The Fight Against The Attackers Continues
For those who haven’t read it before, I suggest you take a look at my part 1 article.
Our struggle continues to prevent attackers from harming you. If you haven’t encountered any suspicious behavior until this step, you’re lucky. But we will continue until we are sure that your device is clean.
View Malicious Traffic
After your device is compromised, there must be outward traffic for your information to be stolen. In this way, attackers gain leverage to blackmail or harm you. Windows-based tools are available to view this network traffic. One of the most well-known of these is the Network Traffic View.
With this tool you can control the traffic to and from your device. Your device can communicate with different threads even if you do not engage in any activity, this is normal. But you should check whether it is bad reputation by searching for the threads it communicates with on sites such as virustotal and abuseip one by one.
Apart from all these controls, if you are experiencing the following situations, there is a high probability that you have been hacked.
- Friends and contacts receive strange messages from you.
- Passwords aren’t working.
- Unwanted browser toolbars, search redirection and popup ads.
Thank you for reading. Stay secure.