Know if You've Been Hacked

Hackers come in two sorts––the ones that like to disrupt things for creating a better world and the ones that like to mess with things to create personal harm. It's the latter hacker that you need to guard against (the first type just requires you to keep an open mind). If you're worried that your computer or electronic device may have been hacked, take your gut-felt concerns seriously and act quickly. Hackers can get into devices in surprising ways but what you need to understand is how this might manifest itself to you when looking at your screen. Here are some possible indicators that you might have been hacked, along with suggestions for quick action.

Steps

Spotting the Signs of a Possible Hacking

  1. Consider whether anything out of the usual is happening on your computer. You know your computer and how it runs better than anyone else. If it was working okay before but suddenly starts behaving oddly, it might be a sign of age or a broken part but the following issues could be just as likely to be signs of a hacking:
    • You have standard programs and files that won't open or work.
    • Files that you didn't delete appear to have disappeared, have been placed in the bin or have been deleted.
    • You cannot access programs using your usual password. You find that your passwords have been changed within your computer.
    • There is one or more programs on your computer that you didn't put there.
    • When you're not using the computer, it is connecting itself to the internet frequently.
    • File contents have been changed and you didn't do the changes.
    • Your printer may behave strangely. It may not print no matter what you do or it will print different pages that you did not command it to.
  2. Go online. Here too you can find possible signs of having been hacked:
    • One or more sites refuse you access because of password failure. Try various of your usual sites; if the password access continues to be barred, this may be due to having been hacked. Did you respond to a phishing email by any chance (a fake email asking you to change security details/update passwords)?
    • Your internet searches are being redirected.
    • Extra browser screens may appear. They may switch on and off without you doing anything. They may be a shade darker or the same color but you'll be able to see them.
    • If you've bought a domain name, you may not be able to obtain it once you've paid for it.
  3. Look for other standard hacker malware, overrides, etc. Here are some other things that might occur when hacked:
    • Fake virus messages. Either you have virus software or you don't; if you don't, such messages will automatically alert you. If you do, then provided you know what your program's messages should look like, then you'll also be alerted to the messages being fakes. Do not click on it; it's a scam to get you to release credit card details in a panic to get rid of viruses on your computer. Be aware that the hacker is already controlling your computer (see What to Do below).
    • Additional toolbars appear in your browser. They may carry messages about "helping" you. There should only be one toolbar. Be suspicious if they multiply.
    • Random and frequent pop-ups appear on your computer. You'll need to get rid of the program that is doing this.
    • Your anti-malware, virus software doesn't work, appears disconnected. Your Task Manager or Registry Editor may also be out of action.
    • People in your email address list get fake emails from you.
    • Money is missing from your bank account or you get bills to pay for online purchases you haven't made.
  4. If you simply won't have any control over anything you do, prioritize the probability that you are at the receiving end of being hacked. In particular, if your mouse cursor is moving around the screen and performing real actions that have actual results, a human is at the other end manipulating this. If you've ever had to allow access to work I.T. to fix your computer remotely, you'll know what this looks like when it's done for benign purposes. If it's not authorized, then you've been hacked.
    • Check your personal information. Google yourself. Are there returns of personal information online that you haven't personally released? This may not show up immediately but keeping an eye on this possibility may be important if personal information is released.

What to Do

  1. Disconnect from the internet immediately. The best thing to do while continuing to investigate is to disconnect from the internet and online connectivity. That way, if a hacker is still in your computer, you've just removed the source of connection.
    • Pull the router plug out of the socket to be absolutely certain there is no connection!
    • Print this page off or PDF it before powering down so that you can continue to follow the instructions offline. Or, read it on a separate device that isn't hacked.
  2. Start up the computer in safe mode. Keep it disconnected completely and use your computer's safe mode to reopen it (check the computer's operating manual if you're not sure what to do).
  3. Check if there aren't any "new programs" (eg. Anti-virus, Anti-spyware, etc.) OR if programs and files won't work or open. If you find anything, uninstall it as best you can. If you don't know how, get a computer-savvy helper or call mobile computing help to come and do it for you.
  4. Do a sweep of your computer with an anti-virus/spyware scanner you trust (for example, Avast Home Edition, AVG Free edition, Avira AntiVir, etc.). Again, get someone knowledgeable to help you if you're unsure what to do.
  5. If that turns up with nothing, back up important files. Then do a complete system restore and update the computer.
  6. Contact your bank and any store accounts you have to alert them to a possible problem. Ask them for advice about what to do next to protect your funds.
  7. Alert friends that they may have received compromised emails from you. Warn them to delete the emails and to not follow any links if they have opened them.



Tips

  • When going out, turn your internet off.
  • To keep the Operating system you had before the hacking occurred, use a backup program.
  • The best method is to prevent it beforehand.
  • Create back-up files all the time, without fail.
  • Location settings can be shut down. That, in conjunction with a strong VPN ( such S F-Secure Freedome) almost destroys any possibility a known intruder can locate you. Do not fill in your location on Facebook (i. e., "hometown").
  • Back up important files (for example, family pictures, documents) onto an encrypted USB drive and store it in a vault. Another option is to store them on OneDrive or Dropbox.

Warnings

  • Worse yet, your computer could be turned into a zombie that the hacker may use to attack other computers/networks and commit illegal activities.
  • If programs and files won't work or open, you are looking at a light show or an electronic picture, the computer will need a new operating system or a restore if the hacker didn't mess with the backups.
  • If left unchecked, the computer could become completely useless, and you might have to reinstall the operating system or buy a new computer.

Related Articles

Sources and Citations