Serious Discussion I am a target of persistent hacking, and I am looking for advice on how to overcome this

Marko :)

Level 24
Verified
Top Poster
Well-known
Aug 12, 2015
1,314
"By their mind" it is strange that this was the first alternative that came to yours... oh well, let's see...
Bluetooth adapter?
Wi-Fi adapter?
Does your PC has integrated BT and constantly turned on? Even if you have it on constantly, hacker can't do anything unless you pair your device with his. Just then he can take control.

Also, let's not forget the fact that BT has a really short range. Two walls and BT is no more.

And regarding Wi-Fi adapter, you can only be hacked if you're connected to the internet. But even that is unlikely if you have regularly patched Windows through Windows Update and updated Wi-Fi card drivers.
 

Trident

Level 34
Verified
Top Poster
Well-known
Feb 7, 2023
2,349
What part of what I wrote is making no sense to you?
Well I’m gonna list what doesn’t make sense. For more beautiful presentation, I will even add bullet points.
  • This is one of the many threads about “persistent”, terrifying hacking that can’t be dealt with and looks like many posts created before.
  • Once you are presenting yourself as a total noob who can’t create bootable Linux media, next moment you appear as an expert, ready to challenge everyone. That by itself brings 2 questions:
    • Why are you contradicting yourself?
    • If you are such an expert, then why are you seeking help, support and advise? You know everything, right?
  • The instant hacking of a Chrome OS device sounds extremely unrealistic. Everyone knows that Chrome OS has more than 10x less CVEs than Mac (nearest competitor) and they are very short lived.
  • You keep going on and on and on, but what is the evidence of the hack?
    • Has Confidentiality, Integrity or Availability of your information been compromised in any way?
      • if yes, then explain in detail what was compromised, where, when and how did you find out it has happened.
    • Has any security system alerted you to any sort of intrusion?
  • When someone is telling you a story full of unnecessary details, taking way too long to get to the point, this story is most probably made up.
 
Last edited:

cybertrapped

New Member
Thread author
Jun 19, 2024
8
If you know that then you should be able to fix your problems all by yourself.

You should contact the FBI and make a report. They'll come see you and figure out if you need a forensic digital security professional or the Hoo-Hoo Squad.
I don't need to know how to fix hacked devices to know one is infected; being a good observer it's enough to recognize something is wrong.

Libraries:

I have access to two different library districts, and the way I recognized machines from each institution were hacked was:

1) whenever I started the Chrome browser, the Adobe Acrobat reader extension would install itself, and this triggered the notification that called my attention. Also, new storage drives would appeared mapped through the file explorer's navigator panel. I reported this to the FBI through the IC3 website.

2) I was trying to sign up for a FlexClip account using a proton email . I had the Firefox browser developer console tab opened, and every time I clicked to get the one time code to verify the address, the console opened at the proton email tab would generate an error message like network connection lost. This happened over and over, and I was disabled from signing up that night.

FedEx:

I realized the autopay for my Internet service had been turned off, and I wanted to call Cox through my VoIP service, so I rented a FedEx station. When I was talking to the "billing agent" impersonator, he kept insisting that my account had no emails on record, but I knew he was wrong because I've gotten emails about my account. We hanged up, and although I was avoiding to log into the online account, I decided otherwise, and I confirmed that my account not only had one email on record but two. Although I re-enroll to autopay, somehow, I am soon after de-enrolled for no reason.

