A Disturbing Case of Cyber Intrusion: What To Do When A Hacker Disrupts Your Life
In the digital age, the threat of cybercrime looms large, and for one friend’s family, this reality has become painfully evident. Recently, they found themselves grappling with a sinister hacker who not only compromised their financial information but has also inserted chaos into their daily lives. The question now is: what steps can they take to regain control and mitigate the damage?
About a month ago, the mother of my friend fell victim to a hacking incident that has spiraled into a troubling situation. The attacker gained access to her computer, enabling them to view sensitive financial details, including information belonging to her sister who resides in Taiwan. The hacker cleverly crafted deceptive pop-ups and forms masquerading as communications from Charles Schwab, the financial institution holding the accounts.
Since the initial breach, the hacker’s actions have escalated dramatically. He has taken over her mother’s computer, making bizarre alterations such as changing fonts, blacking out the screen, and causing print jobs to produce nonsensical test prints. Even more troubling, it seems the hacker is recording her conversations on both her landline and cell phone and has disrupted important communications. For instance, when the mother warned her friend that the line was compromised and suggested she call her cell, the hacker retaliated by playing back a recording of her voice instructing the friend to reach out to her mobile number.
The situation has grown increasingly invasive, with the hacker even sending threatening texts that suggest they could unleash viruses on the mother’s contacts. One message was particularly alarming, containing the phrase, “I’m yelling at you,” which was interpreted as a physical threat.
In a bid to regain some semblance of safety, the family has disconnected all electronic devices and her father has procured a new cell phone and number. However, issues persist; her father has already received suspicious text messages attempting to verify a Yahoo account—one he does not own. In light of these developments, obtaining a burner phone has been suggested for greater security while they change their accounts and monitor their credit activity.
Given the severity of the situation, the family has also involved law enforcement, filing a report to document the harassment and intrusion. But what additional measures should they pursue?
If you ever find yourself or someone you know in a similar predicament, here are some critical steps to consider:
- Secure All Electronic Devices: Disconnect from the internet and reboot systems using
Share this content: