The Fight Against The Attackers Continues

For those who haven’t read it before, I suggest you take a look at my part 1 article.

Our struggle continues to prevent attackers from harming you. If you haven’t encountered any suspicious behavior until this step, you’re lucky. But we will continue until we are sure that your device is clean.

View Malicious Traffic

After your device is compromised, there must be outward traffic for your information to be stolen. In this way, attackers gain leverage to blackmail or harm you. Windows-based tools are available to view this network traffic. One of the most well-known of these is the Network Traffic View.

With this tool you can control the traffic to and from your device. Your device can communicate with different threads even if you do not engage in any activity, this is normal. But you should check whether it is bad reputation by searching for the threads it communicates with on sites such as virustotal and abuseip one by one.

Apart from all these controls, if you are experiencing the following situations, there is a high probability that you have been hacked.

  • Friends and contacts receive strange messages from you.

Thank you for reading. Stay secure.




Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Orhan Öztaş

Blue Team Member. I am writing articles for helping you about cyber security.