In today's threatscape, antimalware software provides little peace of mind. In fact, antimalware scanners are horrifically inaccurate, especially with exploits less than 24 hours old. Malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable. All you have to do is drop off any suspected malware file at Google\u2019s VirusTotal, which has over 60 different antimalware scanners, to see that detection rates aren\u2019t all as advertised.\n\nTo combat this, many antimalware programs monitor program behaviors, often called heuristics, to catch previously unrecognized malware. Other programs use virtualized environments, system monitoring, network traffic detection and all of the above to be more accurate. Still they fail us on a regular basis. If they fail, you need to know how to spot malware that got through.\n\nHow to know if you've been hacked\n\nHere are 15 sure signs you've been hacked and what to do in the event of compromise.\n\nNote that in all cases, the number 1 recommendation is to completely restore your system to a known good state before proceeding. In the early days, this meant formatting the computer and restoring all programs and data. Today, it might simply mean clicking on a Restore button. Either way, a compromised computer can never be fully trusted again. Follow the recommended recovery steps listed in each category below if you don't want to do a full restore. Again, a full restore is always a better option, risk-wise.\n\n1. You get a ransomware message\n\nOne of the worst messages anyone can see on their computer is a sudden screen take-over telling them all their data is encrypted and asking for a payment to unlock it. Ransomware is huge! After a slight decrease in activity in 2017, ransom-asking programs have come roaring back. Billions of dollars in productivity is being lost and billions in ransom are being paid. Small businesses, large businesses, hospitals, police stations and entire cities are being brought to a halt by ransomware. About 50% of the victims pay the ransom, ensuring that it isn\u2019t going away anytime soon.\n\nUnfortunately, according to cybersecurity insurance firms who are often involved in the payouts, paying the ransom does not result in working systems about 40% of the time. Turns out that ransomware programs aren\u2019t bug free and unlocking indiscriminately encrypted linked systems isn\u2019t as easy as putting in a decryption key. Most victims end up with many days of downtime and additional recovery steps even if they do pay the ransom.\n\nWhat to do: First, if you\u2019ve got a good, recent, tested data backup of the impacted systems, all you have to do is restore the involved systems and fully verify (officially called unit testing) to make sure the recovery was 100%. Sadly, most companies don\u2019t have the great backups that they thought they had. Test your backups! Don\u2019t let ransomware be the first time your company\u2019s critical backups are being tested.\n\nThe best protection is to make sure you have good, reliable, tested, offline backups. Ransomware is gaining sophistication. The bad guys using malware are spending time in compromised enterprise environments figuring how to do the most damage, and that includes encrypting or corrupting your recent online backups. You are taking a risk if you don\u2019t have good, tested, backups that are inaccessible to malicious intruders.\n\nIf you belong to a file storage cloud service, it probably has backup copies of your data. Don\u2019t be overly confident. Not all cloud storage services have the ability to recover from ransomware attacks, and some services don\u2019t cover all file types. Consider contacting your cloud-based file service and explain your situation. Sometimes tech support can recover your files, and more of them, than you can yourself.\n\nLastly, several websites may be able to help you recover your files without paying the ransom. Either they\u2019ve figured out the shared secret encryption key or some other way to reverse-engineer the ransomware. You will need to identify the ransomware program and version you are facing. An updated antimalware program might identify the culprit, although often all you have to go on is the ransomware extortion message, but that is often enough. Search on that name and version and see what you find.\n\n2. You get a fake antivirus message\n\nYou get a popup message on your computer or mobile device that it is infected. The pop-up message pretends to be an antivirus scanning product and is purporting to have found a dozen or more malware infections on your computer. Although this isn\u2019t near as popular as it used to be, fake antivirus warning messages are still a situation that has to be dealt with in the right way.\n\nThey can occur because of two reasons: Either your system is already compromised or it is not compromised beyond the pop-up message. Hope for the latter. These types of fake antivirus messages usually have figured out a way to lock up your browser so that you can\u2019t get out of the fake message without killing the browser and restarting it.