Previous All Posts Next

Signs Your System Has Been Infiltrated by Hackers

Posted: September 22, 2021 to News.

Tags: Ransomware, Data Breach, Malware

Precursor warnings can only go so far when it comes to prevention of possible forthcoming attacks. While staying up to date on vendor advisories, intelligence sources, and security blogs are certainly important, it comes as too little too late for some victims. According to FireEye’s “M-Trends 2018” report, the global median dwell time between infiltration and discovery was 101 days in 2017, ranging from 75.5 days in the Americas to a whopping 498 days in Asia-Pacific. Do you know how to detect a breach on your network?

Here are three typical event indicators that may signal your system is compromised.

  1. Unusual Activity. Unusually high system or network activity, abnormal login times, abnormal login locations, unexpected user lockouts and unusual network ports activity can all be signs someone is working within your system.
  2. Software Issues. Every system has glitches, but repeated application crashes can signal something deeper. Configuration changes that can’t be traced back to approval, firewall changes, the presence of unexpected software or system processes, installation of startup programs, even repeated pop-ups on the web browser are all signs you need to look into a possible breach.
  3. Alerts. Notifications from your malware protection solutions as well as disabled solutions are obvious signs of an issue. So is a ransomware message from an attacker. Internal reports can be very valuable sources, as often employees are the ones reporting issues. More subtle alerts, such as reports from outside contacts that they received unusual messages from your email or social media accounts should also raise suspicion of attack.
If you experience any of the indicators above do NOT alter anything on the suspected systems. Contact your IT expert immediately. If you are the IT guru, collect as much evidence of the breach as possible: log files, disk information, malware samples. Make a list of active users and network connections. Obviously, if the breach involves leaking personal information or intellectual property, it is better to stop the leak before gathering all the evidence. Also, check with your peers for potential containment solutions. This allows you to learn what others have already done to contain the incident and recover from it. If you need help contact us HERE

Protect Your Business Today

Petronella Technology Group has provided cybersecurity, compliance, and managed IT services from Raleigh, NC for over 23 years. Contact us today for a free consultation and technology assessment.

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Need Cybersecurity or Compliance Help?

Schedule a free consultation with our cybersecurity experts to discuss your security needs.

Schedule Free Consultation
Previous All Posts Next
Free cybersecurity consultation available Schedule Now