A remote user connected to my computer. Three fresh accounts were created.
A remote user connected to my computer. Three fresh accounts were created.
Just got the fresh setup and everything reset. I’ve tried some beginner tasks but remote viewing in that moment isn’t part of my workflow. It’s really confusing how this was done. I haven’t used it before, so I just looked at the Windows Remove Viewing App interface—it doesn’t resemble UAC or any internet prompts. Definitely a tough challenge!
Ensures all data on the drive is verified prior to concealment.
I haven't used Windows Reset before; I usually just perform a fresh install when I get stuck in tricky parts of the internet. It's unclear whether Windows Reset provides a clean directory set or root access, but for me, a fresh install (requiring the ISO or recovery media) is the best approach in this case.
I would perform a complete reset, then update all your login details across every account and network access point (WiFi password, router admin credentials, etc.). This is necessary since they successfully accessed the system and understand the vulnerabilities, so changes are essential to stop future breaches. I’d review the router configuration carefully to tighten any weak links—no port forwarding, no UPnP enabled. It doesn’t matter if it asked or you agreed; the goal was to block entry entirely. By the time this occurred, your defenses were compromised. If remote desktop isn’t used, I’d turn it off in Windows for added safety. Extra precautions are always wise.