In today's threatscape, antivirus software provides little piece of 
mind. In fact, antimalware scanners on the whole are horrifically 
inaccurate, especially with exploits less than 24 hours old. After all, 
malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.
To combat this, many antimalware programs monitor program behaviors, 
often called heuristics, to catch previously unrecognized malware. Other
 programs use virtualized environments, system monitoring, network 
traffic detection, and all of the above at once in order to be more 
accurate. And still they fail us on a regular basis. 
Here are 11 sure signs you've been hacked and what to do in the event of
 compromise. Note that in all cases, the No. 1 recommendation is to 
completely restore your system to a known good state before proceeding. 
In the early days, this meant formatting the computer and restoring all 
programs and data. Today, depending on your operating system, it might 
simply mean clicking on a Restore button. Either way, a compromised computer
 can never be fully trusted again. The recovery steps listed in each 
category below are the recommendations to follow if you don't want to do
 a full restore -- but again, a full restore is always a better 
option, 
risk-wise. 
No. 1: Fake antivirus messages
In slight decline these days, fake antivirus warning messages are among 
the surest signs that your system has been compromised. What most people
 don't realize is that by the time they see the fake antivirus warning, 
the damage has been done. Clicking No or Cancel to stop the fake virus 
scan is too little, too late. The malicious software has already made 
use of unpatched software, often the Java Runtime Environment or an 
Adobe product, to completely exploit your system. 
Why does the malicious program bother with the "antivirus warning"? This
 is because the fake scan, which always finds tons of "viruses," is a 
lure to buy their product. Clicking on the provided link sends you to a 
professional-looking website, complete with glowing letters of 
recommendation. There, they ask you for your credit card number and 
billing information. You'd be surprised how many people get tricked into
 providing personal financial information. The bad guys gain complete 
control of your system and get your credit card or banking information. 
For bad guys, it's the Holy Grail of hacking. 
What to do: As soon as you notice the fake antivirus warning message, 
power down your computer. (Note: This requires knowing what your 
legitimate antivirus program's warning looks like.) If you need to save 
anything and can do it, do so. But the sooner you power off your 
computer, the better. Boot up the computer system in Safe Mode, No 
Networking, and try to uninstall the newly installed software 
(oftentimes it can be uninstalled like a regular program). Either way, 
follow up by trying to restore your system to a state previous to the 
exploitation. If successful, test the computer in regular mode and make 
sure that the fake antivirus warnings are gone. Then follow up with a 
complete antivirus scan. Oftentimes, the scanner will find other sneak 
remnants left behind. 
No. 2: Unwanted browser toolbars
This is probably the second most common sign of exploitation: Your 
browser has multiple new toolbars with names that seem to indicate the 
toolbar is supposed to help you. Unless you recognize the toolbar as 
coming from a very well-known vendor, it's time to dump the bogus 
toolbar. 
What to do: Most browsers allow you to review installed and active 
toolbars. Remove any you didn't absolutely want to install. When in 
doubt, remove it. If the bogus toolbar isn't listed there or you can't 
easily remove it, see if your browser has an option to reset the browser
 back to its default settings. If this doesn't work, follow the 
instructions listed above for fake antivirus messages. You can usually 
avoid malicious toolbars by making sure that all your software is fully 
patched and by being on the lookout for free software that installs 
these tool bars. Hint: Read the licensing agreement. Toolbar installs 
are often pointed out in the licensing agreements that most people don't
 read. 
No. 3: Redirected Internet searches
Many hackers make their living by redirecting your browser somewhere 
other than you want to go. The hacker gets paid by getting your clicks 
to appear on someone else's website, often those who don't know that the
 clicks to their site are from malicious redirection.
You can often spot this type of malware by typing a few related, very 
common words (for example, "puppy" or "goldfish") into Internet search 
engines and checking to see whether the same websites appear in the 
results -- almost always with no actual relevance to your terms. 
Unfortunately, many of today's redirected Internet searches are well 
hidden from the user through use of additional proxies, so the bogus 
results are never returned to alert the user. In general, if you have 
bogus toolbar programs, you're also being redirected. Technical users 
who really want to confirm can sniff their own browser or network 
traffic. The traffic sent and returned will always be distinctly 
different on a compromised computer vs. an uncompromised computer
What to do: Follow the same instructions as above. Usually removing the 
bogus toolbars and programs is enough to get rid of malicious 
redirection. 
No. 4: Frequent random popups
This popular sign that you've been hacked is also one of the more 
annoying ones. When you're getting random browser pop-ups from websites 
that don't normally generate them, your system has been compromised. I'm
 constantly amazed about which websites, legitimate and otherwise, can 
bypass your browser's anti-pop-up mechanisms. It's like battling email 
spam, but worse. 
