Blog | G5 Cyber Security

Remote Access Attack: What to Do

TL;DR

An hour of attacker access is serious, but a full reset of all 9 devices isn’t necessarily the first step. Focus on identifying *how* they got in and securing that point. Then, scan your main computer thoroughly. Other devices are lower priority unless you know they were directly targeted.

1. Isolate the Affected Computer

Immediately disconnect the computer attackers accessed from the internet. Unplug the network cable or disable Wi-Fi. This stops them sending data out and prevents further control.

2. Identify How They Got In (Crucial Step)

This is the most important part! Think carefully about what you were doing before the attack:

Check your browser history for unusual websites. Look at recently installed programs.

3. Scan Your Main Computer

Run a full scan with reputable anti-malware software. Here are some options:

Update the anti-malware software *before* running the scan to ensure it has the latest definitions.

# Example using Windows Defender (PowerShell)
Start-MpScan -ScanType FullScan

4. Change Passwords

Change passwords for *all* important accounts, especially:

Use strong, unique passwords (at least 12 characters with a mix of letters, numbers and symbols). Consider using a password manager.

5. Check for Backdoors

Attackers sometimes install backdoors to regain access later. This is harder to detect:

6. Assess Other Devices

Unless you have evidence that other devices were directly targeted (e.g., they also showed signs of compromise or used the same weak password), a full reset is probably not needed *yet*.

7. Consider a Reset (If Necessary)

If you can’t confidently identify the entry point or suspect widespread compromise, resetting your main computer to factory settings is the safest option. Back up important data *before* resetting, but be aware that backups could also contain malware.

8. Report the Incident

Report the attack to your local cyber security authority or police. This helps them track and prevent future attacks.

Exit mobile version