature, which protects the system in the background after a normal system boot. Combined with the overall ease of use of the program, it becomes a great option for any system.

GridinSoft Anti-Malware main screen

Download and install Anti-Malware by clicking the button below. After the installation, run a Full scan: this will check all the volumes present in the system, including hidden folders and system files. Scanning will take around 15 minutes.

After the scan, you will see the list of detected malicious and unwanted elements. It is possible to adjust the actions that the antimalware program does to each element: click "Advanced mode" and see the options in the drop-down menus. You can also see extended information about each detection - malware type, effects and potential source of infection.

Scan results screen

Click "Clean Now" to start the removal process. Important: removal process may take several minutes when there are a lot of detections. Do not interrupt this process, and you will get your system as clean as new.

Removal finished

The post How to Remove a Virus From a Computer in Safe Mode appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/remove-viruses-safe-mode/feed/ 0 6654
Volvo Cars under Snatch attack https://gridinsoft.com/blogs/volvo-cars-under-snatch-attack/ https://gridinsoft.com/blogs/volvo-cars-under-snatch-attack/#respond Tue, 04 Jan 2022 09:23:40 +0000 https://gridinsoft.com/blogs/?p=6834 In its press release, Volvo Cars, a Swedish multinational luxury vehicle manufacturer based in Torslanda, Gothenburg, reported unlawful third party access to its records. Upon discovery of the violation, the company notified the relevant authorities and took steps to prevent further access to its property. Immediately shares of Volvo Cars fell 3.2% at 3:55 p.m.… Continue reading Volvo Cars under Snatch attack

The post Volvo Cars under Snatch attack appeared first on Gridinsoft Blog.

]]>
In its press release, Volvo Cars, a Swedish multinational luxury vehicle manufacturer based in Torslanda, Gothenburg, reported unlawful third party access to its records. Upon discovery of the violation, the company notified the relevant authorities and took steps to prevent further access to its property. Immediately shares of Volvo Cars fell 3.2% at 3:55 p.m. GMT. Besides, the company’s IPO on October 29 was the largest in Europe this year.

Volvo Cars investigates the incident of data breach

According to Wikipedia in March this year, the company announced a rebranding to a fully electric car maker by 2030. In June 2021, Swedish battery developer and manufacturer Northvolt and Volvo Cars made public their plans to launch a 50/50 joint venture consisting of the Research and Development Center (R&D) and the gigafactory. In December 2021, a statement revealed that the R&D Center would be located in Gothenburg, Sweden.

“Volvo Cars is conducting its own investigation and is working with third-party specialists to investigate the theft of property. The company does not see, with the information currently available, that this has an impact on the safety of its customers’ cars or on their personal data, ”reads a statement released by a company.

The investigation showed that only a number of the company’s R&D was accessed. Information uncovered in the course of the investigation indicates that there may be some impact on the operation of the company. Although there is no indication that the security of personal data or cars of its customers has been endangered. The Snatch ransomware gang claimed responsibility for the attack. As proof, the hackers disclosed 35.9 MB of documents claiming to have been stolen from Volvo’s servers. Although the company in the media communication did not confirm the Snatch involvement.

Snatch has exploded onto the scene, with an array of executables and tools to perform carefully orchestrated attacks. A new variant of ransomware known as “Snatch” has been spotted in the campaigns, forcing Windows machines to restart in Safe Mode before initiating the encryption process. It is one of the multiple components of a malware constellation used in carefully orchestrated attacks that also involve rampant data collection.

What Snatch ransomware is?

Snatch operators appear to have been active since the summer of 2018, according to the analysis, however, the Safe Mode aspect is a new added feature. Snatch attacks Windows machines with a collection of malware that includes the executable of the ransomware; a personalized data thief; a Cobalt Strike reverse shell; and several publicly available tools that are typically used by penetration testers, system administrators, or technicians. Plus, everything is obscured by an open source packer called UPX.

Hackers named themselves “Snatch Team” in homage to the 2000 Guy Ritchie film. They use automated brute-force attacks to infiltrate corporate networks before spreading laterally. In an incident in October, attackers forced the password for an administrator account on a Microsoft Azure server. Subsequently they were able to connect to the server using Remote Desktop (RDP). There, Snatch released other executables. They were designed to give attackers remote access. And it is without having to rely on the compromised Azure server, to 200 machines, or roughly 5% of the computers in the company’s internal network.

The attackers also connected to a domain controller (DC) on the same network.

The attackers also connected to a domain controller (DC) on the same network. Then they monitored the network for several weeks, also collecting and downloading data using an “Update_Collector”.EXE. Additionally, Snatch Team installed a free Windows utility called Advanced Port Scanner. Threat actors used it to discover additional machines on the network that they might target.

Researchers say Snatch has been observed in attacks in the United States, in Canada and several European countries. In all cases, the ransomware portion of the attack occurred several days or weeks after the initial network breach.

The post Volvo Cars under Snatch attack appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/volvo-cars-under-snatch-attack/feed/ 0 6834