Logo

Cyber Security: The Telltale Signs Your Company Has Been Compromised – And What To Do Next

Signs Your Company
Has Been Hacked

Cyber attacks are more common than ever. Many businesses don’t realise they’ve been compromised until serious damage occurs. This guide explains how to recognise the signs of a hack and what to do immediately to protect your organisation.

TL;DR (Share this with leadership)

Why breaches are missed (and how to stop that)

Attackers succeed not only because of technical weaknesses but also operational gaps:

Solution: establish a minimal, shared anomaly → action flow (see “First Hour” below) and a clear channel (e.g., #security-incidents or a hotline) for staff to report issues.

Early Warning Signs, Explained (with where to check)

Below are the most common, high-fidelity indicators of compromise (IoCs) and where you’ll usually find them.

1. Unusual account and identity activity

What you’ll notice

Where to look

Why it matters

Compromise often starts with credentials – phished, reused, or purchased. Identity is the new perimeter; if an attacker can authenticate, they’re halfway home.

Quick countermeasures

2. Unexpected system behaviour on endpoints and servers

What you’ll notice

Where to look

Why it matters

Attackers modify endpoints to persist, move laterally, and stage data for exfiltration. These behaviours often precede ransomware.

Quick countermeasures

3. Abnormal network and data exfiltration patterns

What you’ll notice

Where to look

Why it matters

Quiet data theft is often the primary objective. Outbound anomalies are a top indicator you’re already in phase two of an attack.

Quick countermeasures

4. Unauthorised access or privilege escalation

Unauthorised access or privilege escalation

What you’ll notice

Where to look

Why it matters

Modern attacks target OAuth and service principals; once consented, malicious apps persist beyond password/MFA resets.

Quick countermeasures

5. Suspicious email behaviour and BEC patterns

What you’ll notice

Where to look

Why it matters

Business Email Compromise (BEC) is rampant and costly. It often doesn’t trigger anti-malware alerts because there is no malware – just social engineering.

Quick countermeasures

6. Security controls disabled or tampered with

What you’ll notice

Where to look

Why it matters

Attackers try to blind you before staging payloads. A “quiet” environment can be the loudest indicator.

Quick countermeasures

7. Finance irregularities and vendor record changes

What you’ll notice

Where to look

Why it matters

Attackers monetise access quickly. Finance changes are a clean, high-signal sign that email or identities are already compromised.

Quick countermeasures

8. Staff reporting “weird stuff”

What you’ll hear

Where to look

Why it matters

Humans notice anomalies before systems do. Culture determines whether those anomalies are reported.

Quick countermeasures

9. Third-party notifications

What you’ll recive

Where to look

Why it matters

External eyes often see what you can’t. Take these seriously; they’re rarely sent lightly.

Quick countermeasures

Cloud & SaaS red flags (don’t overlook these)

Ransomware precursors to watch for

If you see two or more of these in short succession, treat as critical.

Quick-reference table (Indicator → Where to check → Immediate action)

IndicatorWhere to checkFirst action
New admin accountIdP/Directory auditDisable/suspend; review recent role grants
Off-hours successful loginSSO sign-in logsForce password reset; require re-MFA
External auto-forward ruleMailbox/tenant rulesRemove; block external forwarding org-wide
Outbound traffic spikeFirewall/NetFlowBlock destination; isolate host
EDR disabledEDR consoleRe-enable with tamper protection; investigate stop event
Vendor bank details changedERP/AP auditFreeze payment; call vendor via known number
Backup snapshots deletedBackup consoleLock admin account; verify immutable/offline copies

What to do when you suspect a breach

Golden rule: contain fast, preserve evidence, and communicate clearly.

The First 60 Minutes

1. Open an incident ticket and timestamp everything.

2. Isolate affected accounts/devices.

3. Preserve evidence  before remediation:

4. Block active egress to suspicious destinations.

5. Establish a comms channel(war-room chat + bridge) and appoint a coordinator.

6. Decide the immediate business impact(payments, email, critical services) and implement temporary controls (e.g., payment freeze).

The First 24 Hours

The First Week

Practical hardening after any incident

Sample playbook snippet (drop into your runbook)

When a staff member reports an unfamiliar MFA prompt:

1. Suspend the account or require re-registration of MFA.

2. Review sign-in logs for the last 7 days; note IP/ISP/device.

3. Reset password and all sessions; revoke refresh tokens.

4. Check mailbox rules and OAuth consents; remove anything unrecognised.

5. Search SIEM for the same IP across other sign-ins; pivot to endpoints.

6. Document and brief the incident coordinator.

Call to Action

If any of the signals in this guide feel familiar-or you’d like a readiness assessment and a 24/7 monitoring plan-Computing Australia can help. From rapid incident response to ongoing MDR and NIST-aligned hardening, we’ll get you from uncertainty to control.

FAQ

Look for correlated anomalies: off-hours admin login + new forwarding rule + outbound data spike is high-signal. One odd log can be benign; three related ones are not.

Prefer isolation over powering off. Quarantine the host to preserve volatile memory (critical evidence) unless active destruction is underway.

Not if the attacker established persistence (OAuth app, backdoor service, Golden SAML). You must hunt and remove those footholds.

Use built-in tools (M365/Google audit, EDR, firewall logs) and establish simple, repeatable steps. Consider a managed detection & response (MDR) partner.

As soon as you confirm a breach affecting personal or regulated data, follow your legal obligations and contractual commitments. Consult legal counsel.