What Should You Do When You Click A Link And Get Hacked?

Sometimes lack of knowledge, sometimes inattention… We’ve all at least once accidentally clicked or felt like clicking on a link that contains malware. In this article, we discuss the question “So what should we do in such a situation?”

Sometimes after clicking with links where all our information will be captured we meet. While some of us recognize these links immediately because there are so many hacking incidents, some of us may be far from these issues.

We wondered if we could protect our information after clicking on such a link. Cyber ​​security expert Yasir Gokce I talked to him and asked him some questions about the subject. So let’s see together how we can protect ourselves from these spyware links.

Here are Yasir Gökçe’s answers:

What happens to us when we click on a link that contains malware depends on the intention of the person sending the link.

The proxy the link is linked to may be an adware or clickbait. This is us to a site we do not want, advertising, etc. for the purpose can direct. This is the most innocent thing that can happen to us. The network to which our computer is connected may be infected by a worm or a malicious software such as trojan and virus may be installed on our information system.

This software is in our system in accordance with the purpose of coding. CPU, RAM, memory can consume resources such as It can provide a backdoor to our system, hijack our saved passwords, or make our network part of a botnet.

In this last scenario, the cybercriminal can use our information system as a tool in the next cyber crimes he will commit. In other words, cyber attack or computer crime belongs to your system. originates from IP or MAC address it might look like.

The most important indicator that a link contains malware is the mismatch between what prompted you to click the link and what happens after you click the link.

for example with a promise to receive a gift certificate If you have not made such a profit after clicking on a link, you can assume that the link contains malicious intent.

In addition, the link leads to pages you do not want, opens more than one page, unintentionally downloads to your computer / system after clicking, opens pop-up windows that prompt you to a certain action, means that it is not a good software.

There will also be long-term effects. Decreased performance of your computer, uploading files you didn’t notice before, like changing filenames and locations.

Let’s say we clicked on the link, our information was also captured and transferred to the dark web. What can happen to us in this case differs according to the ‘what is’ of the data transferred to the dark web.

being hacked

Personal information such as name, surname, date of birth, which can be arranged for you later social engineering attacks can detail.

Again, passwords for accessing different platforms can open the door to identity theft, which we call identity theft. Theft of access passwords to access the online services of financial institutions. you directly suffer material damage. it causes.

Now let’s tell you what to do after clicking on a link unintentionally or unintentionally;

I clicked the link

  • First of all, the opened pages should be closed immediately, in pop-up windows we should ignore the directions and directions.
  • the relevant information system immediately. from the internet We must separate.
  • If necessary, we can also use other critical devices connected to the same network. We must disconnect it from the network.
  • which allows us to connect to the Internet network (WAN, VLAN, etc.) access passwords We must renew.
  • You can get the latest logs from the control panel of the router that provides internet access and save them. We can save it by considering every possibility.
  • These logs will be saved if a crime has been committed with our system. To prove that we are not failures is important.
  • If there is a suspicion that a crime has been committed with the system we clicked on, or if the system may be subject to any administrative, judicial or criminal investigation, the system will be removed from the system. with digital forensic (forensic informatics) analysis method We shouldn’t shut down the system to get evidence.
  • system connected to power we must keep
  • If we suspect that a crime has been committed with the system we clicked on, discuss the issue. cybercrime bureau and prosecution should be forwarded to the relevant authorities, such as
  • If we clicked on the link from a device belonging to the company we are working with, information security team We must report.
  • Considering every possibility, our sensitive or important data registered in the system to an external disk We must store.
  • Preferably, the data that does not need to stay in the system we can delete it.
  • The relevant information system is up-to-date antivirus program should be scanned with We should apply this process in case of what happens to the external disk where we store the data.
  • open on our computer or “trust this computer” We must log out (log out) from e-mail accounts, social media accounts or communication apps that we give the command (Single-sign-on).
  • Change the access passwords for these accounts from another trusted system, and multi-factor authentication (MFA) must be activated.
  • keepass on our computer, password safe We must deactivate password storage applications such as, on this computer, and change the access passwords to these applications from a secure device.

I clicked the link my account was hacked

As we have seen in Yasir Gökçe’s narratives, it is not necessarily We don’t die, we’re done, we’re not ruined just because we clicked on the link. When we fulfill our responsibilities in order to avoid problems both personally and legally, we can take the situation under control. Have you ever had trouble with a link you clicked before? Share your thoughts and experiences with us in the comments.

To Yasir Gökçe from twitter you can reach.

RELATED NEWS

How Do ‘Child’ Hackers Who Hack Big Businesses and Steal Your Information Do This? Here’s What’s Going On The Dark Web…


source site-33