PanicStation.org
us Technology & digital loss unexpected proxy • proxy server suddenly enabled • computer using unknown proxy • web traffic routed through proxy • browser redirect through proxy • system proxy settings changed • windows proxy turned on • mac proxy settings changed • vpn i did not install • unknown network configuration • possible malware proxy • suspicious internet connection • device may be managed • proxy auto configuration pac file • automatic proxy setup enabled • setup script i dont recognise • credentials at risk online • account takeover prevention • public wi-fi tampering concern • work laptop proxy enforced

What to do if…
your computer suddenly routes web traffic through a proxy you did not set

Short answer

Disconnect from the internet, disable any unknown proxy or auto-configuration setting, and secure key accounts from a different trusted device before you keep browsing.

Do not do these things

  • Don’t log into email, banking, or work systems while the proxy is active.
  • Don’t download “fix” tools from pop-ups, ads, or unfamiliar sites.
  • Don’t assume it’s harmless “just a setting”—treat it like a possible compromise until proven otherwise.
  • Don’t factory reset immediately if you may need IT help or to report a crime (secure accounts first).

What to do now

  1. Get to a safer pause and disconnect.
    Turn off Wi-Fi and unplug Ethernet. If you were on public Wi-Fi, don’t rejoin that network yet.

  2. Work/school device? Stop and use the official support route.
    Contact your IT/helpdesk and report: “A proxy was enabled that I didn’t set.” Managed devices may enforce a proxy/PAC script, and IT needs to verify whether this is expected or malicious.

  3. Disable any unfamiliar “automatic proxy setup” / PAC script.
    Look for automatic proxy setup, configuration script, Use setup script, Auto proxy discovery, or PAC.

    • On Windows, this is typically under Settings → Network & internet → Proxy.
    • On Mac, this is typically under System Settings → Network → (your connection) → Proxies.
      If it’s enabled with an address you don’t recognize, turn it off and save a screenshot of the script/address.
  4. Disable any manually set proxy server you didn’t set.
    If you see an IP/domain and port you don’t recognize, disable it and record the details (screenshot).

  5. Restart, then confirm it stayed off.
    If it turns back on after reboot, assume malware or unwanted remote management. Disconnect again and proceed.

  6. From a different trusted device, lock down accounts (email first).
    Using a phone/other computer you trust:

    • Change your email password first.
    • Enable multi-factor authentication.
    • Review recent activity/devices and sign out other sessions if available.
      Then change banking/password manager passwords.
  7. Run reputable security scans and update the system.
    Use built-in protections and a reputable anti-malware scanner from an official source. Install OS/browser updates and restart.

  8. If you think you were scammed or victimized, report it through official channels (and avoid spoofed sites).

    • For cyber-enabled crime and fraud reporting to the FBI intake: IC3 (type the official domain directly).
    • To report scams/fraud to the federal consumer protection agency: ReportFraud.ftc.gov.
    • If identity details were misused: IdentityTheft.gov.

What can wait

  • You don’t have to diagnose the exact malware or attacker right now.
  • You don’t need to contact every service immediately—start with email and anything tied to money or recovery.
  • You don’t have to wipe the computer today unless scans/support indicate it’s necessary.

Important reassurance

An unexpected proxy is scary, but the harm-reducing steps are practical and effective: disconnect, remove the proxy, secure accounts from a clean device, and scan. You’re not overreacting by pausing logins until you verify the connection is clean.

Scope note

These are first steps to stabilize the situation. If the proxy reappears, if the device is managed, or if accounts were accessed, you may need hands-on help from IT/security support and to make a formal report.

Important note

This is general information, not professional cybersecurity or legal advice. If you believe a crime is actively in progress or you’re in immediate danger, contact local authorities right away.

Additional Resources
Support us