HackAid Knowledge Base¶
Practical guidance for organizations responding to cyber incidents. Whether you've been hit by ransomware, discovered a data breach, or suspect your systems are compromised, these resources will help you respond effectively.
I've Been Hacked - What Type of Incident?¶
Choose your situation for targeted guidance and resources:
- Ransomware Attack - Files encrypted, ransom demanded
- Account Compromise - Email, social media, or cloud accounts taken over
- Business Email Compromise (BEC) - Fraudulent emails, invoice fraud, CEO fraud
- Malware Infection - Virus, trojan, spyware on your systems
- Data Breach - Sensitive data stolen or exposed
- Phishing Attack - Employees clicked malicious links or shared credentials
- Website Compromise - Website defaced, hacked, or serving malware
- DDoS Attack - Services overwhelmed, website unavailable
Response Guides¶
Step-by-step guidance for incident response:
- First 24 Hours - Critical first steps after discovering an incident
- Evidence Preservation - How to collect and preserve digital evidence
- Reporting Requirements - Who to notify (GDPR, CERT-SE, police)
- Recovery Planning - Getting back to normal operations
External Resources¶
Curated links to trusted organizations and tools:
- Helplines & Support Organizations - Where to get additional help
- Free Tools - Evidence collection, malware analysis, decryption
- Official Guidelines - CERT-SE, ENISA, NIST, SWGDE
Can't find what you need? Apply for assistance and our volunteers will help guide you.