{"id":1601,"date":"2021-02-03T16:46:28","date_gmt":"2021-02-03T22:46:28","guid":{"rendered":"http:\/\/blogs.luc.edu\/uiso\/?p=1601"},"modified":"2024-04-16T21:45:33","modified_gmt":"2024-04-16T21:45:33","slug":"ouch-newsletter-im-hacked-now-what","status":"publish","type":"post","link":"https:\/\/blogs.luc.edu\/uiso\/ouch-newsletter-im-hacked-now-what\/","title":{"rendered":"OUCH! Newsletter &#8211; I&#8217;m Hacked, Now What?"},"content":{"rendered":"<h3><strong>Have I Been Hacked?<\/strong><\/h3>\n<p>No matter how secure you are, sooner or later you may have an accident and become hacked. Below are\u00a0clues you might have been hacked and if so, what to do.<\/p>\n<h3><strong>Your Online Accounts<\/strong><\/h3>\n<ul>\n<li>Family or friends say they are receiving unusual messages or invites from you that you know you\u00a0did not send.<\/li>\n<li>Your password to an account no longer works, even though you know the password is correct.<\/li>\n<li>You receive notifications from websites that someone has logged into your account when you\u00a0know you did not log in yourself. Do not click on any links in such notifications to check your account; instead, type the website address yourself into your browser, use your previously saved\u00a0bookmark, or access your account from a mobile app.<\/li>\n<\/ul>\n<h3><strong>Your Computer or Mobile Device<\/strong><\/h3>\n<ul>\n<li>Your antivirus program generates an alert that your system is infected. Make sure it is your\u00a0antivirus software generating the alert and not a random pop-up window from a website trying to fool you into calling a number or installing something else. Not sure? Open and check your\u00a0antivirus program to confirm if your computer is truly infected.<\/li>\n<li>You get a pop-up window saying your computer has been encrypted and you have to pay a ransom to get your files back.<\/li>\n<li>Applications seem to be crashing randomly or are loading very slowly.<\/li>\n<li>While browsing the web, you are often redirected to pages you did not want to visit or new,\u00a0unwanted pages appear.<\/li>\n<\/ul>\n<h3>Financial<\/h3>\n<ul>\n<li>There are suspicious or unknown charges to your credit card or bank account that you know you\u00a0did not make.<\/li>\n<\/ul>\n<h3>Now What? &#8211; How to Take Back Control<\/h3>\n<p>If you suspect you have been hacked, stay calm; you will get through this. If the hack is work-related, do not try to fix the problem yourself; report it immediately. If it is a personal system or account that has been hacked, here are some steps you can take:<\/p>\n<ul>\n<li><strong>Recovering Your Online Accounts:<\/strong>\u00a0If you still have access to your account, log in from a trusted\u00a0computer that you are confident is not infected and reset your password. Once you log in, make sure to set a new, unique and strong password, the longer the better. Remember, each of your accounts should have a different password. If you can\u2019t keep track of all of them, we recommend using a password manager. Also, if it is an option, enable Multi-Factor Authentication (MFA) for your accounts, helping ensure the cyber attackers cannot get back in. If you no longer have access\u00a0to your account, contact the website and inform them your account has been taken over.<\/li>\n<li><strong>Recovering Your Personal Computer or Device:<\/strong>\u00a0If your antivirus program is unable to fix an\u00a0infected computer or you want to be more certain your system is safe, consider reinstalling the operating system and rebuilding the computer. This often requires erasing or replacing the disk drive and then reinstalling and updating the operating system. Do not reinstall the operating system from backups. Backups should only be used for recovering your personal files. If you feel uncomfortable rebuilding, consider using a professional service to help you. Or if your computer\u00a0or device is old, it may be time to purchase a new one.<\/li>\n<li><strong>Recovering Your Financial Accounts:<\/strong>\u00a0For issues with your credit card or any financial accounts,\u00a0call your bank or credit card company right away. Call them using a trusted phone number, such as the phone number listed on the back of your bank card, the number printed on your financial statements, or visit their website. Monitor your statements and credit reports frequently. In\u00a0addition, consider putting a credit freeze on your credit files.<\/li>\n<\/ul>\n<p>If you have suffered financial harm or feel in any way threatened, report the incident to local law\u00a0enforcement.<\/p>\n<hr \/>\n<h3>Guest Editor<\/h3>\n<article class=\"embedded-entity align-left\"><img decoding=\"async\" class=\"image-style-fourth-width alignleft\" title=\"Maxim Deweerdt\" src=\"https:\/\/www.sans.org\/sites\/default\/files\/styles\/fourth_width\/public\/Maxim%20Deweerdt-Guest%20editor%20Feb21.png?itok=X37-WKCo\" alt=\"Maxim Deweerdt\" \/><\/article>\n<p>Maxim Deweerdt (Twitter\u00a0<a href=\"https:\/\/twitter.com\/alfasec?lang=en\" target=\"_blank\" rel=\"noopener noreferrer\">@alfasec<\/a>) is a Certified Instructor at the SANS Institute,\u00a0mainly teaching Cyber Defense courses. He is also a principal consultant at NVISO,\u00a0where he focuses on Threat Hunting, Incident Response and SOC maturity projects.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have I Been Hacked? No matter how secure you are, sooner or later you may have an accident and become hacked. Below are\u00a0clues you might have been hacked and if so, what to do. Your Online Accounts Family or friends say they are receiving unusual messages or invites from you that you know you\u00a0did not [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,7,1],"tags":[],"class_list":["post-1601","post","type-post","status-publish","format-standard","hentry","category-front-page","category-published","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/1601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/comments?post=1601"}],"version-history":[{"count":1,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/1601\/revisions"}],"predecessor-version":[{"id":2053,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/1601\/revisions\/2053"}],"wp:attachment":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/media?parent=1601"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/categories?post=1601"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/tags?post=1601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}