Someone just “hacked” into my computer. I had just gotten out of the shower when I noticed my browser suddenly open by itself. Someone typed “bitch” into the address bar of my chrome then started opening folders until they got to my crypto folder. They opened coinbase and binance.

My Frightening Encounter with a Computer Intruder: What to Do Next

Recently, I experienced a disturbing incident that left me both shaken and alert regarding cybersecurity. Moments after stepping out of the shower, I was taken aback to find my web browser opening on its own. To my disbelief, a rogue user typed “bitch” into the Chrome address bar and proceeded to delve into my folders, eventually reaching my cryptocurrency bookmarks for Coinbase and Binance.

Panic set in as I tried to regain control of my computer: I attempted to close the browser using the Alt+F4 command, but nothing seemed to work. My mouse was unresponsive, leaving me with no choice but to perform a force shutdown. Once the initial shock wore off, I was left wondering how to safeguard myself and what steps I should take next.

Here’s What I Did to Secure My Computer

After this unnerving encounter, I took immediate action. Following the advice I received from the online community, I changed all of my passwords and disconnected my system. In addition, I backed up my files and executed a clean installation of the operating system. To enhance my security, I adjusted my LastPass settings to require a password every time I launch my browser. Additionally, I am now utilizing token authentication apps to provide an extra layer of verification for my logins.

It’s crucial to note that I do not store any cryptocurrency on my computer; instead, the folders that were accessed were merely bookmarks. Notably, when the intruder was at work, it appeared they typed “bitch,” backspaced, and began navigating through my bookmarks. Interestingly, I chose not to reinstall TeamViewer, as many suggested it might be the source of the breach. However, I couldn’t help but notice that my screen background did not turn black, as it normally would during a remote session takeover. More disconcerting was the fact that I had lost all control over my mouse and keyboard during the incident.

A Trustworthy Friend Comes to the Rescue

I reached out to a tech-savvy friend of mine, who is not only well-versed in cybersecurity but is also affiliated with a hacker group. Our long-standing relationship allowed me to trust his guidance. He has a track record of taking down individuals who target his friends, which provided me some reassurance.

In retrospect, this experience served as a stark wake-up call about the potential threats lurking in the digital world. It highlighted the importance of proactive cybersecurity measures

Share this content:

Leave a Reply

Your email address will not be published. Required fields are marked *