What to do: Not to sound like a broken record, but typically random 
pop-ups are generated by one of the three previous malicious mechanisms 
noted above. You'll need to get rid of bogus toolbars and other programs
 if you even hope to get rid of the pop-ups.
No. 5: Your friends receive fake emails from your email account
This is the one scenario where you might be OK. It's fairly common for 
our email friends to receive malicious emails from us. A decade ago, 
when email attachment viruses were all the rage, it was very common for 
malware programs to survey your email address book and send malicious 
emails to everyone in it. 
These days it's more common for malicious emails to be sent to some of 
your friends, but not everyone in your email address book. If it's just a
 few friends and not everyone in your email list, then more than likely 
your computer hasn't been compromised (at least with an email 
address-hunting malware program). These days malware programs and 
hackers often pull email addresses and contact lists from social media 
sites, but doing so means obtaining a very incomplete list of your 
contacts' email addresses. Although not always the case, the bogus 
emails they send to your friends often don't have your email address as 
the sender. It may have your name, but not your correct email address. 
If this is the case, then usually your computer is safe.
What to do: If one or more friends reports receiving bogus emails 
claiming to be from you, do your due diligence and run a complete 
antivirus scan on your computer, followed by looking for unwanted 
installed programs and toolbars. Often it's nothing to worry about, but 
it can't hurt to do a little health check when this happens. 
No. 6: Your online passwords suddenly change
If one or more of your online passwords suddenly change, you've more 
than likely been hacked -- or at least that online service has been 
hacked. In this particular scenario, usually what has happened is that 
the victim responded to an authentic-looking phish email that 
purportedly claimed to be from the service that ends up with the changed
 password. The bad guy collects the logon information, logs on, changes 
the password (and other information to complicate recovery), and uses 
the service to steal money from the victim or the victim's acquaintances
 (while pretending to be the victim). 
What to do: If the scam is widespread and many acquaintances you know 
are being reached out to, immediately notify all your contacts about 
your compromised account. Do this to minimize the damage being done to 
others by your mistake. Second, contact the online service to report the
 compromised account. Most online services are used to this sort of 
maliciousness and can quickly get the account back under your control 
with a new password in a few minutes. Some services even have the whole 
process automated. A few services even have a "My friend's been hacked!"
 button that lets your friends start the process. This is helpful, 
because your friends often know your account has been compromised before
 you do. 
If the compromised logon information is used on other websites, immediately change those passwords.
 And be more careful next time. Websites rarely send emails asking you 
to provide your logon information. When in doubt, go to the website 
directly (don't use the links sent to you in email) and see if the same 
information is being requested when you log on using the legitimate 
method. You can also call the service via their phone line or email them
 to report the received phish email or to confirm its validity. Lastly, 
consider using online services that provide two-factor authentication. 
It makes your account much harder to steal.
No. 7: Unexpected software installs
Unwanted and unexpected software installs are a big sign that your computer system has likely been hacked. 
In the early days of malware, most programs were computer viruses, which
 work by modifying other legitimate programs. They did this to better 
hide themselves. For whatever reason, most malware programs these days 
are Trojans and worms, and they typically install themselves like 
legitimate programs. This may be because their creators are trying to 
walk a very thin line when the courts catch up to them. They can attempt
 to say something like, "But we are a legitimate software company." 
Oftentimes the unwanted software is legally installed by other programs,
 so read your license agreements. Frequently, I'll read license 
agreements that plainly state that they will be installing one or more 
other programs. Sometimes you can opt out of these other installed 
programs; other times you can't. 
What to do: There are many free programs that show you all your 
installed programs and let you selectively disable them. My favorite for
 Windows is Autoruns.
 It doesn't show you every program installed but will tell you the ones 
that automatically start themselves when your PC is restarted. Most 
malware programs can be found here. The hard part is determining what is
 and what isn't legitimate. When in doubt, disable the unrecognized 
program, reboot the PC, and reenable the program only if some needed 
functionality is no longer working.
No. 8: Your mouse moves between programs and makes correct selections
If your mouse pointer moves itself while making selections that work, 
you've definitely been hacked. Mouse pointers often move randomly, 
usually due to hardware problems. But if the movements involve making 
the correct choices to run particular programs, malicious humans are 
somewhere involved. 
Not as common as some of the other attacks, many hackers will break into
 a computer, wait for it to be idle for a long time (like after 
midnight), then try to steal your money. Hackers will break into bank 
accounts and transfer money, trade your stocks, and do all sorts of 
rogue actions, all designed to lighten your cash load. 
What to do: If your computer "comes alive" one night, take a minute 
before turning it off to determine what the intruders are interested in.
