Identifying Infected Files
Malware may modify, corrupt, or replace files in your AXIS CloudSync account. Signs of malware infection include:
- Files with unexpected content or that cannot be opened.
- New files appearing that you did not create (e.g., malware executables, dropper files).
- Unusual spikes in file modification activity in the Activity Log.
- Antivirus alerts on your desktop client indicating infected files in the sync folder.
- Files with suspicious extensions added (e.g.,
.exe,.bat,.vbs) in document folders.
Note
Use the Activity Log in the web portal to identify when suspicious file activity began. Filter by action type (Upload/Modify) and look for unusual patterns — many modifications in a short time, or modifications from an unexpected IP address.
Isolating the Damage
- 1Pause sync on all affected devices immediately. Right-click the AXIS CloudSync tray icon and select Pause Syncing. This prevents further malware-modified files from syncing to the cloud.
- 2Log in to the web portal from an unaffected device.
- 3Navigate to the Activity Log and identify the scope: which files were modified, when, and from which device/IP.
- 4If specific files are identified as infected, quarantine them by moving them to a separate folder in the web portal (do not delete — you may need them for investigation).
Restoring Clean Versions
- 1In the web portal, navigate to the affected file or folder.
- 2Right-click and select Version History.
- 3Identify the last clean version — the version just before the suspicious activity began.
- 4Click Restore next to that version.
- 5Confirm the restore. The clean version will become the current version.
- 6Repeat for all affected files.
Tip
For widespread infections affecting many files, use the Roll Back to Point in Time feature on the affected folder to restore all files at once. See the Ransomware Recovery guide for detailed rollback instructions.
Preventing Reinfection
- Do not resume syncing on affected devices until they have been fully scanned and cleaned by antivirus software.
- Change passwords for any accounts that were active on infected devices.
- Review and revoke any active share links that may have been created by the malware.
- Check for unauthorized user accounts in the Admin panel — some malware creates backdoor accounts.
- Update antivirus definitions on all devices before resuming sync.
- Enable real-time antivirus scanning of the AXIS CloudSync sync folder on all devices.
HIPAA Incident Reporting
A malware infection that affects systems containing ePHI is a potential HIPAA security incident and may require breach notification. Your obligations depend on whether ePHI was accessed, acquired, or disclosed without authorization.
- Document the incident: when it was discovered, which files were affected, and what actions were taken.
- Conduct a risk assessment to determine whether ePHI was compromised.
- If ePHI was compromised, follow your organization's Breach Notification Policy.
- Report the incident to HHS within 60 days if it affected 500 or more individuals.
- Retain all incident documentation for a minimum of 6 years.
Important
Consult your HIPAA compliance officer and legal counsel before making breach notification decisions. The HHS Office for Civil Rights has specific guidance on malware incidents and notification requirements.