\n\nWhat to do: If you get lucky, you can close the tab and restart the browser and everything is fine. The fake message doesn\u2019t show back up. It was a one-time fluke. Most of the time you\u2019ll be forced to kill the browser. Restarting it sometimes reloads the original page that forced the fake ad onto you, so you get the fake AV ad again. If this happens, restart your browser in incognito or inprivate mode, and you can browse to a different page and stop the fake AV message from appearing.\n\nThe worse scenario is that the fake AV message has compromised your computer (usually due to social engineering or unpatched software). If this is the case, power down your computer. If you need to save anything and can do it, do so before powering down. Then restore your system to a previous known clean image. Most operating systems have reset features built especially for this.\n\nNote: A related scam is the technical support scam where an unexpected browser message pops up warning that your computer has been compromised and to call the toll-free number on your screen to get technical support help. Often the warning claims to be from Microsoft (even if you\u2019re using an Apple computer). These tech support scammers than ask you to install a program, which then gives them complete access to your system. They will run a fake antivirus, which not surprisingly, finds lots of viruses. They then sell you a program to fix all your problems. All you need to do is give them a credit card to start the process. Luckily, these types of scam warnings can usually be defeated by rebooting your computer or closing your browser program and avoiding the website that hosted it upon you. Rarely has this type of malware done anything to your computer that requires fixing.\n\nIf you fall for one of these tech support scams and you gave them your credit card, immediately report it to your credit card company and get a new credit card. Reset your PC as instructed above if you give the imposter tech support person remote access to your computer.\n\n3. You have unwanted browser toolbars\n\nThis is a common sign of exploitation: Your browser has multiple new toolbars with names that seem to indicate the toolbar is supposed to help you. Unless you recognize the toolbar as coming from a well-known vendor, it's time to dump the bogus toolbar.\n\nWhat to do: Most browsers allow you to review installed and active toolbars. Remove any you didn't want to install. When in doubt, remove it. If the bogus toolbar isn't listed there or you can't easily remove it, see if your browser has an option to reset the browser back to its default settings. If this doesn't work, follow the instructions listed above for fake antivirus messages.\n\nYou can usually avoid malicious toolbars by making sure that all your software is fully patched and by being on the lookout for free software that installs these tool bars. Hint: Read the licensing agreement. Toolbar installs are often pointed out in the licensing agreements that most people don't read.\n\n4. Your internet searches are redirected\n\nMany hackers make their living by redirecting your browser somewhere you don\u2019t want to go. The hacker gets paid by getting your clicks to appear on someone else's website. They often don't know that the clicks to their site are from malicious redirection.\n\nYou can often spot this type of malware by typing a few related, very common words (for example, "puppy" or "goldfish") into internet search engines and checking to see whether the same websites appear in the results \u2014 almost always with no relevance to your terms. Unfortunately, many of today's redirected internet searches are well hidden from the user through use of additional proxies, so the bogus results are never returned to alert the user.\n\nIn general, if you have bogus toolbar programs, you're also being redirected. Technical users who really want to confirm can sniff their own browser or network traffic. The traffic sent and returned will always be distinctly different on a compromised computer vs. an uncompromised computer.\n\nWhat to do: Follow the same instructions as for removing bogus toolbars and programs. Usually this is enough to get rid of malicious redirection. Also, if on a Microsoft Windows computer check your C:WindowsSystem32driversetchosts file to see if there are any malicious-looking redirections configured within. The hosts file tells your PC where to go when a particular URL is typed in. It\u2019s hardly used anymore. If the filestamp on the host files is anything recent, then it might be maliciously modified. In most cases you can simply rename or delete it without causing a problem.\n\n5. You see frequent, random popups\n\nThis popular sign that you've been hacked is also one of the more annoying ones. When you're getting random browser pop-ups from websites that don't normally generate them, your system has been compromised. I'm constantly amazed by which websites, legitimate and otherwise, can bypass your browser's anti-pop-up mechanisms. It's like battling email spam, but worse.\n\nWhat to do: Not to sound like a broken record, but typically random pop-ups are generated by one of the three previous malicious mechanisms noted above. You'll need to get rid of bogus toolbars and other programs if you even hope to get rid of the pop-ups.\n\n6. Your friends receive social media invitations from you that you didn\u2019t send\n\nWe\u2019ve all seen this one before. Either you or your friends receive invitations to \u201cbe a friend\u201d when you are already connected friends on that social media site. Usually, you\u2019re thinking, \u201cWhy are they inviting me again? Did they unfriend me and I didn\u2019t notice, and now they are re-inviting me.