{"id":49175,"date":"2023-10-10T06:29:50","date_gmt":"2023-10-10T10:29:50","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=49175"},"modified":"2023-10-10T06:29:50","modified_gmt":"2023-10-10T10:29:50","slug":"what-to-do-if-someone-tries-to-hack-you","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/what-to-do-if-someone-tries-to-hack-you\/49175\/","title":{"rendered":"What to do if someone tries to hack you"},"content":{"rendered":"<p>We often write about how to prevent cybersecurity hazards and have given advice on more than one occasion about what to do if your <a href=\"https:\/\/www.kaspersky.com\/blog\/tips-for-hacked-account\/36760\/\" target=\"_blank\" rel=\"noopener nofollow\">account is hacked<\/a> or your <a href=\"https:\/\/www.kaspersky.com\/blog\/what-to-do-if-your-smartphone-is-stolen\/40148\/\" target=\"_blank\" rel=\"noopener nofollow\">mobile phone is stolen<\/a>. Today, let\u2019s tackle a more complex situation: someone is trying to hack or deceive you, but you\u2019re unsure about the extent of the problem. For example:<\/p>\n<ul>\n<li>You clicked a website link in an email or ad, but then had second thoughts and <em>became suspicious<\/em> about said link.<\/li>\n<li>Someone claiming to be from Microsoft called to <em>remove a virus<\/em> from your computer.<\/li>\n<li>You received an erroneous bill, called <em>customer support<\/em>, and they sent you a <em>helpful link to solve the problem<\/em> and avoid overpayment.<\/li>\n<\/ul>\n<p>What should you do to prevent hacking?<\/p>\n<h2>Don\u2019t give any more information<\/h2>\n<p>This is the first and most fundamental rule that you can apply without hesitation. If you get bad vibes from a website asking for your name, email, phone\u2026 or bank card information \u2014 close it immediately.<\/p>\n<p>If you\u2019re talking to someone on the phone \u2014 even if they claim to be from your bank or tech support \u2014 and the conversation seems even just a little strange, hang up <strong>immediately<\/strong> and don\u2019t answer if they call back. Scammers often employ elaborate schemes; they might call from a different number or contact you through an instant messenger \u2014 perhaps pretending to be someone else or from a different organization. Ignore them.<\/p>\n<p>If you\u2019re communicating through video conferencing tools like Zoom, end the meeting and close the application.<\/p>\n<h2>Disconnect your device from the internet<\/h2>\n<p>This is an essential point if you\u2019ve installed <strong>any<\/strong> applications at someone\u2019s request, or someone\u2019s done something on your computer using remote control tools \u2014 including Zoom, Skype, MS Teams, or Google Meet. If this is the case, there\u2019s a high probability that malware has been installed on your computer or smartphone. To prevent the criminals from controlling your device remotely, <strong>immediately disconnect<\/strong> your computer\/phone from the internet by turning off Wi-Fi and cellular data. The simplest and fastest way to do this is to activate Airplane Mode on your phone, or unplug the Ethernet cable if your computer is connected to the net via one.<\/p>\n<h2>Think about what the hackers might have learned<\/h2>\n<p>If you\u2019ve visited a suspicious website or talked on the phone, try to remember any information you entered on the site or shared with the caller. Address and name? Phone number? Bank card number? Password?<\/p>\n<p>If you only shared your name, address, and phone number, no further action is required, but stay on your guard \u2014 most likely the scammers will try to attack again based on your data, possibly using a different scam.<\/p>\n<p>The situation is worse if you\u2019ve shared more <em>sensitive<\/em> information, such as passwords, photos of personal documents, or banking information: in this case, follow the advice in the next two sections.<\/p>\n<h2>Change your passwords<\/h2>\n<p>Quickly log in to all services where the compromised password was used and change it to a new one \u2014 unique for each service. If you disconnected your device from the internet, use another device rather than plugging in the potentially infected one. Don\u2019t hesitate to ask your neighbors or co-workers for help if you don\u2019t have another device. Time is of the essence here \u2014 every minute counts. When accessing any services, enter the site address manually or open it through your browser bookmarks rather than clicking on links in recent emails.<\/p>\n<p>If the password you entered was for an online banking platform, a payment system, or any account containing money, simply changing the password is not enough \u2014 take the following steps to save your funds.