Guide - Malicious Downloads

This guide will help people who have fallen victim to a malicious download. The aim is to minimise damage and then prepare forensic analysis and reporting.

Discovering that you've downloaded a malicious script can be distressing, but taking immediate action can help minimize the damage. Here's a comprehensive guide to what you should do:

  1. Secure Your Assets: Consider sending your digital assets to a brand new wallet generated from a completely separate device. This will isolate your funds from any potential further attacks on the compromised device.

  2. Revoke Permissions: Go to Revoke Cash or a similar platform to revoke all permissions on the compromised wallet. Ensure to check across all blockchains you've used, such as Avalanche, for any suspicious activity.

Use Revoke.Cash to revoke access to any malicious contracts

  1. Secure the Compromised Device: Preserve the integrity of the compromised device by avoiding further use. If you suspect that the device has been compromised, it's essential to handle it with care to preserve any potential evidence. Avoid logging into sensitive accounts or conducting financial transactions on the device.

Reporting to your local police as a bare minimum is an absolute essential. Law Enforcement around the world are often looking into the source of malicious code. You never know, there might already be a task force set-up and you device might provide them with the evidence they need

  1. Forensic Analysis: Consider seeking assistance from a computer specialist or law enforcement agency to conduct a forensic analysis of the compromised device. This analysis can help identify the source of the malicious script and provide valuable evidence for legal proceedings.

  2. Blockchain Analysis: If digital assets are stolen, Law Enforcement will require a full report of where the assets were sent, including visual charts.

Open a Case on our Website Below:

  1. Contact Exchanges: If you notice that your funds have been sent to an exchange, contact them immediately and request a freeze on the account suspected of receiving your stolen assets. Provide them with detailed information including the deposit address, transaction details, and any other evidence they may require. NOTE: They will need Law Enforcement involvement to help with any formal recovery.

  2. Report to Authorities: Report the incident to your local and national police forces. Law enforcement agencies have the authority to request freezes on accounts and gather information from exchanges. Provide them with any relevant information, including the compromised device for forensic analysis if necessary.

  3. Seek Legal Assistance: If necessary, seek assistance from a lawyer. Lawyers may be able to issue letters of demand or subpoenas to expedite the process of freezing accounts or obtaining information from exchanges.

  4. Beware of Scammers: Be cautious of scammers who may attempt to exploit the situation. Avoid individuals or services that guarantee the return of stolen assets in exchange for upfront payment. This is a common scam tactic, and falling victim to it could further exacerbate your losses.

By following these steps and seeking appropriate assistance, you can improve your chances of recovering your assets and protecting yourself from further harm. Remember to act swiftly and diligently to mitigate the impact of the malicious script.

Last updated