Malware has become so inconspicuous and flexible that they can go almost unnoticed by the most advanced antimalware software. Antimalware scanners can often be incorrect especially if the malware is less than 24 hours old. That is more than enough time for hackers to cause major damages and steal important data. If you have been diagnosed with a disease, you are more likely to visit another doctor for a second opinion. Likewise, if are suspicious about a file, a 60thopinion might be able to help you out. You can send your file at Google’s VirusTotal, where the file will be processed in over 60 antimalware scanners hopefully being able to detect any malware.

Due to the difficulties in exposing malware, antimalware programs monitor behaviors as a way of detection. However, this process (heuristic) only detects malwares that were previously undetected. Other means of detection are the use of virtualized environments, system monitoring and network traffic detection. These seem to be a bit more accurate than antimalware scanners.

Here are 15 signs that you have been hacked and what to do.

  1. You will receive ransomware message

What’s more devastating than a screen lock down instructing you to pay for your own data?

Ransomware is back on the rise. Businesses are losing billions in both productivity and cash. Whether it is a small business or a large one, hospitals or police stations – yes, ransomware attacks with pure unbiasedness.

Paying up doesn’t mean your business has acquired freedom. Ransomware leaves behind bugs that can continue to cause downtime and lost of more money.

What to do: Restore your data using your back up. For this reason, it is important to test your backups regularly. Do not wait for a ransomware or any other malware issue to occur. The best way to test the reliability of your backup is to do so offline. No malware is remains the same. They improve and tries to beat your system the same way you try to beat theirs.

While cloud storages backup copies of your files, it does not necessarily mean they will be able to help you recover from ransomware attacks. In addition, cloud storages may not support all types of files. However, it may be best to contact you cloud service, as support may be able to help you recover more files than you think possible.

Lastly, contact a website that can help you recover your files without having to pay a ransom using reverse engineer by simply providing them the name of the ransomware program and the version.

  1. You receive a fake antivirus message

Fake antivirus messages pops up on you screen saying you have been infected or it has found over a dozen or more malware on your system. A message like this means your system has either been compromise or the hacker is waiting for you to click on the message to use it as a doorway to your system.

What to do: If you can, close the tab and restart the browser, in some cases this is enough since the message may be a one time occurrence. Other times the message reappears even after reloading. In this case, try using your browser in incognito or in private mode, this stops the fake antivirus message from appearing.

However, in the worst case scenario where your computer has been compromised, shut your computer down. If there is something you need to save before shutting it down, go ahead and do so. Proceed to restore your system to a previous clean image.

Beware of tech support scams. These messages appear as though they are from Microsoft. They tend to ask you to install a program which gives them enough time to get into your system. The fake antivirus scan will show that your system is infected and will then attempt to sell you a program to fix your problems. Do not give your credit card number. If you fall into the trap and give it. Call your credit card company immediately. The one sure way of defeating this malware is rebooting your computer.

  1. An unwanted browser toolbar somehow appears

Several toolbars may appear in your browser which are unknown to you.

What to do: Delete the unwanted toolbars. If this doesn’t work follow the same steps as receiving a fake AV message.

  1. Your internet searches are redirected

Hackers use other websites to redirect your browser. Most times, these sites are unrelated to what you are looking for. Sometimes hackers use bogus toolbars to redirect the user.

What to do: Remove toolbars and any program you feel may feel is bogus.

  1. Frequent, random popups start appearing

This is the most common sign that you have been hacked.

What to do: Try same steps as removing toolbars and AV messages.

  1. People receive invitations from you on social media that you didn’t send.

Receiving another invitation from someone you already have as a friend on social media may be a trick of a hacker trying to get to you.

What to do: Do not accept until you confirm that the request is actually from that person. If you have been hacked, try changing your password.

  1. Your online password isn’t working

Suddenly, the same password you have been using all along online is no longer working. You checked and retyped it several times to no avail. This could mean your password has been changed by a hacker to keep you out.

What to do: Try other means of notifying your contacts in your account. Maybe you can try asking a friend to make a public post and share it on your account.  Secondly, report the account. By reporting the account, the online service may be able to help you by restoring your access.  If you are using the same password for other accounts, it will be wise to change to password in each of those accounts to minimize further compromises.

  1. There seem to be software installations that you did not initiate.

The appearance of software on your system that you did not install is a major sign that you have been hacked. These software comes as complements from other software, that way they cover themselves when you ticked the “ I agree” box after reading the license agreements( which most of us do not actually read).

What to do: Disable an program you do not recognize and reboot your computer. If you find some programs are needed for other software to function properly, it may mean that you have disabled a legimate software. In this case you can turn on the need ones.

  1. Your mouse seems to magically make selections in programs

Well, for this to happen it technically means your computer has been possessed…by a hacker that is.

What to do: If your computer suddenly comes out of sleep mode, take a few seconds to look at what is happening. I will give you an insight about what the hacker’s intentions are. Of course, you do not give them enough time to complete the job. A minute is enough. Immediately turn off your computer after that minute, disconnect your network. Such scenarios require professional help.

Using another computer, immediately change all user names and passwords. Check your bank account history and other accounts that is for any valuable. If you suffered a lost, make a report.

  1. Your antimalware, Task Manager or Registry Editor is disabled.

Is your antivirus software, Task Manager or Registry editor is disabled and you did not do it, then this is another major sign that you have been hacked.

What to do: Perform a complete system restore. If you want this to be last resort, you can try to find the malicious programs and disabled them. Of course, this isn’t easily done as said. Some malwares fight back and would not allow the software disable/uninstall. If this does not work, browse other means of restoration, then restart your computer in safe mode. After it is in safe mode, try one of the browsed methods of restoration.

  1. Money is missing from your account.

Zero balance? That is how hackers work. They do not hack for little or nothing, they take almost everything they can. Most times, such illegal transactions begins from your computer. They steal account information then use it to transfer money to themselves.

What to do: If reported immediately, your may bank be able to recover the money. Some courts have ruled that customers are responsible in case of such events. It is best for all customers to turn on transaction alerts for unusual logins and transactions. Also, customers can set thresholds and block all international transaction while notifying the bank to stop any transaction exceeding it unless they give permission.

  1. You have been notified about the hacking

In most cases, companies find it hard to figure out the hack until they have been notified by a third party.

What to do: Until confirmed, let your company place a pause on work. If you have been found to have been compromise, the follow your incident response plan. Don’t have one? Now will be a very good time to make you have one and practice with stalkholders in case of an emergency. Make sure everyone is in the loop about this.

  1. Confidential information has been leaked.

Imagine the media contacting you to confirm some classified information about the company. How did it get out there? Possibly a breach of company’s data.

What to do: First, confirm that the information is yours and that you been indeed hacked. If you have been compromise, start following the incident response plan immediately.

  1. Your password has been exposed

This type of hack does not show up as a notification of any sort. In order to know about this hack you have to visit password dump site or sites that help you to check if your password has been leaked.

What to do: Firstly, confirm that these credentials found are currently been used. If so, begin by using you incident response plan. It may help to figure out how the credentials left the site in the first place.

  1. You observe strange network traffic patterns

Compromises can also be notice by strange network patterns. It can be notice if the company is knowledgeable about severs and workstations communicate.

What to do: First off, kill any transfers until you have confirmed that it is authentic. Secondly, turn the network connection off and began using your incident response plan.

Prevention is always safer.

No antimalware has the power to detect all breaches and hacks. Keep an eye out for each of the signs, and all preventative steps possible. Most importantly, if your do not have an incident response plan, GET ONE NOW!