QUESTION FOR YOU: If I contact the local FBI field office, if I presented compelling evidence, would they really try to figure out if I need a forensic digital security professional?
 

cybertrapped

New Member
Thread author
Jun 19, 2024
8
For more beautiful presentation, I will even add bullet points.
(y) on your theatricality
  • This is one of the many threads about “persistent”, terrifying hacking that can’t be dealt with and looks like many posts created before.
I am new comer to this forum, and this argument, added to the tone of your messages seems immature. What makes you think or expect that I am aware of the number and frequency of posts that claim persistent hacking problems?
  • Once you are presenting yourself as a total noob who can’t create bootable Linux media, next moment you appear as an expert, ready to challenge everyone. That by itself brings 2 questions:
    • Why are you contradicting yourself?
    • If you are such an expert, then why are you seeking help, support and advise? You know everything, right?
I have no control of how you perceived me, and nothing of what I wrote is intended to portray myself as a noob or an expert. Perhaps your reading comprehension skills are off. In my original post I am asking how I'm the midsts of hacked networks and devices, or lacking a clean machine, can I download a distro and keep it clean. I know how to make bootable media, but I am concerned about the integrity of whatever I create given my environment. I am not contradicting myself; again, you have poor reading comprehension skills.
  • The instant hacking of a Chrome OS device sounds extremely unrealistic. Everyone knows that Chrome OS has more than 10x less CVEs than Mac (nearest competitor) and they are very short lived.
Well, the taking over School District in the city I live happened despite their reliance on the Chromebook ecosystem. And whether a vulnerability is short or long lived, all it takes is one escalation of privileges, one beacon file, etc. This statement is naive.
  • You keep going on and on and on, but what is the evidence of the hack?
    • Has Confidentiality, Integrity or Availability of your information been compromised in any way?
      • if yes, then explain in detail what was compromised, where, when and how did you find out it has happened.
    • Has any security system alerted you to any sort of intrusion?
Of course this has happened, and my intention is that I will be discussing incidents as questions and answers are exchanged. But the insulting and immature tone of your input is not very enticing. I actually would prefer you stay away from my posts, please consider this.

  1. When someone is telling you a story full of unnecessary details, taking way too long to get to the point, this story is most probably made up.

Maybe you rewrite the rules of this forum, and list WHAT YOU REQUIRE FOR POSTS TO APPEAR CREDIBLE TO YOU. That way, I will know which forums to stay away from. Or instead of wasting time trying to discredit the message of people who are desperately looking for help, you could actually help.

I have questions like:

Do you have any ideas of how I could download the Fedora package and keep it clean so I can run it on a new Windows machine from the get to?

If the Fedora package is corrupt, and I have the TPM activated, can the hackers still configure the media to bypass boot checking?
 

Dark Knight

Level 5
Verified
Well-known
Aug 17, 2013
234
I prefer the Linux operating system and have zero trust in Windows, Chromebooks, and Macs. Each of these OS has been hacked soon after I powered on a new device, even without connecting it to the internet.

Hmmmm .... not likely , kind of impossible unless someone else was in the room with you hacking it right in front of you.

Sounds like a personal issue to me
 

Trident

Level 34
Verified
Top Poster
Well-known
Feb 7, 2023
2,349
Do you have any ideas of how I could download the Fedora package and keep it clean so I can run it on a new Windows machine from the get to?
Did you try asking a friend? Surely you must know someone with a laptop, who can assist you in creating bootable media. In addition, you can buy install media, for example, it took 15 seconds (just a fraction compared to what you wasted writing the story of your life) to find this:

You can search around for “Verify Fedora Integrity”, for example, I found this (again, 10 seconds):

If the Fedora package is corrupt, and I have the TPM activated, can the hackers still configure the media to bypass boot checking?
If the Fedora package is corrupt, it will most likely not boot, whatever you activate or deactivate.

You are also able to contact the relevant support team and legal forces, MalwareTips is neither support point for your modem or whatever, nor it is a legal body to assist in “unhacking”, investigation and any other issues that you may have.

There is a Fedora public forum available too.
 

cartaphilus

Level 11
Verified
Top Poster
Well-known
Mar 17, 2023
536
Well @cybertrapped you are your own worse enemy. You are reporting all this rubbish to intel agencies? I can tell you one thing, if they didn't watch you in the past then now, they probably have your name on a small radar just to watch your activity. Hell I would if someone was sending me that type of reports.

