11 sure signs you've been hacked
In today's threatscape, antivirus software provides little piece of mind. In
fact, antimalware scanners on the whole are horrifically inaccurate, especially
with exploits less than 24 hours old. After all, malicious hackers and malware
can change their tactics at will. Swap a few bytes around, and a previously
recognized malware program becomes unrecognizable.
To combat this, many antimalware programs monitor program behaviors, often
called heuristics, to catch previously unrecognized malware. Other programs use
virtualized environments, system monitoring, network traffic detection, and all
of the above at once in order to be more accurate. And still they fail us on a
regular basis.
[ Verse yourself in the 7 sneak attacks used by today's most devious hackers, 14
dirty IT security consultant tricks, 9 popular IT security practices that just
don't work, and 10 crazy security tricks that do. | Learn how to secure your
systems with the Web Browser Deep Dive PDF special report and Security Central
newsletter, both from InfoWorld. ]
Here are 11 sure signs you've been hacked and what to do in the event of
compromise. Note that in all cases, the No. 1 recommendation is to completely
restore your system to a known good state before proceeding. In the early days,
this meant formatting the computer and restoring all programs and data. Today,
depending on your operating system, it might simply mean clicking on a Restore
button. Either way, a compromised computer can never be fully trusted again. The
recovery steps listed in each category below are the recommendations to follow
if you don't want to do a full restore -- but again, a full restore is always a
better option, risk-wise.
Sure sign of system compromise No. 1: Fake antivirus messages
In slight decline these days, fake antivirus warning messages are among the
surest signs that your system has been compromised. What most people don't
realize is that by the time they see the fake antivirus warning, the damage has
been done. Clicking No or Cancel to stop the fake virus scan is too little, too
late. The malicious software has already made use of unpatched software, often
the Java Runtime Environment or an Adobe product, to completely exploit your
system.
Why does the malicious program bother with the "antivirus warning"? This is
because the fake scan, which always finds tons of "viruses," is a lure to buy
their product. Clicking on the provided link sends you to a professional-looking
website, complete with glowing letters of recommendation. There, they ask you
for your credit card number and billing information. You'd be surprised how many
people get tricked into providing personal financial information. The bad guys
gain complete control of your system and get your credit card or banking
information. For bad guys, it's the Holy Grail of hacking.
What to do: As soon as you notice the fake antivirus warning message, power down
your computer. (Note: This requires knowing what your legitimate antivirus
program's warning looks like.) If you need to save anything and can do it, do
so. But the sooner you power off your computer, the better. Boot up the computer
system in Safe Mode, No Networking, and try to uninstall the newly installed
software (oftentimes it can be uninstalled like a regular program). Either way,
follow up by trying to restore your system to a state previous to the
exploitation. If successful, test the computer in regular mode and make sure
that the fake antivirus warnings are gone. Then follow up with a complete
antivirus scan. Oftentimes, the scanner will find other sneak remnants left
behind.
Sure sign of system compromise No. 2: Unwanted browser toolbars
This is probably the second most common sign of exploitation: Your browser has
multiple new toolbars with names that seem to indicate the toolbar is supposed
to help you. Unless you recognize the toolbar as coming from a very well-known
vendor, it's time to dump the bogus toolbar.
What to do: Most browsers allow you to review installed and active toolbars.
Remove any you didn't absolutely want to install. When in doubt, remove it. If
the bogus toolbar isn't listed there or you can't easily remove it, see if your
browser has an option to reset the browser back to its default settings. If this
doesn't work, follow the instructions listed above for fake antivirus messages.
You can usually avoid malicious toolbars by making sure that all your software
is fully patched and by being on the lookout for free software that installs
these tool bars. Hint: Read the licensing agreement. Toolbar installs are often
pointed out in the licensing agreements that most people don't read.
Sure sign of system compromise No. 3: Redirected Internet searches
Many hackers make their living by redirecting your browser somewhere other than
you want to go. The hacker gets paid by getting your clicks to appear on someone
else's website, often those who don't know that the clicks to their site are
from malicious redirection.
You can often spot this type of malware by typing a few related, very common
words (for example, "puppy" or "goldfish") into Internet search engines and
checking to see whether the same websites appear in the results -- almost always
with no actual relevance to your terms. Unfortunately, many of today's
redirected Internet searches are well hidden from the user through use of
additional proxies, so the bogus results are never returned to alert the user.
In general, if you have bogus toolbar programs, you're also being redirected.
Technical users who really want to confirm can sniff their own browser or
network traffic. The traffic sent and returned will always be distinctly
different on a compromised computer vs. an uncompromised computer.
What to do: Follow the same instructions as above. Usually removing the bogus
toolbars and programs is enough to get rid of malicious redirection.
Sure sign of system compromise No. 4: Frequent random popups
This popular sign that you've been hacked is also one of the more annoying ones.
When you're getting random browser pop-ups from websites that don't normally
generate them, your system has been compromised. I'm constantly amazed about
which websites, legitimate and otherwise, can bypass your browser's anti-pop-up
mechanisms. It's like battling email spam, but worse.
What to do: Not to sound like a broken record, but typically random pop-ups are
generated by one of the three previous malicious mechanisms noted above. You'll
need to get rid of bogus toolbars and other programs if you even hope to get rid
of the pop-ups.
Sure sign of system compromise No. 5: Your friends receive fake emails from
your email account
This is the one scenario where you might be OK. It's fairly common for our email
friends to receive malicious emails from us. A decade ago, when email attachment
viruses were all the rage, it was very common for malware programs to survey
your email address book and send malicious emails to everyone in it.
These days it's more common for malicious emails to be sent to some of your
friends, but not everyone in your email address book. If it's just a few friends
and not everyone in your email list, then more than likely your computer hasn't
been compromised (at least with an email address-hunting malware program). These
days malware programs and hackers often pull email addresses and contact lists
from social media sites, but doing so means obtaining a very incomplete list of
your contacts' email addresses. Although not always the case, the bogus emails
they send to your friends often don't have your email address as the sender. It
may have your name, but not your correct email address. If this is the case,
then usually your computer is safe.
What to do: If one or more friends reports receiving bogus emails claiming to be
from you, do your due diligence and run a complete antivirus scan on your
computer, followed by looking for unwanted installed programs and toolbars.
Often it's nothing to worry about, but it can't hurt to do a little health check
when this happens.
Sure sign of system compromise No. 6: Your online passwords suddenly change
If one or more of your online passwords suddenly change, you've more than likely
been hacked -- or at least that online service has been hacked. In this
particular scenario, usually what has happened is that the victim responded to
an authentic-looking phish email that purportedly claimed to be from the service
that ends up with the changed password. The bad guy collects the logon
information, logs on, changes the password (and other information to complicate
recovery), and uses the service to steal money from the victim or the victim's
acquaintances (while pretending to be the victim).
What to do: If the scam is widespread and many acquaintances you know are being
reached out to, immediately notify all your contacts about your compromised
account. Do this to minimize the damage being done to others by your mistake.
Second, contact the online service to report the compromised account. Most
online services are used to this sort of maliciousness and can quickly get the
account back under your control with a new password in a few minutes. Some
services even have the whole process automated. A few services even have a "My
friend's been hacked!" button that lets your friends start the process. This is
helpful, because your friends often know your account has been compromised
before you do.
If the compromised logon information is used on other websites, immediately
change those passwords. And be more careful next time. Websites rarely send
emails asking you to provide your logon information. When in doubt, go to the
website directly (don't use the links sent to you in email) and see if the same
information is being requested when you log on using the legitimate method. You
can also call the service via their phone line or email them to report the
received phish email or to confirm its validity. Lastly, consider using online
services that provide two-factor authentication. It makes your account much
harder to steal.
Sure sign of system compromise No. 7: Unexpected software installs
Unwanted and unexpected software installs are a big sign that your computer
system has likely been hacked.
In the early days of malware, most programs were computer viruses, which work by
modifying other legitimate programs. They did this to better hide themselves.
For whatever reason, most malware programs these days are Trojans and worms, and
they typically install themselves like legitimate programs. This may be because
their creators are trying to walk a very thin line when the courts catch up to
them. They can attempt to say something like, "But we are a legitimate software
company." Oftentimes the unwanted software is legally installed by other
programs, so read your license agreements. Frequently, I'll read license
agreements that plainly state that they will be installing one or more other
programs. Sometimes you can opt out of these other installed programs; other
times you can't.
What to do: There are many free programs that show you all your installed
programs and let you selectively disable them. My favorite for Windows is
Autoruns. It doesn't show you every program installed but will tell you the ones
that automatically start themselves when your PC is restarted. Most malware
programs can be found here. The hard part is determining what is and what isn't
legitimate. When in doubt, disable the unrecognized program, reboot the PC, and
reenable the program only if some needed functionality is no longer working.
Sure sign of system compromise No. 8: Your mouse moves between programs and
makes correct selections
If your mouse pointer moves itself while making selections that work, you've
definitely been hacked. Mouse pointers often move randomly, usually due to
hardware problems. But if the movements involve making the correct choices to
run particular programs, malicious humans are somewhere involved.