<\/p>\n<h2>Contact your bank, credit bureau, or service provider<\/h2>\n<p>If you provided <strong>bank card numbers<\/strong> or other financial information, contact the bank immediately. You can usually block cards through a dedicated hotline, as well as through the mobile application and your personal account on the website. For other types of data, such as bank account details, consult with specialists from the bank or online service about protective measures to take. Don\u2019t wait for a call from the bank \u2013 they could be scammers; call the number listed on the bank\u2019s website or mobile application yourself.<\/p>\n<p>If you\u2019ve shared <strong>extensive personal information<\/strong> or <strong>photographs of documents<\/strong>, malicious actors may use this data fraudulently, such as to apply for loans. To prevent this from happening, contact the credit bureau and inquire about available protective measures you can take. These measures vary from country to country \u2014 see these examples for the <a href=\"https:\/\/consumer.ftc.gov\/articles\/what-know-about-credit-freezes-fraud-alerts\" target=\"_blank\" rel=\"nofollow noopener\">U.S.A<\/a>., <a href=\"https:\/\/www.sperr-notruf.de\/\" target=\"_blank\" rel=\"nofollow noopener\">Germany<\/a>, and <a href=\"https:\/\/www.cbr.ru\/eng\/press\/event\/?id=12939\" target=\"_blank\" rel=\"nofollow noopener\">Russia<\/a> \u2014 but typically include setting up notifications for any inquiries about your credit history (checking your credit history is the first step in applying for a loan), blocking new inquiries, or self-banning credit issuance \u2014 making it impossible to obtain a loan in your name.<\/p>\n<h2>Check your computer<\/h2>\n<p>If you followed our advice and disconnected your computer from the internet due to potential infection, thoroughly check it for malware or potentially unsafe software <strong>before<\/strong> reconnecting to the network. If you already have a comprehensive protection system installed, such as <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Premium<\/a>, ensure that the protection databases have been updated recently and all protection and scanning technologies are enabled, and then run a full scan. It\u2019s crucial to run the deepest possible scan, applying settings that can detect not only malware but also potentially dangerous software such as remote control tools. Remove any detected malware according to the instructions of the security application.<\/p>\n<p>What should you do if your computer lacks protection or if the protection databases are outdated? Use another computer to download protection from the manufacturer\u2019s official website, then transfer the installation files across using a USB flash drive.<\/p>\n<h2>Check for any suspicious activity<\/h2>\n<p>After taking all the steps described above, make sure that the attackers haven\u2019t managed to do anything harmful with the potentially compromised accounts. If these are online store or bank accounts, check your recent purchases. If you see any purchases you didn\u2019t make, try to cancel them by contacting the online store\/bank.<\/p>\n<p>On social networks, check recent posts, new friends, photo album content, and so on. In messaging apps, check your recent chats to make sure no fraudulent messages were sent from your account.<\/p>\n<p>For all accounts, verify your contact information, name, profile picture, address, and payment information. If you notice any changes, it means the account has been compromised; change your password and, if possible, secure the account with two-factor authentication.<\/p>\n<p>Be sure to check the information about which devices are linked to your accounts with online services, social networks, and messaging apps. Having hacked an account, attackers try to maintain access to it \u2014 for example, by linking their device to it. Depending on the service, this connection might persist even after you change your password. Therefore, it\u2019s crucial to ensure that you recognize all devices and active sessions listed in the \u201cSecurity\u201d section (this section might be called \u201cDevices\u201d, \u201cConnected devices\u201d, \u201cRecent sessions\u201d, and so on, depending on the specific service). Next to the name of the connected device, there\u2019s usually a button to \u201cDisconnect device\u201d or \u201cEnd session\u201d, allowing you to kick out any strangers. If you cannot identify any devices and\/or sessions listed, disconnect them after making sure you remember your updated password. You\u2019ll have to re-log-in to your accounts with the new password (you changed the password, didn\u2019t you?) \u2014 but now the attackers won\u2019t have access.