Immediate remediation steps if you suspect you have been impacted by malware:
Scan all end user systems with up-to-date antivirus signatures that can detect these malware variants.
Notify your IT security team or department about the potential compromised users and validate that the users’ systems are clean of malware.
Change the passwords for the infected user accounts identified and suggest changing credentials for all websites. Remember that an infected system will likely collect credentials for websites the user accesses from that specific system, not just Salesforce accounts. Further information on how to do this can be found in Reset password for Users with both Portal and Community Access.
Revoke any existing OAUTH tokens for the user account identified. Further information on how to do this can be found in the Revoking OAuth Tokens article.
Download and review Salesforce Org login histories of infected users. Further information on how to do this can be found here in the Monitor Login History article.
If you detect suspicious activity, please open a security support case at https://help.salesforce.com (Product topic = Security) and our team will work with you to investigate this issue.
Additional Remediation Recommendations
As always, users should exercise caution if prompted to click on a link or install third-party software included in unsolicited emails, especially if the message claims to be from a financial institution or an organization requesting their login credentials.
In addition to following device security best practices, we recommend you leverage the following security capabilities of the Salesforce Platform:
At Salesforce, trusted customer success is our #1 value, and delivering the highest standard in security is our top priority. In the event that our monitoring detects suspicious activity, our Incident Response team will notify the security contact on record. Please maintain your security contact to ensure timely and correct notices. More information on maintaining this contact can be found in Help and Training.
Finally, it is essential to have a comprehensive security strategy for endpoint computers to prevent, detect, and respond to infections.
Additional Reading:
http://www.onguardonline.gov/articles/0011-malware
000387176

We use three kinds of cookies on our websites: required, functional, and advertising. You can choose whether functional and advertising cookies apply. Click on the different cookie categories to find out more about each category and to change the default settings.
Privacy Statement
Required cookies are necessary for basic website functionality. Some examples include: session cookies needed to transmit the website, authentication cookies, and security cookies.
Functional cookies enhance functions, performance, and services on the website. Some examples include: cookies used to analyze site traffic, cookies used for market research, and cookies used to display advertising that is not directed to a particular individual.
Advertising cookies track activity across websites in order to understand a viewer’s interests, and direct them specific marketing. Some examples include: cookies used for remarketing, or interest-based advertising.