Re: Recovery redundant?
I think the answer is, don't rebuild the software from backups, build that from the original source. Only restore the data from backups.
Of course the software, even if it isn't infected, will still have the same vulnerability that allowed the original attack to happen, so you need to identify and fix it.