 Don't let them rob you, but it will be useful to see what things they 
are looking at and trying to compromise. If you have a cellphone handy, 
take a few pictures to document their tasks. When it makes sense, power 
off the computer. Unhook it from the network (or disable the wireless 
router) and call in the professionals. This is the one time that you're 
going to need expert help.
Using another known good computer, immediately change all your other 
logon names and passwords. Check your bank account transaction 
histories, stock accounts, and so on. Consider paying for a 
credit-monitoring service. If you've been a victim of this attack, you have to take it seriously.
 Complete restore of the computer is the only option you should choose 
for recovery. But if you've lost any money, make sure to let the 
forensics team make a copy first. If you've suffered a loss, call law 
enforcement and file a case. You'll need this information to best 
recover your real money losses, if any.
No. 9: Your antimalware software,
 Task Manager, or Registry Editor is disabled and can't be restarted
This is a huge sign of malicious compromise. If you notice that your 
antimalware software is disabled and you didn't do it, you're probably 
exploited -- especially if you try to start Task Manager or Registry 
Editor and they won't start, start and disappear, or start in a reduced 
state. This is very common for malware to do. 
What to do: You should really perform a complete restore because there 
is no telling what has happened. But if you want to try something less 
drastic first, research the many methods on how to restore the lost 
functionality (any Internet search engine will return lots of results), 
then restart your computer in Safe Mode and start the hard work. I say 
"hard work" because usually it isn't easy or quick. Often, I have to try
 a handful of different methods to find one that works. Precede 
restoring your software by getting rid of the malware program, using the
 methods listed above.
No. 10: Your bank account is missing money
I mean lots of money. Online bad guys don't usually steal a little 
money. They like to transfer everything or nearly everything, often to a
 foreign exchange or bank. Usually it begins by your computer being 
compromised or from you responding to a fake phish from your bank. In 
any case, the bad guys log on to your bank, change your contact 
information, and transfer large sums of money to themselves. 
What to do: In most cases you are in luck because most financial 
institutions will replace the stolen funds (especially if they can stop 
the transaction before the damage is truly done). However, there have 
been many cases where the courts have ruled it was the customer's 
responsibility to not be hacked, and it's up to the financial 
institution to decide whether they will make restitution to you. 
If you're trying to prevent this from happening in the first place, turn
 on transaction alerts that send text alerts to you when something 
unusual is happening. Many financial institutions allow you to set 
thresholds on transaction amounts, and if the threshold is exceeded or 
it goes to a foreign country, you'll be warned. Unfortunately, many 
times the bad guys reset the alerts or your contact information before 
they steal your money. So make sure your financial institution sends you
 alerts anytime your contact information or alerting choices are 
changed. 
Sure sign of system compromise No. 11: You get calls from stores about nonpayment of shipped goods
In this case, hackers have compromised one of your accounts, made a 
purchase, and had it shipped to someplace other than your house. 
Oftentimes, the bad guys will order tons of merchandise at the same 
time, making each business entity think you have enough funds at the 
beginning, but as each transaction finally pushes through you end up 
with insufficient funds. 
What to do: This is a bad one. First try to think of how your account 
was compromised. If it was one of the methods above, follow those 
recommendations. Either way, change all your logon names and passwords 
(not just the one related to the single compromised account), call law 
enforcement, get a case going, and start monitoring your credit. You'll 
probably spend months trying to clear up all the bogus transactions 
committed in your name, but you should be able to undo most, if not all,
 of the damage. 
Years ago you could be left with a negative credit history that would 
impact your life for a decade. These days, companies and the credit 
reporting agencies are more used to cyber crime, and they deal with it 
better. Still, be aggressive and make sure you follow every bit of 
advice given to you by law enforcement, the creditors, and the 
credit-rating agencies (there are three major ones).
Malware vector trifecta to avoid
The hope of an antimalware program that can perfectly detect malware and
 malicious hacking is pure folly. Keep an eye out for the common signs 
and symptoms of your computer being hacked as outlined above. And if you
 are risk-adverse, as I am, always perform a complete computer restore 
with the event of a breach. Because once your computer has been 
compromised, the bad guys can do anything and hide anywhere. It's best 
to just start from scratch. 
Most malicious hacking originates from one of three vectors: unpatched 
software, running Trojan horse programs, and responding to fake phishing
 emails. Do better at preventing these three things, and you'll be less 
likely to have to rely on your antimalware software's accuracy -- and 
luck.
Got something to add to the discussion? Tell us in comments!
[Subscribe to Oluinfotech's Consumerization of IT newsletter today. ]
Did we miss your favourite one-off wonder? Let us know! If you would like to comment on this story or anything else you have seen on Infotech, head over to our Facebook page or message us on Twitter.
 
 

0 comments:
Post a Comment
Add Your Comment Below