There is a 99.99999% probability what you are seeing is a normal system activity, or notifications that are amplified by your own paranoia. However, if for 0.00001% chance that what you are saying is true, then whatever is happening to you based on the severity and level of hacking is way beyond anyone's pay grade on any public forum.
 

Trident

Level 34
Verified
Top Poster
Well-known
Feb 7, 2023
2,349
There is a 99.99999% probability what you are seeing is a normal system activity, or notifications that are amplified by your own paranoia. However, if for 0.00001% chance that what you are saying is true, then whatever is happening to you based on the severity and level of hacking is way beyond anyone's pay grade on any public forum.
I was thinking the same. If you are really the victim of “persistent hacking” then a lot of MSSPs as well as anti-malware vendors for business, offer incident response services (for a fee $$$$). They will perform the necessary forensic analysis (which @kailyn already mentioned) and will put an action plan in place. For free, various second opinion scanners can be ran, devices can be reinstalled and all firmware (such as UEFI, routers and so on) can be flushed.

The “hack” is not coming from the cosmic space as a light beam, majority of “hacks” require phishing and malware.
 

cartaphilus

Level 11
Verified
Top Poster
Well-known
Mar 17, 2023
536
I wonder if the frequency of those "type" of posts somehow correlates with average cycling/splitting time in mania patients?

And yes if one were to do these steps then everything that can be done for free and consumer side has been done to mitigate the issue:

Reset Cable Modem and let it acquire new firmware (look online for steps...I did that to my comcast modem)
Download and scan all the new fimrware for all of your device and flash all the new devices then reset the to default (it should be default after flashing).
  1. Get a Linux Machine, download MS VM, mount MS VM in Linux and install KAV, ESET, Bitdefender etc.
    1. Update with all the signature updates
    2. Remove the compromised storage device
    3. Unplug the Linux machine from network and disable all network activity
    4. Plug the storage devices into that machine and scan them with the aforementioned malware scanners
    5. Plug the machine back into the network and scan them again but now allowing the scanners to query the ML/AI/Cloud
That's it, that's all you can humanly do on the consumer side in order to end up with a sterile environment.
 
Last edited:

Trident

Level 34
Verified
Top Poster
Well-known
Feb 7, 2023
2,349
@cartaphilus I was trying to reinstall a Windows machine but my Windows laptop was screwed and I am a mac user. So I had to download Hiren’s boot CD, just copied the image (or I extracted it, don’t remember) on a flash, and the screwed up laptop booted!

Through Hiren then I downloaded the Windows image and Rufus to create the media. It was very difficult if not impossible to do from Mac, because it only supports FAT32 and one of the Windows files is way over the FAT32 file size limit.

I saw there are some mac programmes that allow usage of NTFS but they require kernel extension, which now requires special settings to be activated and it’s a whole thing.

So yeah, whoever wants to do something, finds a way.
 

cartaphilus

Level 11
Verified
Top Poster
Well-known
Mar 17, 2023
536
@cartaphilus


So yeah, whoever wants to do something, finds a way.
Don't get me near my Home Theater system; every time I sit down to watch a movie I have to tweak the settings for either audio or the color saturation even in Dolby Video since I am a tweaker (no not that type). My wife just rolls her eyes each time I do it....I am turning into a grumpy old engineer that complaints about everything.

I also have to rebalance my woofers before the movie starts...kiddo likes to play with the woofers and move them, and for anyone who had multiple subwoofers in a closed room knows that you can make it sound AWESOME or none at all...infrasonic wave length is large so even a few cm change in place alters the null zones. #1st World Problems
 

kailyn

Level 2
Jun 6, 2024
85
QUESTION FOR YOU: If I contact the local FBI field office, if I presented compelling evidence, would they really try to figure out if I need a forensic digital security professional?
You can make a report to your local police, the state police, or the FBI. If you can provide what they consider compelling evidence of hackings, then yes, they will perform an investigation.

