Blog | G5 Cyber Security

Windows 7 Guest Account: Stop Screen Capture Software

TL;DR

An attacker installed screen capture software in a Windows 7 guest account. This guide shows how to remove the software, harden the account against future attacks, and monitor for suspicious activity.

Solution Guide

  1. Identify the Software
  • Remove the Software
  • Harden the Guest Account
    1. Limit User Privileges: Ensure the guest account has minimal privileges. It should *not* be an administrator account.
      • Right-click ‘Computer’ on the desktop or in File Explorer, select ‘Properties’.
      • Click ‘Advanced system settings’.
      • In the ‘User Profiles’ section, click ‘Properties’.
      • Select the guest account and review its profile type. It should be a standard user.
    2. Disable Scripting: Guest accounts are often targeted via malicious scripts.
      • Open Group Policy Editor (gpedit.msc). Note: This is not available on Windows 7 Home edition. If you have Home edition, skip to step 3.
      • Navigate to User Configuration > Administrative Templates > System.
      • Double-click ‘Prevent execution of batch files’. Enable this policy.
      • Double-click ‘Prevent the execution of installation applications’. Enable this policy.
    3. Firewall Rules: Configure Windows Firewall to restrict network access for the guest account.
      • Open Windows Firewall with Advanced Security (wf.msc).
      • Create an outbound rule blocking all connections from the guest account’s user profile. This is complex and may break functionality; test carefully. A simpler approach is to block specific ports commonly used by remote access tools.
    4. Disable Remote Desktop: If not needed, disable Remote Desktop for the guest account.
      • System Properties > Remote tab. Uncheck ‘Allow connections from computers running any version of Remote Desktop’.
    5. Strong Password (if applicable): If a password is used, ensure it’s strong and unique. Consider disabling the account entirely if it’s not actively needed.
  • Monitor for Suspicious Activity
  • Exit mobile version