• Register

Subscribe to our blog

CTN Blog

The PC on Haunted Hill

b2ap3_thumbnail_pc_on_haunted_hill_400.jpgOur minds often attribute unexplained phenomena with hauntings from ghosts. Most of the time, there's a perfectly good scientific explanation for what's going on. If you ever see your computer's cursor move on its own, your PC isn't haunted. Although, you might prefer a haunting to what's really happening; a hacker is probably stealing your data. Now that's scary!

When you're at your home and it's the middle of the night, it can be difficult to distinguish a faint noise coming from the next room as something that's natural or supernatural. Is that scuffle the sound of the family pet, or is it a ghost dragging its chains across the floor? Is the moan you hear coming from beyond the grave, or did you forget to turn the TV off? Likewise, you may second guess yourself when you see your cursor move slightly on its own, but a slight move is just as normal as a tree branch scraping against the window.

A small move like your cursor sporadically jumping a few inches may stem from a hardware glitch, like the mouse sensor having a difficult time tracking on the table top so it has to reset itself. A problem like this can be fixed by using a surface that's designed for mouse movements, like a mousepad. You can also try cleaning the bottom of your mouse. If dirt and crud accumulate over the sensor, it will make reading movements difficult, causing the cursor to skip.

What's terrifying is when you see your cursor move on its own and perform intentional tasks like opening programs. In a situation like this, you're looking at two possible explanations: 1) your PC is now possessed thanks to meddling kids fooling around with an Ouija board, or 2), a hacker has remoted into your computer and taken control of it. The latter is likely the case, although, before calling CTN, try dousing your mouse with holy water just to be sure.

A hacker can gain full control of your PC by utilizing specially designed malware downloaded from a spam email or a malicious website. A hacker with this kind of control over your system will attempt to steal your personal data and your money. InfoWorld describes what's at stake:

Many hackers will break into a computer, wait for it to be idle for a long time (like after midnight), then try to steal your money. Hackers will break into bank accounts and transfer money, trade your stocks, and do all sorts of rogue actions, all designed to lighten your cash load.

If you catch a hacker haunting your PC, "Who ya gonna call?" Before you call in a team armed with Proton Packs, you will first want to call CTN at (610) 828-5500. If you do catch a hacker moving your mouse, here are some immediate actions you can take:

  • Before tipping off the hacker that you know about the breach, spend a minute or two watching their activity to get a sense of what they're up to. If your camera is nearby, you can take a few screenshots to help investigate the crime later on.
  • Power down the computer and unplug the network cable. This will sever the hacker's connection and prevent them from doing any additional damage.
  • Find another network-connected computer that's uncompromised. Use it to immediately change the passwords for all of your accounts and check the account records for suspicious activity.
  • Have the professionals at CTN take at look at your computer so we can isolate and fix the problem.

Like catching a ghost, catching a remote hacker can be difficult unless you know what signs to look for. With CTN's managed IT services, we're able to monitor your system around the clock. This way, we can catch a remote hacker in the act, and with our remote monitoring service, we can even catch the malware early on and prevent it from activating.

Call CTN today. We ain't afraid of no hackers!

6 Bring Your Own Device Tips to Help Bring the Bus...
CTN’s CEO Drew Morrisroe elected Chairman of the B...

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!

QR Code

Latest News & Events

CTN does not use any SolarWinds or FireEye products. As you’ve likely seen reported, SolarWinds discovered a supply chain attack compromising their Orion business software updates that distributed malware known as SUNBURST. The malware perm...

Latest Blog

Cloud computing has been one of the most utilized tools for business in 2020. The COVID-19 pandemic has made it crucial for businesses to give remote access to tools and one effective way to make that happen was to look to the cloud. This h...

Contact Us

Learn more about what CTN can do for your business.

Call us today
(610) 828-5500

610 Sentry Parkway
Suite 110
Blue Bell, Pennsylvania 19422