I don't need to know how to fix hacked devices to know one is infected; being a good observer it's enough to recognize something is wrong.

Libraries:

I have access to two different library districts, and the way I recognized machines from each institution were hacked was:

1) whenever I started the Chrome browser, the Adobe Acrobat reader extension would install itself, and this triggered the notification that called my attention. Also, new storage drives would appeared mapped through the file explorer's navigator panel. I reported this to the FBI through the IC3 website.

2) I was trying to sign up for a FlexClip account using a proton email . I had the Firefox browser developer console tab opened, and every time I clicked to get the one time code to verify the address, the console opened at the proton email tab would generate an error message like network connection lost. This happened over and over, and I was disabled from signing up that night.

FedEx:

I realized the autopay for my Internet service had been turned off, and I wanted to call Cox through my VoIP service, so I rented a FedEx station. When I was talking to the "billing agent" impersonator, he kept insisting that my account had no emails on record, but I knew he was wrong because I've gotten emails about my account. We hanged up, and although I was avoiding to log into the online account, I decided otherwise, and I confirmed that my account not only had one email on record but two. Although I re-enroll to autopay, somehow, I am soon after de-enrolled for no reason.
All of the above I would not consider to be definitive proof of hacked devices. With the reference to the '"billing agent" impersonator' I just cannot take that seriously.

Maybe you rewrite the rules of this forum, and list WHAT YOU REQUIRE FOR POSTS TO APPEAR CREDIBLE TO YOU. That way, I will know which forums to stay away from. Or instead of wasting time trying to discredit the message of people who are desperately looking for help, you could actually help.
The kind of help you need if things are as you state they are, you will not find here. You need a local professional to inspect your devices.

This forum has been plagued with schizophrenic and other delusional ultra-paranoid types claiming to be hacked right down to their socks and underwear. Their 10 IoT devices, their router, their iphone, all their tablets and PCs - remain infected and hacked no matter how many times they reset to factory or even replace the hard drive - bruv - that is peak level altered reality.

I am willing to give anybody the benefit of the doubt, but the things you are saying tend to fall into the conspiracy theory fringe of IT infections and compromised accounts. You have supplied no real evidence and, quite frankly, I think you are either a trollolololler or just plain bat s h i t crazy.
 

EstrellaRhodes

Level 1
Jun 3, 2024
34
To download Fedora securely, you might want to try a few steps to minimize the risk. First, consider using a trusted friend's computer. If you have a friend with a clean machine, you could ask them to download the Fedora image and create bootable media for you. When you get a download, always verify the checksum provided by Fedora to ensure the file hasn't been tampered with. If possible, try using a computer at a more secure location, like a university lab or a cyber cafe you trust more than your current options. Once you have the Fedora image, create a bootable USB using software like Rufus (for Windows) or Etcher (cross-platform), and check the USB stick's integrity. I hope these steps help you get a secure setup going!
 

Victor M

Level 13
Verified
Top Poster
Well-known
Oct 3, 2022
645
@cybertrapped ,

1) TPM is used to securely store passwords and pin's, and I think only MS is using it. At least Ubuntu does not seem to utilize it.

2) Door locks only serve to Delay an intruder. Door locks are rated by how it can withstand assault. The security it offers is a delay feature, where hopefully a security guard or police will arrive on the scene and the intruder either flees or get apprehended.

3) Taking the modem along with you may not help. Once the modem is exploited thru a network attack, it's firmware may have been changed already. Or the attacker can re-exploit the modem whenever he wishes because he has an exploit/hack tool.

4) You speak of your machine being hacked before it is connected to the internet. There is such a thing as WiFi direct, it is a WiFi standard that allows connection to nearby machines. In Windows, WiFi Direct bypasses the firewall. There is no controlling it. A hacker can connect to your pc directly without a router. Particularly on Windows, you have to go the Device Manager, find the network adapters bullet section and expand it. You should see 2 WiFi Direct entries. Right click and delete them. Deleting them does not affect normal WiFi operation.

