My Computer Was Hacked: What to Do Right Now
Posted: March 27, 2026 to Cybersecurity.
Immediate Steps to Take If Your Computer Was Hacked
Discovering that your computer has been hacked is alarming. Whether you noticed unauthorized transactions, strange programs running, ransom demands on your screen, or someone told you that your email is sending spam, the first few minutes of your response matter. Taking the right actions quickly limits the damage. Taking the wrong actions, or no action, makes recovery harder and more expensive.
This guide walks you through exactly what to do, step by step, whether you are a business owner whose company computer was compromised or an individual dealing with a personal machine breach.
Step 1: Disconnect from the Network Immediately
The single most important first action is to disconnect the compromised computer from the internet and your local network. This stops the attacker from continuing to access your system, exfiltrating more data, or spreading to other devices on your network.
How to disconnect:
- Wired connection: Unplug the Ethernet cable from the computer
- Wi-Fi: Turn off Wi-Fi from the system tray (do not just close the lid, which may only put it to sleep)
- Mobile hotspot: Disconnect any phone tethering or mobile hotspot connections
- Do not turn off the computer: Powering down destroys volatile evidence in memory that forensic investigators may need
If the computer is on a business network, also notify your IT department or IT support provider immediately. They may need to isolate the network segment to prevent lateral movement to other systems.
Step 2: Document Everything You See
Before you start fixing anything, document the evidence. Use your phone to take photos and screenshots of:
- Any ransom messages, error messages, or unusual pop-ups
- Programs or windows that should not be open
- The Task Manager or Activity Monitor showing running processes
- Recent browser history if accessible
- Any emails or messages related to the compromise
- The exact time you discovered the compromise
This documentation is important for law enforcement reports, insurance claims, and forensic investigation. Memory fades quickly, so capture everything now.
Step 3: Change Your Passwords from a Different Device
Using a phone or a different, trusted computer, immediately change passwords for your most critical accounts. Do not use the compromised computer for this because the attacker may have a keylogger capturing everything you type.
Change these passwords first, in this priority order:
- Email: Your email account is the master key because password resets for other services go through email
- Banking and financial accounts: Check for unauthorized transactions while you are logged in
- Cloud storage: Google Drive, Dropbox, OneDrive, iCloud, anything with synced data
- Social media: Attackers use compromised social accounts for phishing and identity theft
- Any account that uses the same password: If you reused passwords (common but dangerous), change every account that shared the compromised password
Enable multi-factor authentication (MFA) on every account that supports it. This adds a second verification step that prevents attackers from accessing accounts even if they have the password. Use an authenticator app (Google Authenticator, Microsoft Authenticator, Authy) rather than SMS-based MFA, which can be bypassed through SIM swapping.
Step 4: Check for Financial Damage
Log into your bank accounts, credit cards, and payment services from a trusted device. Look for:
- Unauthorized transactions or transfers
- New payees or payment recipients you did not add
- Changes to account settings (email address, phone number, mailing address)
- New credit accounts opened in your name
If you find unauthorized financial activity:
- Contact your bank immediately to freeze affected accounts
- File a fraud report with each affected financial institution
- Place a fraud alert on your credit reports through all three bureaus (Equifax, Experian, TransUnion). Reporting to one bureau automatically notifies the others.
- Consider a credit freeze, which prevents new accounts from being opened in your name
Step 5: Scan for Malware
If your existing antivirus did not catch the compromise, it may be insufficient against the specific threat. Use a secondary scanner for a second opinion:
- Malwarebytes: Excellent at detecting malware that traditional antivirus misses (free scan available)
- HitmanPro: Cloud-based scanning that uses multiple engines
- Microsoft Safety Scanner: Free tool from Microsoft for one-time scans
- ESET Online Scanner: Browser-based scanner that does not require installation
For business computers, your IT provider should handle this step using enterprise-grade tools and forensic procedures. Consumer-grade scanning may miss sophisticated threats and can inadvertently destroy evidence.
Step 6: Determine How the Hack Happened
Understanding the attack vector helps prevent it from happening again. Common ways computers get hacked:
Phishing Emails
You clicked a link or opened an attachment in a malicious email. The link may have led to a fake login page that captured your credentials, or the attachment may have installed malware. Check your email for suspicious messages you interacted with recently.
Weak or Reused Passwords
Attackers use credentials from previous data breaches (available on dark web databases) to try logging into your accounts. If you use the same password on multiple sites, one breach exposes them all. Check Have I Been Pwned to see if your email appears in known breaches.
Unpatched Software
Outdated operating systems, browsers, and applications contain known vulnerabilities that attackers exploit. If your computer has been deferring updates, those unpatched vulnerabilities may have been the entry point.
Malicious Downloads
Software downloaded from unofficial sources may contain bundled malware. This includes pirated software, free tools from suspicious websites, and browser extensions from unverified developers.
Remote Desktop Exposure
If Remote Desktop Protocol (RDP) is enabled and exposed to the internet without proper security (VPN, MFA, account lockout), attackers can brute-force their way in. This is one of the most common entry points for ransomware.
Need Help with Incident Response?
If your business computer was hacked, Petronella Technology Group provides emergency incident response services to contain the threat and recover your systems. Schedule a free consultation or call 919-348-4912.
Step 7: Decide Whether to Clean or Rebuild
After a hack, you have two options: clean the compromised system or rebuild it from scratch. For business computers, rebuilding is almost always the right choice because there is no way to be 100 percent certain that all malicious software has been removed from a cleaned system.
When to clean: Personal computers with low-risk data where the malware was a known, well-understood threat (adware, browser hijacker, commodity malware).
When to rebuild: Any business computer, any system that had access to sensitive data, any ransomware infection, any situation where the attacker had interactive access to the system, or any time you are not confident in the scope of the compromise.
Rebuilding means wiping the hard drive completely and reinstalling the operating system from official media. Then reinstall applications from legitimate sources and restore data from backups that predate the compromise.
Step 8: Restore from Backup
If you have clean backups from before the compromise, restoring data is straightforward. Verify that your backup is from before the attack began, not just before you noticed it. Attackers often have access for days or weeks before they take visible action.
If you do not have backups, data recovery options depend on the nature of the attack. Ransomware encryption may be reversible if the ransomware variant has a known decryption tool (check No More Ransom). Data deletion or corruption may be partially recoverable through professional data recovery services.
Step 9: Strengthen Your Defenses
After recovery, implement these protections to prevent future compromises:
- Use a password manager: Generate unique, strong passwords for every account
- Enable MFA everywhere: Multi-factor authentication on every account that supports it
- Keep software updated: Enable automatic updates for your operating system, browser, and applications
- Install proper endpoint protection: Business-grade EDR, not just consumer antivirus
- Set up automated backups: At least two copies of important data, one off-site or in cloud
- Use a DNS filter: Block access to known malicious websites at the network level
- Get security awareness training: Learn to recognize phishing and social engineering attacks