My Computer Was Hacked While I Was Showering: Unauthorized Access Led to Crypto Accounts Being Opened

What to Do If You Suspect Your Computer Has Been Compromised

Recently, a troubling incident occurred that highlighted the importance of computer security. After stepping out of the shower, I returned to find my web browser inexplicably opening on its own. Before I could react, someone had typed the word “bitch” into the address bar and began navigating through my folders, ultimately reaching my cryptocurrency-related bookmarks for Coinbase and Binance.

In a surge of panic, I tried to close the browser using Alt+F4, but my commands went unacknowledged. The mouse cursor was frozen, rendering me powerless, so I opted for a force shutdown of my computer. Faced with potential data compromise, I was left wondering, “What should I do next?”

Immediate Steps to Take After a Potential Breach

Following this startling experience, I reached out for advice and received an overwhelming number of recommendations. Here’s what I did to secure my system:

  1. Changed All Passwords: I quickly altered the passwords for my accounts, ensuring that no unauthorized access would be permitted moving forward.

  2. Clean Installation: To mitigate any lingering threats, I unplugged my computer, backed up my important files, and performed a clean operating system install. This step is crucial as it eliminates any potential malware that could have been installed.

  3. Enhanced Security Measures: I adjusted my LastPass settings to require a password login every time I open the browser. I also began utilizing token and authenticator apps to add an extra layer of verification for account logins.

It’s worth noting that I do not store any cryptocurrency directly on my computer; the folders that the intruder accessed were merely bookmarks. While it was alarming that someone could commandeer my computer in such a way, the fact that they typed out “bitch,” deleted it, and proceeded to browse through bookmarks raised further questions about their intentions.

Reflecting on Potential Vulnerabilities

Many readers mentioned the possibility that software like TeamViewer could have been the entry point for this intrusion. Interestingly, my screen did not display the typical black background indicative of a remote takeover, and I was completely unable to use my keyboard or mouse while the browser was being manipulated.

To fortify my defenses against such attacks in the future, I’ve decided against re-downloading TeamViewer, especially after the advice from others regarding its past vulnerabilities.

Seeking Support from Trusted Sources

For additional insight into this incident, I consulted a

Share this content:

Leave a Reply

Your email address will not be published. Required fields are marked *