Knowing that you've hacked, is all very well, but it's only half the problem. The next step is knowing what to do to restore your system's security and recover any stolen money.
The next section looks at any legal protection you might have.
Today's browsers provide options that allow users to choose which toolbars they want to make active, so when these unwanted toolbars appear:-
Minimise the chances of unwanted toolbars appearing by keeping the browser up to date and reading license agreements carefully before installing software.
This can be unbelievably and disproportionately annoying, especially when you're expecting results from your favourite search engine. This often happens in conjunction with the appearance of unwanted toolbars, when the software hijacks your chosen search engine.
The solution is the same as getting rid of unwanted toolbars with the addition re-selecting your preferred search engine in the options/settings list.
You need to know what legitimate warning from anti-virus program looks like, so you can recognise a 'fake' one when it appears. As soon as it does so:-
Getting repeated pop-ups on sites that you don't normally get them is annoying and is generally accompanied by unwanted toolbars, redirected searches and the installation of unwanted software.
The first step involves removing the bogus toolbars, the redirected searches and the unwanted software. If this doesn't solve the problem, there a number of free adware removal programs available. But be careful and do your research. Installing free programs, is probably how the problem started in the first place and check your license agreement.
This is a serious breach of security and can go undiscovered for a long period of time, especially if you don't use the affected services on a regular basis. Sometimes the breach goes unrecognised because the user assumes that its a case of forgotten password. But once discovered:-
Finally as a bit of extra security consider just using sites that offer two factor authentication.
A bit troublesome to track-down, but help is at hand. There are many free software programs available that will reveal all installed programs, where they are located, their associated dependencies and when they start.
These programs allows you to selectively and systematically disable them. By rebooting the device each time allows you to check if the problem is solved and you haven't suffered a loss of functionality. Then it's matter of repeating as necessary until the problem is solved.
If your device comes alive and the mouse is observed flicking about do:-
The effects from this type of attack can have far reaching consequences that go far beyond the inconvenience of re-building your computer. It can affect your reputation with credit agencies and can prevent you from obtaining credit to buying cars to houses.
The good news:If you've used a credit card, then most banks will replace the stolen money. Just make sure they are notified at the earliest opportunity, then they may be able to stop the current transaction and prevent any future ones.
The bad news: There's been some cases where courts have decided that its the owners responsibility to make sure that they are not hacked and so should bear the loss. In these situations its down to the goodwill of the financial institution whether they will replace the stolen money.
To reduce the risk:-
One problem exists though, when the hackers are in the account stealing all your money, they frequently reset the alerts and other settings. So make sure the bank or financial institution alerts you anytime your contact information or alerting choices are changed.
An ideal solution is to perform a complete 'restore' of your system, to return it to the factory settings. This is because you don't know exactly happened and discovering what's been changed is like hunting for a needle in haystack.
This problem here, is that all your software needs to be re-installed and all your personal settings recreated: a major piece of work in itself.
A tempting alternative is to research possible causes on the internet and look for methods to restore your lost functionality and restarting your device in safe mode to investigate whether it has worked. This is a trial error approach that can take equally as long as a full restore, but you could be lucky and it might work on the first attempt. It's impossible to know in advance.
Knowing how to respond is critical to minimising damage caused by doing the wrong thing.
Time to add another case study to the Hacking Case Histories section. This time about the WannaCry malware
Create a page titled WannaCry Malware and use the internet to find out more.
If you don't feel confident in meeting any of these performance criteria, ask your teacher or re-read the information again.