Not as common as some of the other attacks, many hackers will break into a
computer, wait for it to be idle for a long time (like after midnight), then try
to steal your money. Hackers will break into bank accounts and transfer money,
trade your stocks, and do all sorts of rogue actions, all designed to lighten
your cash load.
What to do: If your computer "comes alive" one night, take a minute before
turning it off to determine what the intruders are interested in. Don't let them
rob you, but it will be useful to see what things they are looking at and trying
to compromise. If you have a cellphone handy, take a few pictures to document
their tasks. When it makes sense, power off the computer. Unhook it from the
network (or disable the wireless router) and call in the professionals. This is
the one time that you're going to need expert help.
Using another known good computer, immediately change all your other logon names
and passwords. Check your bank account transaction histories, stock accounts,
and so on. Consider paying for a credit-monitoring service. If you've been a
victim of this attack, you have to take it seriously. Complete restore of the
computer is the only option you should choose for recovery. But if you've lost
any money, make sure to let the forensics team make a copy first. If you've
suffered a loss, call law enforcement and file a case. You'll need this
information to best recover your real money losses, if any.
Sure sign of system compromise No. 9: Your antimalware software, Task
Manager, or Registry Editor is disabled and can't be restarted
This is a huge sign of malicious compromise. If you notice that your antimalware
software is disabled and you didn't do it, you're probably exploited --
especially if you try to start Task Manager or Registry Editor and they won't
start, start and disappear, or start in a reduced state. This is very common for
malware to do.
What to do: You should really perform a complete restore because there is no
telling what has happened. But if you want to try something less drastic first,
research the many methods on how to restore the lost functionality (any Internet
search engine will return lots of results), then restart your computer in Safe
Mode and start the hard work. I say "hard work" because usually it isn't easy or
quick. Often, I have to try a handful of different methods to find one that
works. Precede restoring your software by getting rid of the malware program,
using the methods listed above.
Sure sign of system compromise No. 10: Your bank account is missing money
I mean lots of money. Online bad guys don't usually steal a little money. They
like to transfer everything or nearly everything, often to a foreign exchange or
bank. Usually it begins by your computer being compromised or from you
responding to a fake phish from your bank. In any case, the bad guys log on to
your bank, change your contact information, and transfer large sums of money to
themselves.
What to do: In most cases you are in luck because most financial institutions
will replace the stolen funds (especially if they can stop the transaction
before the damage is truly done). However, there have been many cases where the
courts have ruled it was the customer's responsibility to not be hacked, and
it's up to the financial institution to decide whether they will make
restitution to you.
If you're trying to prevent this from happening in the first place, turn on
transaction alerts that send text alerts to you when something unusual is
happening. Many financial institutions allow you to set thresholds on
transaction amounts, and if the threshold is exceeded or it goes to a foreign
country, you'll be warned. Unfortunately, many times the bad guys reset the
alerts or your contact information before they steal your money. So make sure
your financial institution sends you alerts anytime your contact information or
alerting choices are changed.
Sure sign of system compromise No. 11: You get calls from stores about
nonpayment of shipped goods
In this case, hackers have compromised one of your accounts, made a purchase,
and had it shipped to someplace other than your house. Oftentimes, the bad guys
will order tons of merchandise at the same time, making each business entity
think you have enough funds at the beginning, but as each transaction finally
pushes through you end up with insufficient funds.
What to do: This is a bad one. First try to think of how your account was
compromised. If it was one of the methods above, follow those recommendations.
Either way, change all your logon names and passwords (not just the one related
to the single compromised account), call law enforcement, get a case going, and
start monitoring your credit. You'll probably spend months trying to clear up
all the bogus transactions committed in your name, but you should be able to
undo most, if not all, of the damage.
Years ago you could be left with a negative credit history that would impact
your life for a decade. These days, companies and the credit reporting agencies
are more used to cyber crime, and they deal with it better. Still, be aggressive
and make sure you follow every bit of advice given to you by law enforcement,
the creditors, and the credit-rating agencies (there are three major ones).
Malware vector trifecta to avoid
The hope of an antimalware program that can perfectly detect malware and
malicious hacking is pure folly. Keep an eye out for the common signs and
symptoms of your computer being hacked as outlined above. And if you are
risk-adverse, as I am, always perform a complete computer restore with the event
of a breach. Because once your computer has been compromised, the bad guys can
do anything and hide anywhere. It's best to just start from scratch.
Most malicious hacking originates from one of three vectors: unpatched software,
running Trojan horse programs, and responding to fake phishing emails. Do better
at preventing these three things, and you'll be less likely to have to rely on
your antimalware software's accuracy -- and luck.