I just removed two recently installed, remote access & control programs from my computer!
Stealthy remote access programs may the first stage of attack. They enable the hackers to download invisible programs, access your confidential financial information, remove treasured photos/videos or upload programs to your computer that will be used to attack other computers.
by Richard L. Thornton, Architect & City Planner
About two weeks ago, Homeland Security mass-distributed a warning that the United States and several other NATO member countries were about to get hit with a multi-faceted cyber attack that could possibly shut down major utilities, communications and air transportation. Toward the end of the public service announcement, it did mention that they feared that viruses might be loaded into millions of personal computers, which then would be directed to attack critical targets within their nation.
At the time, I was not too concerned. After all, a little over a decade ago, I was illegally evicted on Christmas Eve and survived quite well, an extended period of time living in the national forest with my three loyal herd dogs. I am much better off financially now, but certainly not wealthy or critical to the national economy. LOL No powerful nation or domestic traitor is going to be interested in my computer! I am a nobody.
THEN, on the night of February 13, 2024 I was creating 3D humans and animals from the 17th century with my CADD software, when a big program began downloading onto my computer. I was not on the internet, but the ethernet cable was connected to my large desktop computer. At the time, I assumed it was Microsoft downloading Windows updates, but the time required seemed more like a program of over a gigabyte. Still didn’t worry too much.
The next morning, however, my computer startup was weird. The computer booted up, then unbooted then opened up a big program. My professional programs seemed to be running slow. Something was wrong. I ran anti-virus and anti-malware programs. They found nothing.
Since then I have been going down the list of all downloaded programs for the past two years. I could not find anything. Then about an hour ago, I decided to see what programs were automatically starting, when the computer booted. I saw TWO Remote Access Programs with no information available about the size or manufacturer.
Neither program was listed on my File Manager list of downloaded programs. The second program was downloaded from a location very near my house on a Windstream Telephone internet cable. That alone was suspicious, because during the past year, someone has gone into the Windstream District Terminal, two miles from my house, and removed my phone number’s electronic card from the slot then damaged it, when reinserting. Windstream swears that it is not their employees doing it.
One remote control program was invisibly downloaded on November 15, 2023. The other was downloaded around 10:00 PM on February 13, 2024. I removed them and now my professional programs are running much faster. The boot-up on my computer is almost instantaneous for the first time in over a year. Apparently, the November 15th stealth program replaced and earlier one.
Readers must understand that over-zealous government agencies in the United States, corrupt law enforcement agencies, sophisticated criminal organizations and hackers, working for hostile governments, can download programs through your cyber firewalls and almost all consumer cyber security programs.
How to remove remote control worm files
(1) First, go to your File Explorer. In the search box type “Remote Access”. If you do not recognize a program with a file name, including those words, uninstall the entire program.
(2) On Windows operating systems, first go to Start then click Settings then click Apps. First check your Startup applications then check the list of all apps. The February 13th remote access program was in my Startup menu. The November 15th remote access program was in my Default Apps menu. These programs must be Uninstalled. They may remain active, if you just delete a single file within the program.
Your personal security and National Security
Of course, no one wants weirdo strangers, Neo-Nazi thugs or crooked cops peeking around in their computer or Smart Phone. However, from what the FBI and Homeland Security are saying, this time it is also a patriotic duty. Cyber Security personnel are frantically trying to come up with weapons to thwart the use of millions of American personal computers and Smart Phones to attack our nation.
Our cyber security strategies in the past were focused on stopping individual hackers, not millions of highjacked personal computers and Smart Phones. Will Homeland Security be ready for the attacks? I don’t know. Meanwhile, you can do you part to reduce the number of highjacked computers that they have to confront.
If your computer is still acting spooky after remove remote control files, immediately contact a cyber-security expert . . . if you can afford it. A hacker with control of your computer can easily turn your life upside down.
Thank you! Our computers seem OK right now, but we are keeping this information and will check periodically.
Mary Jane Parker Licensed Real Estate Broker*, *Retired mjparker.broker@gmail.com mjparker@mindspring.com 404-274-6319
LikeLiked by 1 person
Yes, keep a close watch. I have received over $1800 in bobus pay requests on PayPal this morning!
LikeLike