- Mar 25, 2018
- 14
I have been hacked on all my devices including Android tablet, Windows PC, iPhone, and Samsung Smart TV. They have hacked into my email accounts and all my bank and credit card accounts. I do not know what their motive is as they have not yet stolen anything that I know of. I may know who did this and they did have physical access to my house and devices and may still have access I'm not sure. It was a friend of a previous renter I had in my home and eventually i hired this person twice to help me with my computer issues and it ended up he made it much worse each time by removing all my permissions on my PC . One of them is definitely a computer Developer and part of Enterprise system as I just recently found all the events that have taken place on my PC in the Event Viewer which I was so grateful to have discovered and that they had not deleted the logs yet as it was the first hard core evidence of what I had been saying all along but people thought I was crazy
I have studied and researched and learned a lot since the beginning of all this and will share what I have observed but do know that I am not in any way a computer or tech savvy person. I know this is an Android or mobile forum and I'm going to post on the Windows Forum as well but I have to wait till I scan it with the advised scanning tool. I have to give a little background with my windows laptop as that's where it became most apparent and also easier for me to see where they have made changes on my system versus my mobile devices. It did eventually spread to my iPhone and my Samsung Galaxy tablet S2 which I am on currently and so is the hacker.
So my laptop was just a simple Dell laptop Intel 3 processor.. I had been out of town on a job assignment and had no problems with my devices until I came back. While I was gone I had rented out my home to someone that ended up to be untrustworthy any responsible. I first noticed that something was wrong with my Samsung TV and that's a whole nother story but basically somebody else was controlling my settings, my cable service Etc. To summarize what happened with my laptop was that the hacker first installs virtual or infrared input devices or adapters such as a virtual ethernet device or Bluetooth device. After that I assume they install all the applications and files which I noticed were contained in Windows 32 or system32. I also noticed a lot of reference to Windows Powershell. Within about 48 hours my Samsung tablet was completely Takin Over as well as my iPhone 6 Plus. I don't know really if there is a virus or malware but what is very clear is that there is another person or persons that have Total Access and control of my devices and are monitoring my devices 24/7.
After I gave up on that laptop I sold it and but a new HP all-in-one desktop and also paid for Geek Squad 24/7 support for one year. I brought the laptop top home and did not set it up till the next day and right after I set it up it was already infected per se with the same devices added in such as virtual and infrared Bluetooth, ethernet, and a certain Wi-Fi adapter that had the same item or ID number as the one in my previous laptop. Within a few days I know that my PC was completely taken over as well. There's way too much in the last 10 weeks to write all of it down here so I will just summarize the things that occurred and are present still:
I noticed on my new pc that there were strange Windows updates called KBxxxxxxx. I looked them up and it looks like other people had found them too and contacted Microsoft who did not supply an answer. I found in my task manager hundreds upon hundreds of service is running many of them related to a remote computer and Remote Management of my system. I learned that my hacker appears to be a computer Developer and part of an Enterprise group as my web browsers all were giving me results as if I were a business for Enterprise or Developer rather than just an individual consumer. I found again all the suspicious programs and files under windows32/WIN32, or SYSTEM32/SYS32. I got several free network analyzer software and have been able to find the hackers on my Wi-Fi router everyday. I am able to find their Mac address and corresponding vendor. They have been able to go in and configure my router and lock me out of it until I call Time Warner who helps me get back in but then the hackers go right back in themselves and reconfigure it. I subscribed to a VPN service but cancelled it because I was just providing the Packers with a VPN service to better hide their tracks. Now sometimes when I've been on Windows I can get the developer mode on the right side of my screen and I can see all the users and their usernames and their functions and everything they are writing and logging on my PC. And they are always doing screen recording and I'm sure filming me as well as they do on my Android. It has been so hard to try and explain this to other people and tech support persons but then yesterday I looked at Event Viewer again and saw that every single thing that I suspected was logged and the Event Viewer. It shows the beginning of when they started installing files, drivers Etc on my system and started monitoring. It shows all the different roles involved in monitoring and running my device. It confirms that there is a remote computer system as well as a network of external users accessing and configuring my system.
I have been able to view what devices and operating systems have accessed my accounts through my bank account as well as Google and Yahoo. It shows that the hackers have a Samsung tablet just like mine, an iPhone 6 Plus just like mine, but use a Linux and a Mac, neither of which I have.
This has been going on for 10 weeks and I have replaced my windows PC with a new HP desktop, replaced my router 3 times from Time Warner Cable/Spectrum, and replaced my iPhone 6 Plus twice. I never replaced my Samsung tablet because it actually disappeared for several weeks and then suddenly showed up again and my desk drawer . But I have reset it twice . Yesterday I saw a YouTube video on how to try and remove access from a remote computer so I went in to task manager and disabled all the services I could find having to do with a remote connection. I have done numerous factory restore/reset, have had multiple tech support including Best Buy Geek Squad ongoing support, HP tech support, Dell, Apple and AT&T, Samsung for my Samsung TV, and support from my anti malware software. Pretty much all the tech support workers just want to scan my devices for viruses or malware and then reset it to factory settings. I have explained that this does not work and that it's been done before but I guess they don't really have the time to further investigate. I am about ready to just sell my house and move to see if that solves the problem. The worst part has been the invasion of privacy and the total disruption of my normal life having spent hundreds of hours trying to detect or gather more evidence and then just the sheer amount of time it takes to go into my email then have to change the password over and over again and the fear of putting in a bank account or credit card number knowing they are reading my strokes. I could really use some knowledgeable advice and welcome any constructive thoughts, opinions, views, and questions in general as well.
