Back to blog
Guides

What to Do After Detecting a Virus or Trojan? Complete Guide 2026

Practical guide for responding to malware infection. Learn how to secure accounts, change passwords, enable MFA, and protect yourself from identity theft. Step by step.

nex-IT TeamMay 12, 20267 min read
What to Do After Detecting a Virus or Trojan? Complete Guide 2026

Detected a Virus on Your Computer? Don't Panic - Act Methodically

Discovering that your computer was infected with a virus, trojan, or other malicious software is a stressful situation. However, the most important thing is to stay calm and follow a proven plan. This guide will walk you through all the necessary steps to secure your data and accounts.

Remember: The faster you act, the smaller the potential damage.


Step 1: Immediately Disconnect from the Network

This is the absolute priority! Before you do anything else:

  • Turn off Wi-Fi on the infected computer
  • Unplug the network cable (Ethernet)
  • Don't shut down the computer - it may be needed for analysis

Why is this important? Trojans and keyloggers send captured data (passwords, card details) to criminals over the internet. Cutting the connection immediately stops the data leak.


Step 2: Use a CLEAN Device for Further Actions

CRITICAL: Never change passwords on the infected computer!

For all subsequent steps, use:

  • Another computer (trusted)
  • Mobile phone
  • Tablet

If using a phone, make sure:

  • You're using mobile data (not home Wi-Fi)
  • The phone was not connected to the infected computer

Step 3: Secure Your Most Important Accounts (Critical Priority)

Order matters! Start with:

1. Primary Email Account

Why first? Email is the key to resetting passwords for all other accounts. If an attacker has access to your inbox, they can take over all your accounts.

What to do:

  • Change password to a strong, unique one (min. 16 characters)
  • Enable two-factor authentication (2FA/MFA) - preferably an app (Google Authenticator, Microsoft Authenticator) instead of SMS
  • Look for "Sign out of all devices" option and use it
  • Review email forwarding rules - remove unknown ones
  • Check recent logins - watch for unknown locations/devices

2. Banking and Financial Accounts

What to do:

  • Log into online banking from a clean device
  • Change password
  • Enable SMS/push notifications for transactions
  • Check transaction history - look for unauthorized operations
  • Consider calling your bank to inform them of possible breach
  • If you see suspicious transactions - immediately block your card

3. Password Manager (if you use one)

  • Change master password
  • Enable 2FA if you haven't already
  • Check if any unknown devices were added

Step 4: Change Passwords for ALL Accounts

List of accounts to secure (decreasing priority):

PriorityAccount TypeAction
CRITICALPrimary emailChange password + enable MFA
CRITICALOnline bankingChange password + check transactions
CRITICALPayPal, Revolut, cryptoChange password + enable MFA
HIGHSocial media (Facebook, Instagram, LinkedIn)Change password + enable MFA + sign out everywhere
HIGHWork accounts (Microsoft 365, Google Workspace)Change password + notify IT
HIGHOnline stores (Amazon, eBay)Change password + check orders
MEDIUMStreaming services (Netflix, Spotify)Change password + check devices
MEDIUMForums, online games, other servicesChange passwords

Rules for creating new passwords:

  • Minimum 16 characters (longer is better)
  • Unique for each account - never reuse passwords!
  • Use a password manager (Bitwarden, 1Password, KeePass)
  • Avoid obvious information (birthdate, names)

Step 5: Enable Multi-Factor Authentication (MFA) Everywhere

What is MFA and why is it so important?

MFA (Multi-Factor Authentication) means you need more than just a password to log in - for example, a code from an app on your phone.

Even if a thief has your password, without the second factor they can't log into your account.

Best MFA methods (from most secure):

  1. Hardware key (YubiKey, Titan) - highest security level
  2. Authenticator app (Google Authenticator, Microsoft Authenticator, Authy)
  3. SMS - better than nothing, but vulnerable to SIM swap attacks

Where to enable MFA:

  • All email accounts
  • Online banking
  • Social media
  • Work accounts
  • Online stores (especially those with saved cards)
  • Cloud services (Dropbox, Google Drive, iCloud)

Step 6: Remove Malware from Your Computer

Option A: Professional Scanning

  1. Boot computer in Safe Mode with Networking
  2. Update your antivirus program
  3. Run a full system scan
  4. Use additional tools:
    • Malwarebytes (free version)
    • HitmanPro
    • ESET Online Scanner
  5. Remove detected threats

Option B: System Reinstallation (recommended for serious infections)

If the infection was serious (banking trojan, keylogger, ransomware), the safest solution is a complete system reinstall:

  1. Back up important files (documents, photos) to external drive
  2. Don't copy executable files (.exe, .bat, .cmd, .scr)
  3. Format the drive and install fresh OS
  4. Install updated antivirus software
  5. Restore files with scanning

Step 7: Check If Your Data Was Leaked

Tools to check:

  • Have I Been Pwned - check if your email was in a data breach
  • DeHashed - advanced search
  • Check notifications from services (they often inform about breaches)

What to do if data was leaked:

  • Immediately change passwords for affected services
  • If SSN/personal ID leaked - consider freezing your credit
  • Monitor your credit report

Step 8: Protect Yourself from Identity Theft

Preventive actions:

  1. Freeze your credit with major credit bureaus
  2. Set up credit monitoring alerts
  3. Monitor bank statements for the next few months
  4. Watch out for phishing - criminals may try to use stolen data

Signs of identity theft:

  • Unknown transactions on your account
  • Collection letters for unknown debts
  • Credit denials without reason
  • Unexpected bills or payment demands

Step 9: Notify Appropriate People/Institutions

Who to inform:

  • Employer/IT department - if you used the computer for work or have access to company systems
  • Bank - if you suspect card/account data theft
  • Police - if funds were stolen (file a report)
  • National cybersecurity center - report the incident

Step 10: Secure Yourself for the Future

Security checklist:

  • Install and update reputable antivirus software
  • Enable automatic updates for OS and programs
  • Use a password manager with strong, unique passwords
  • Enable MFA on all important accounts
  • Don't click suspicious links in emails
  • Don't download programs from unknown sources
  • Regularly create backups of important data
  • Consider professional security audit for your business

Need Help?

nex-IT offers professional IT security support:

  • Computer and network security audits
  • Malware removal and data recovery
  • Security system implementation (Sophos, ESET)
  • Cybersecurity training for employees
  • 24/7 security monitoring

Contact us - we'll help you secure your business and personal devices against threats.


Summary - Quick Checklist

  1. ✅ Disconnect computer from network
  2. ✅ Use a clean device for further actions
  3. ✅ Change primary email password + enable MFA
  4. ✅ Secure banking accounts
  5. ✅ Change passwords for all accounts
  6. ✅ Enable MFA everywhere possible
  7. ✅ Remove malware or reinstall system
  8. ✅ Check if data was leaked
  9. ✅ Protect yourself from identity theft
  10. ✅ Notify appropriate institutions

Remember: Prevention is better than cure. Invest in security before an incident occurs!

securityvirustrojanmalwareguideMFApasswordscybersecurityvirus removalaccount protection

Related articles