\u201d Then you notice the new friend\u2019s social media site is devoid of other recognizable friends (or maybe just a few) and none of the older posts. Or your friend is contacting you to find out why you are sending out new friend requests. In either case, the hacker either controls your social media site, has created a second near-look-alike bogus page, or you or the friend has installed a rogue social media application.\n\nWhat to do: First, warn other friends not to accept the unexpected friend request. Say something like, \u201cDon\u2019t accept that new invitation from Bridget. I think she\u2019s hacked!\u201d. Then contact Bridget some other way to confirm. Spread the news in your common social media circles. Next, if not first, contact the social media site and report the site or request as bogus. Each site has its own method for reporting bogus requests, which you can find by searching through their online help. It\u2019s often as easy as clicking on a reporting button. If your social media site is truly hacked (and it isn\u2019t a second bogus look-alike page), you\u2019ll need to change your password (refer to the help information on how to do this if you don\u2019t).\n\nBetter yet, don\u2019t waste time. Change to multi-factor authentication (MFA). That way the bad guys (and rogue apps) can\u2019t as easily steal and take over your social media presence. Lastly, be leery of installing any social media application. They are often malicious. Periodically inspect the installed applications associated with your social media account\/page and remove all but the ones you truly want to have there.\n\n7. Your online password isn\u2019t working\n\nIf you are typing in your online password correctly, for sure, and it isn\u2019t working, then you might be hacked. I usually try again in 10 to 30 minutes, because I\u2019ve had sites experiencing technical difficulties not accept my valid password for a short period of time. Once you know for sure that your current password is no longer working, it's likely that a rogue hacker has logged in using your password and changed it to keep you out.\n\nWhat usually happens in this scenario is that the victim responded to an authentic-looking phishing email that purportedly claimed to be from the service. The bad guy uses it to collect the logon information, logs on, changes the password (and other information to complicate recovery), and uses the service to steal money from the victim or the victim's acquaintances (while pretending to be the victim).\n\nWhat to do: If the scam is widespread and many of your acquaintances have been contacted, immediately notify all your close contacts about your compromised account. This will minimize the damage being done to others by your mistake. Second, contact the online service to report the compromised account. Most online services now have easy methods or email contact addresses to report compromised accounts. If you report your account as compromised, usually the service will do the rest to help you restore your legitimate access. Also, consider enacting MFA.\n\nIf the compromised logon information is used on other websites, immediately change those passwords. Be more careful next time. Websites rarely send emails asking you to provide your logon information. When in doubt, go to the website directly (don't use the links sent to you in email) and see if the same information is being requested when you log on using the legitimate method. You can also call the service via its phone line or email them to report the received phish email or to confirm its validity.\n\n8. You observe unexpected software installs\n\nUnwanted and unexpected software installs are a big sign that your computer has been hacked. In the early days of malware, most programs were computer viruses, which work by modifying other legitimate programs. They did this to better hide themselves. Most malware programs these days are Trojans and worms, and they typically install themselves like legitimate programs. This may be because their creators are trying to walk a very thin line when the courts catch up to them. They can attempt to say something like, "But we are a legitimate software company."\n\nThe unwanted software is often legally installed by other programs, so read your license agreements. Frequently, I'll read license agreements that plainly state that they will be installing one or more other programs. Sometimes you can opt out of these other installed programs; sometimes you can't.\n\nWhat to do: There are many programs that will show you all your installed programs and let you selectively disable them. My favorite checkers for Microsoft Windows are Microsoft\u2019s free programs, Autoruns or Process Explorer. They don't show you every program installed but they will tell you the ones that automatically start themselves when your PC is restarted (Autoruns) or the ones currently running (Process Explorer).