<\/p>\n<p>The hardest thing to deal with is the consequences of an email hack. Firstly, besides all the above, you\u2019ll have to check the mail forwarding rules. Make sure that neither your mailbox settings nor your message processing rules have forwarding of your emails to third-party addresses enabled. Secondly, if any other service accounts are linked to your email, attackers can hack into most of them. If you find any signs that your email has been tampered with, you\u2019ll need to check for suspicious activity and change the password on all services linked to that email address.<\/p>\n<h2>Prevention is better than cure<\/h2>\n<p>Following the advice above requires a significant amount of time, effort, and patience. To minimize the risks of fraud as much as possible, it\u2019s best to take precautionary measures in advance.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-theft-proof-your-smartphone\/40090\/\" target=\"_blank\" rel=\"noopener nofollow\">Protect your smartphone from potential theft or loss<\/a>.<\/li>\n<li>Use unique passwords and two-factor authentication for every account. <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">A password manager with a built-in authenticator<\/a> will help you <a href=\"https:\/\/www.kaspersky.com\/blog\/make-your-passwords-stronger-with-kaspersky-password-manager\/40269\/\" target=\"_blank\" rel=\"noopener nofollow\">create new unique passwords<\/a> and store both the <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-store-passwords-securely\/48784\/\" target=\"_blank\" rel=\"noopener nofollow\">passwords <\/a>and the <a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-password-manager-authenticator\/48841\/\" target=\"_blank\" rel=\"noopener nofollow\">authentication tokens<\/a>.<\/li>\n<li>Install a <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">comprehensive security system<\/a> on all your computers and smartphones. This will prevent most phishing and fraud attempts through malicious emails and links.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>You&#8217;ve interacted with scammers or visited a phishing site. What steps should you take to avoid being hacked?<\/p>\n","protected":false},"author":2722,"featured_media":49176,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[1218,3917,305,722,80,1147,405,187,76,1121,422,131],"class_list":{"0":"post-49175","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-2fa","9":"tag-account-hacking","10":"tag-account-security","11":"tag-banks","12":"tag-fraud","13":"tag-kaspersky-password-manager","14":"tag-password-manager","15":"tag-passwords","16":"tag-phishing","17":"tag-secure-payments","18":"tag-threats","19":"tag-tips"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/what-to-do-if-someone-tries-to-hack-you\/49175\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/what-to-do-if-someone-tries-to-hack-you\/26326\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/what-to-do-if-someone-tries-to-hack-you\/21759\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/what-to-do-if-someone-tries-to-hack-you\/29003\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/what-to-do-if-someone-tries-to-hack-you\/26609\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/what-to-do-if-someone-tries-to-hack-you\/26753\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/what-to-do-if-someone-tries-to-hack-you\/29244\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/what-to-do-if-someone-tries-to-hack-you\/28099\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/what-to-do-if-someone-tries-to-hack-you\/36241\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/what-to-do-if-someone-tries-to-hack-you\/21088\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/what-to-do-if-someone-tries-to-hack-you\/21868\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/what-to-do-if-someone-tries-to-hack-you\/30563\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/what-to-do-if-someone-tries-to-hack-you\/34959\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/what-to-do-if-someone-tries-to-hack-you\/28911\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/what-to-do-if-someone-tries-to-hack-you\/26904\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/what-to-do-if-someone-tries-to-hack-you\/32612\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/what-to-do-if-someone-tries-to-hack-you\/32267\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/tips\/","name":"tips"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/49175","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=49175"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/49175\/revisions"}],"predecessor-version":[{"id":49182,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/49175\/revisions\/49182"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/49176"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=49175"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=49175"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=49175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}