DO |
DON'T |
|
|
You should store as much evidence as possible. The best way for this is to shut it down and let the professional specialist to the job. |
Every second of struggle-out is giving hackers a chance to wipe all the evidence out. |
IMPORTANT: Before the reporting make sure that you really (I mean REALLY) sure that you are under attack. Agency is getting hundreds of thousands of requests a year. The major portion of them is actually not related to cybercrime. |
Police are working over the specific location, also called Jurisdiction. |
You should store as much evidence as possible. For All Apple Devices - Contact and Visit the nearby Apple's Genius Bar For All Windows and Android Devices - Check the closest computer store with Customer Support. For instance, Best Buy has Geeks team available for that. |
This is exactly what hackers need. |
Ideally, the hacked device is evidence of someone's illegal activity. It should be stored and given at a certain moment to a law enforcement agency. However, you need a mobile phone and computer to communicate with your friends, family colleagues. If you can - you should buy something new. If you can't buy a new one - you should re-install all the compromised devices from scratch. However, first things first - backup all evidence to the external hard-drive. If you need to do something immediately - use the nearest library, there must be computer stations available for everybody. |
More time you are using your hacked device - more chances you are giving to hackers to get your personal information: ids, social security, credit cards, photos, videos, documents, and all your friends and family contact information. This way, the attack can go on, spreading through the people you trust and value more than others. |
Inform everyone that hackers are operating your devices. It will save a lot of time, nerves and money for everyone. Moreover, there can be people who can volunteer and help you with this problem. Nobody knows the real power of their network unless they try it, right? |
Don't tell anyone about the attack, so they'll be surprised when hackers will start sending them messages from you asking for financial support. They will be even more surprised when they'll open a link sent from your device and will get compromised or Identity theft. |
ATTENTION! Make sure that you are accessing your online accounts from the safe environment. Don't use hacked devices to change your passwords - this action will have no sense, moreover, it will grant intruders with your new passwords, so you will just waste a time. Using new devices - change all the passwords starting from the most critical iCloud, Gmail, Dropbox, etc. |
That's definitely what has a special value for hackers. Online accounts, especially iCloud, Google, Gmail, Outlook, Yahoo tall of them and any of them is a gold mine of personal information, confidential information, identity, passwords, keys. Through it, they can dig down to get access to other accounts, for instance to the bank account. |
It's just common sense. No-one will store their money on the open space, right? There are banks for this, right? Keep keys and passwords in a specific system like iCloud Keychain (we recommend it for iOS, MacOS Users) or one of these solutions reviewed by CNET. Gmail, Yahoo - great services for e-mail storing. By the way, they are providing the history of IP addresses, which accessed every specific account. [HINT: we've got a good portion of blackhats screwed there] So, let's switch to safe storages. Actually, we are normally recommending the local SAN storage. Simply speaking if you heard about Apple TimeCapsule - that's SAN. There is an overview of SAN solutions from PCMag. Finally, there is a wide variety of Cloud storages. You can read about the best for this year reviewed by PCMag here. Finally, to keep all this safe you have to change all these passwords. HINT: start with a keychain or other analogues. It will save your time to save all these new passwords. |
If no one is asking for money, then the objective wasn't about ransoming attacked person. In some cases, they are aiming documents, contractual relationships or just get your systems down, so you won't be able to do something. |
Be cyber-careful!
Be info-aware!
Be safe!