\n\nMost malware programs will be found embedded in the much larger list of legitimate running programs. The hard part can be determining what is and what isn't legitimate. You can enable the \u201cCheck VirusTotal.com\u201d options, and the programs, along with Google\u2019s Virustotal.com web site, will tell you which ones it thinks are malware. When in doubt, disable the unrecognized program, reboot the PC, and re-enable the program only if some needed functionality is no longer working.\n\n9. Your mouse moves between programs and makes selections\n\nIf your mouse pointer moves itself while making selections that work (this is the important part), you've definitely been hacked. Mouse pointers often move randomly, usually due to hardware problems. If the movements involve making choices to run particular programs, malicious humans are somewhere involved.\n\nThis technique is not as common as some other attacks. Hackers will break into a computer, wait for it to be idle for a long time (like after midnight), then try to steal your money. Hackers will break into bank accounts and transfer money, trade your stocks, and do all sorts of rogue actions, all designed to lighten your cash load.\n\nWhat to do: If your computer "comes alive" one night, take a minute before turning it off to determine what the intruders are interested in. Don't let them rob you, but it will be useful to see what they are looking at and trying to compromise. Take a few pictures to document their tasks. When it makes sense, power off the computer. Unhook it from the network (or disable the wireless router) and call in the professionals. This is the one time that you're going to need expert help.\n\nUsing another known good computer, immediately change all your other logon names and passwords. Check your bank account transaction histories, stock accounts and so on. Consider paying for a credit-monitoring service. If you've been a victim of this attack, you have to take it seriously. Complete restore of the computer is the only option you should choose for recovery. If you've lost any money, make sure to let the forensics team make a copy first. If you've suffered a loss, call law enforcement and file a case. You'll need this information to best recover your real money losses, if any.\n\n10. Antimalware, Task Manager or Registry Editor is disabled\n\nThis is a huge sign of malicious compromise. If you notice that your antivirus software is disabled and you didn't do it, you're probably exploited \u2014 especially if you try to start Task Manager or Registry Editor and they won't start, start and disappear, or start in a reduced state.\n\nWhat to do: Perform a complete restore because there is no telling what has happened. If you want to try something less drastic first, if on a Windows computer, try running Microsoft Autoruns or Process Explorer (or similar programs) root out the malicious program causing the problems. They will usually identify your problem program, which you can then uninstall or delete.\n\nIf the malware \u201cfights back\u201d and won\u2019t let you easily uninstall it, research the many methods on how to restore the lost functionality (any internet search engine will return lots of results), then restart your computer in Safe Mode and start the hard work. I say "hard work" because usually it isn't easy or quick. Often, I have to try a handful of different methods to find one that works. Precede restoring your software by getting rid of the malware program using the methods listed above.\n\n11. Your online account is missing money\n\nI mean lots of money. Online bad guys don't usually steal a little money. They like to transfer everything or nearly everything, often to a foreign exchange or bank. Usually it begins by your computer being compromised or from you responding to a fake phish from your bank or stock trading company. The bad guys log on to your account, change your contact information, and transfer large sums of money to themselves.\n\nWhat to do: In most cases you are in luck because most financial institutions will replace the stolen funds (especially if they can stop the transaction before the damage is truly done). However, there have been cases where the courts have ruled it was the customer's responsibility not to be hacked, and it's up to the financial institution to decide whether they will make restitution to you.\n\nTo prevent this from happening in the first place, turn on transaction alerts that send text alerts to you when something unusual is happening. Many financial institutions allow you to set thresholds on transaction amounts, and if the threshold is exceeded or it goes to a foreign country, you'll be warned. Unfortunately, many times the bad guys reset the alerts or your contact information before they steal your money. So, make sure your financial or trading institution sends you alerts anytime your contact information or alerting choices are changed.\n\n12. You\u2019ve been notified by someone you\u2019ve been hacked\n\nOne of the top ways that any organization finds out they have been successfully compromised is notification by an unrelated third party. This has been the case since the beginning of computers and continues to be true. Verizon\u2019s respected Data Breach Investigations Report has revealed that more companies were notified that they were hacked by unrelated third parties than organizations that recognized their own compromises. In July 2019, Microsoft revealed that it had detected nation-state attacks against over 10,000 of its customers since the beginning of the year.