My Computer Was Hacked While I Was Showering: Unauthorized Access to My Crypto Accounts and Browsing Activities

My Frightening Encounter with a Computer Intruder: What to Do Next

Recently, I experienced a disturbing incident that left me both shaken and alert regarding cybersecurity. Moments after stepping out of the shower, I was taken aback to find my web browser opening on its own. To my disbelief, a rogue user typed “bitch” into the Chrome address bar and proceeded to delve into my folders, eventually reaching my cryptocurrency bookmarks for Coinbase and Binance.

Panic set in as I tried to regain control of my computer: I attempted to close the browser using the Alt+F4 command, but nothing seemed to work. My mouse was unresponsive, leaving me with no choice but to perform a force shutdown. Once the initial shock wore off, I was left wondering how to safeguard myself and what steps I should take next.

Here’s What I Did to Secure My Computer

After this unnerving encounter, I took immediate action. Following the advice I received from the online community, I changed all of my passwords and disconnected my system. In addition, I backed up my files and executed a clean installation of the operating system. To enhance my security, I adjusted my LastPass settings to require a password every time I launch my browser. Additionally, I am now utilizing token authentication apps to provide an extra layer of verification for my logins.

It’s crucial to note that I do not store any cryptocurrency on my computer; instead, the folders that were accessed were merely bookmarks. Notably, when the intruder was at work, it appeared they typed “bitch,” backspaced, and began navigating through my bookmarks. Interestingly, I chose not to reinstall TeamViewer, as many suggested it might be the source of the breach. However, I couldn’t help but notice that my screen background did not turn black, as it normally would during a remote session takeover. More disconcerting was the fact that I had lost all control over my mouse and keyboard during the incident.

A Trustworthy Friend Comes to the Rescue

I reached out to a tech-savvy friend of mine, who is not only well-versed in cybersecurity but is also affiliated with a hacker group. Our long-standing relationship allowed me to trust his guidance. He has a track record of taking down individuals who target his friends, which provided me some reassurance.

In retrospect, this experience served as a stark wake-up call about the potential threats lurking in the digital world. It highlighted the importance of proactive cybersecurity measures

Share this content:

One Comment

  1. Hi there,

    I’m sorry to hear about the unsettling experience you’ve had. Based on your description, it seems like your system may have been compromised, potentially through malware or remote access tools. Here are some recommended steps to enhance your security and investigate the incident:

    • Run a complete antivirus and anti-malware scan: Use reputable tools such as Malwarebytes, Windows Defender, or Norton to identify and remove any malicious software.
    • Check active remote sessions: On Windows, you can use Task Manager or Remote Desktop settings to review active connections. On Mac, check Screen Sharing and Remote Management.
    • Review installed programs and startup items: Uninstall any unfamiliar applications or remote management tools that may pose risks.
    • Update your operating system and all software: Keeping your OS and browsers current helps patch security vulnerabilities.
    • Inspect your browser extensions and settings: Disable or remove any suspicious or unknown extensions in Chrome, and reset your browser settings to default if necessary.
    • Secure your accounts: Continue creating strong, unique passwords for all online services, and enable two-factor authentication where possible.
    • Monitor your system activity:

Leave a Reply to [email protected] Cancel reply

Your email address will not be published. Required fields are marked *