Additionally, even you have not 'connected' to the internet (meaning you opened a browser to surf to a web site), you may have joined a WiFi network - your home WiFi network. Know that a hacker in a nearby apartment can Over Power your router's signal and put up a fake network with the same name. You will connect to it and the hacker can attack your pc because that is his network and his machine is connected to it also. There isn't any sign or clue. Your WiFi password will be accepted because that network will accept anything. So don't use WiFi if you live in a crowded neighbourhood.

5) The way to verify that the downloaded Linux ISO is clean and not modified is to check it's SHA256 signature. You can use the Windows Powershell command: Get-FileHash <filepath> -Algorithm SHA256 . You can then compare that to what is provided on the distro's download page. Buy a big USB stick. Use it to hold the big ISO file you downloaded. And connect it and run Get-FileHash on different computers. On Linux, the command is 'sha256sum'.

Or you may be asking about application 'packages' downloaded by using DNF, RPM or APT-GET. These commands will verify that the downloaded software package is intact automatically.

6) Public computers are not trustworthy of course. But it is unlikely that the hacker would have modified the Get-FileHash command executable. If you don't trust a particular library computer, you can double, triple check it using several machines. (your friend's, your father's, your school's )

7) If you don't trust your ISP Cox's provided modem, then you should get your own or add a router. Preferably one that has a firewall. Routers can claim to have a sorta firewall because it implements NAT (network address transalation). But a true firewall has user creatable firewall rules feature. If there isn't a rules page on the router's configuration site, then it doesn't have a firewall. I use this: Amazon.com

8) ErzCrz has a good tip. Change your WiFi password once a month. Most Password Managers can generate a complex password and remember it for you.

9) Bluetooth is able to transmit thru longer distances with each revision. It is an attack vector. I don't remember the details of the particular hacking tool. Just turn it off in Settings.

9) Patching may not resolve your problem. a) There exists exploits and attack tools that Microsoft knows nothing about. b) As soon as MS releases a patch, hackers work to reverse engineer the patch to over come it the very next day. Hence the terms Patch Tuesday and Exploit Wednesday. You need to disable things on your OS that you don't use. Things that aren't running cannot be attacked.

10) Even though several MT members have ridiculed you, you do have to learn more about the indicators of a hack. It helps you by saving your time spent on recovery and time spent worrying, and it is useful to be able to explain your circumstances. One way is to know your OS thouroughly, remember what you did, and what you didn't do; and also know that the OS doesn't do that thing on it's own as a background process. Then after identifying the attack, you devise ways of stopping it from occurring again.

The MT forum users over rely on antimalware detections. The things antimalware knows about are mass distributed malware. The key here is 'mass distributed'. If the hacker does not make malware and post it everywhere, then the AV people will have 0 chance of knowing about it.

Look at it this way. Metasploit, the hacking tool, has been around for many years (2007). It is only until 2-3 years ago that AV Comparatives made a test to test the participant vendors with attacks created by this tool.

Know this too: You have to put up 'layers' of defenses. Use the tools provided by your distro. If you choose to use Fedora, then learn SELinux and create profiles for the applications you use. Know how to use the permission system of Linux. Know how to craft firewall rules. Use your preferred AI and ask what security tools that Fedora has built in.

If you have questions you can PM me.

Have fun.
 
Last edited:

SpiderWeb

Level 13
Verified
Top Poster
Well-known
Aug 21, 2020
609
Wait a minute. OP is that you??



As a general rule, American ISPs I absolutely cannot trust and recommend using a 3rd party modem/gateway if you absolutely must use them: COX, T-Mobile. They don't know what they are doing, at all. Data breaches every year. Use your own modem if you can. If you absolutely can't At&t and Verizon are the only ISPs that know what they are doing and have serious access permissions in place. But, Verizon is so clumsy on the customer service end that all the investments in hardware and software security are upended by ridiculous OpSec.
 
Last edited:

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top