\n\nWhat to do: First, figure out if you have truly been hacked. Make sure everyone slows down until you confirm that you have been successfully compromised. If confirmed, follow your predefined incident response plan. You have one, right? If not, make one now and practice with stakeholders. Make sure that everyone knows that your IR plan is a thoughtful plan that must be followed. You don\u2019t want anyone going off on their own hunting parties or anyone inviting more people \u201cto the party\u201d before it\u2019s decided who needs to be involved. Your biggest challenge is going to be actually having people follow the plan in an emergency. Communicate and practice, ahead of time.\n\n13. Confidential data has been leaked\n\nNothing confirms you\u2019ve been hacked like your organization\u2019s confidential data sitting out on the internet or dark web. If you didn\u2019t notice it first, then likely the media and other interested stakeholders will be contacting your organization to confirm or find out what you are doing about it.\n\nWhat to do: Like the previous sign, first find out if it\u2019s true that it is really your confidential data out there. In more than a few cases, hackers have claimed to compromise a company\u2019s data but didn\u2019t have anything confidential. Either they made up the claim and data, only had publicly available data, or they had some other company\u2019s data. So, first confirm.\n\nIf it is your organization\u2019s confidential data, it\u2019s time to tell senior management, begin the IR process, and figure out what needs to be communicated to whom by when. In many countries and states, the legal requirement to report compromised customer data can be as short as 72 hours, and many times you won\u2019t even be able to confirm the leak or how it happened in 72 hours. It goes without saying that you need to get legal involved.\n\n14. Your credentials are in a password dump\n\nLiterally billions of valid (at least at one time) logon credentials are on the internet and dark web. They have usually been compromised by phishing, malware or website database breaches. You will not usually be notified by third parties as is the case with other types of data leaks. You have to proactively look out for this sort of threat. The sooner you know this sort of thing has happened the better.\n\nYou can check for compromised credentials one at a time using various websites (like Have I Been Pwned), check across multiple accounts using various free open source intelligence tools (like The Harvester), free commercial tools (like KnowBe4\u2019s Password Exposure Test), or any of the commercial services that look for your company\u2019s data and credentials all the time for a fee.\n\nWhat to do: After first confirming whether the dump contains any currently used credentials, reset all your logon credentials. Start an IR process to see if you can figure out how your organization\u2019s logon credentials ended up outside the company. Also, implement MFA.\n\n15. You observe strange network traffic patterns\n\nMany a compromise was first noticed by strange, unexpected network traffic patterns. It could have been a bad distributed denial of service (DDoS) attack against your company\u2019s web servers or large, expected file transfers to sites in countries you do not do business with. If more companies understood their legitimate network traffic patterns there would less need for a third party to tell them they are compromised. It\u2019s good know that most of the servers in your company don\u2019t talk to other servers in your company. Most servers in your company don\u2019t talk to every workstation in your company and vice-versa. Most workstations in your company should not be using non-HTTP\/non-HTTPS protocols to talk directly to other places on the internet.\n\nWhat to do: If you see unexpected, strange traffic that you cannot explain, it\u2019s probably best to kill the network connection and start an IR investigation. Years ago, we probably would have said to err on the side of operational caution. Today, you can\u2019t take any chances. Kill any suspicious transfers until they are proven legitimate.\n\nIf you don\u2019t understand your valid network traffic, you need to do so. Dozens of tools are designed to help you better understand and document your network traffic. I would recommend checking out the free, open-source alternatives like Bro and Snort, but both require a lot of time, resources and research to use effectively. Instead, find a good commercial solution that has already done all the hard work for you.\n\nPrevention is the best cure\n\nThe hope that an antimalware program can perfectly detect malware and malicious hacking is pure folly. Keep an eye out for these common signs and symptoms of your computer being hacked. If you are risk-adverse, as I am, always perform a complete computer restore with the event of a breach. Once your computer has been compromised, the bad guys can do anything and hide anywhere. It's best to just start from scratch.\n\nMost malicious hacking originates from one of three vectors: running Trojan horse programs, unpatched software, and responding to fake phishing emails. Do better at preventing these three things, and you'll be less likely to have to rely on your antimalware software's accuracy -- and luck.