My Frightening Encounter with a Computer Intruder: What to Do Next
Recently, I experienced a disturbing incident that left me both shaken and alert regarding cybersecurity. Moments after stepping out of the shower, I was taken aback to find my web browser opening on its own. To my disbelief, a rogue user typed “bitch” into the Chrome address bar and proceeded to delve into my folders, eventually reaching my cryptocurrency bookmarks for Coinbase and Binance.
Panic set in as I tried to regain control of my computer: I attempted to close the browser using the Alt+F4 command, but nothing seemed to work. My mouse was unresponsive, leaving me with no choice but to perform a force shutdown. Once the initial shock wore off, I was left wondering how to safeguard myself and what steps I should take next.
Here’s What I Did to Secure My Computer
After this unnerving encounter, I took immediate action. Following the advice I received from the online community, I changed all of my passwords and disconnected my system. In addition, I backed up my files and executed a clean installation of the operating system. To enhance my security, I adjusted my LastPass settings to require a password every time I launch my browser. Additionally, I am now utilizing token authentication apps to provide an extra layer of verification for my logins.
It’s crucial to note that I do not store any cryptocurrency on my computer; instead, the folders that were accessed were merely bookmarks. Notably, when the intruder was at work, it appeared they typed “bitch,” backspaced, and began navigating through my bookmarks. Interestingly, I chose not to reinstall TeamViewer, as many suggested it might be the source of the breach. However, I couldn’t help but notice that my screen background did not turn black, as it normally would during a remote session takeover. More disconcerting was the fact that I had lost all control over my mouse and keyboard during the incident.
A Trustworthy Friend Comes to the Rescue
I reached out to a tech-savvy friend of mine, who is not only well-versed in cybersecurity but is also affiliated with a hacker group. Our long-standing relationship allowed me to trust his guidance. He has a track record of taking down individuals who target his friends, which provided me some reassurance.
In retrospect, this experience served as a stark wake-up call about the potential threats lurking in the digital world. It highlighted the importance of proactive cybersecurity measures
Share this content:
Hi there,
I’m sorry to hear about the unsettling experience you’ve had. Based on your description, it seems like your system may have been compromised, potentially through malware or remote access tools. Here are some recommended steps to enhance your security and investigate the incident:
Task Manager
orRemote Desktop
settings to review active connections. On Mac, checkScreen Sharing
andRemote Management
.