I have taken pictures, screenshots and collected some data and evidence of these hackers on my devices. The best evidence however is from the hackers themselves in the Event Viewer logs, which I could always provide photos or copies of. I apologize for my very long-winded and wordy post but it is a bit complicated and difficult to summarize. Thank you for your patience..
I have studied and researched and learned a lot since the beginning of all this and will share what I have observed but do know that I am not in any way a computer or tech savvy person. I know this is an Android or mobile forum and I'm going to post on the Windows Forum as well but I have to wait till I scan it with the advised scanning tool. I have to give a little background with my windows laptop as that's where it became most apparent and also easier for me to see where they have made changes on my system versus my mobile devices. It did eventually spread to my iPhone and my Samsung Galaxy tablet S2 which I am on currently and so is the hacker.
So my laptop was just a simple Dell laptop Intel 3 processor.. I had been out of town on a job assignment and had no problems with my devices until I came back. While I was gone I had rented out my home to someone that ended up to be untrustworthy any responsible. I first noticed that something was wrong with my Samsung TV and that's a whole nother story but basically somebody else was controlling my settings, my cable service Etc. To summarize what happened with my laptop was that the hacker first installs virtual or infrared input devices or adapters such as a virtual ethernet device or Bluetooth device. After that I assume they install all the applications and files which I noticed were contained in Windows 32 or system32. I also noticed a lot of reference to Windows Powershell. Within about 48 hours my Samsung tablet was completely Takin Over as well as my iPhone 6 Plus. I don't know really if there is a virus or malware but what is very clear is that there is another person or persons that have Total Access and control of my devices and are monitoring my devices 24/7.
After I gave up on that laptop I sold it and but a new HP all-in-one desktop and also paid for Geek Squad 24/7 support for one year. I brought the laptop top home and did not set it up till the next day and right after I set it up it was already infected per se with the same devices added in such as virtual and infrared Bluetooth, ethernet, and a certain Wi-Fi adapter that had the same item or ID number as the one in my previous laptop. Within a few days I know that my PC was completely taken over as well. There's way too much in the last 10 weeks to write all of it down here so I will just summarize the things that occurred and are present still:
I noticed on my new pc that there were strange Windows updates called KBxxxxxxx. I looked them up and it looks like other people had found them too and contacted Microsoft who did not supply an answer. I found in my task manager hundreds upon hundreds of service is running many of them related to a remote computer and Remote Management of my system. I learned that my hacker appears to be a computer Developer and part of an Enterprise group as my web browsers all were giving me results as if I were a business for Enterprise or Developer rather than just an individual consumer. I found again all the suspicious programs and files under windows32/WIN32, or SYSTEM32/SYS32. I got several free network analyzer software and have been able to find the hackers on my Wi-Fi router everyday. I am able to find their Mac address and corresponding vendor. They have been able to go in and configure my router and lock me out of it until I call Time Warner who helps me get back in but then the hackers go right back in themselves and reconfigure it. I subscribed to a VPN service but cancelled it because I was just providing the Packers with a VPN service to better hide their tracks. Now sometimes when I've been on Windows I can get the developer mode on the right side of my screen and I can see all the users and their usernames and their functions and everything they are writing and logging on my PC. And they are always doing screen recording and I'm sure filming me as well as they do on my Android. It has been so hard to try and explain this to other people and tech support persons but then yesterday I looked at Event Viewer again and saw that every single thing that I suspected was logged and the Event Viewer. It shows the beginning of when they started installing files, drivers Etc on my system and started monitoring. It shows all the different roles involved in monitoring and running my device. It confirms that there is a remote computer system as well as a network of external users accessing and configuring my system.
I have been able to view what devices and operating systems have accessed my accounts through my bank account as well as Google and Yahoo. It shows that the hackers have a Samsung tablet just like mine, an iPhone 6 Plus just like mine, but use a Linux and a Mac, neither of which I have.
This has been going on for 10 weeks and I have replaced my windows PC with a new HP desktop, replaced my router 3 times from Time Warner Cable/Spectrum, and replaced my iPhone 6 Plus twice. I never replaced my Samsung tablet because it actually disappeared for several weeks and then suddenly showed up again and my desk drawer . But I have reset it twice . Yesterday I saw a YouTube video on how to try and remove access from a remote computer so I went in to task manager and disabled all the services I could find having to do with a remote connection. I have done numerous factory restore/reset, have had multiple tech support including Best Buy Geek Squad ongoing support, HP tech support, Dell, Apple and AT&T, Samsung for my Samsung TV, and support from my anti malware software. Pretty much all the tech support workers just want to scan my devices for viruses or malware and then reset it to factory settings. I have explained that this does not work and that it's been done before but I guess they don't really have the time to further investigate. I am about ready to just sell my house and move to see if that solves the problem. The worst part has been the invasion of privacy and the total disruption of my normal life having spent hundreds of hours trying to detect or gather more evidence and then just the sheer amount of time it takes to go into my email then have to change the password over and over again and the fear of putting in a bank account or credit card number knowing they are reading my strokes. I could really use some knowledgeable advice and welcome any constructive thoughts, opinions, views, and questions in general as well.
I have taken pictures, screenshots and collected some data and evidence of these hackers on my devices. The best evidence however is from the hackers themselves in the Event Viewer logs, which I could always provide photos or copies of. I apologize for my very long-winded and wordy post but it is a bit complicated and difficult to summarize. Thank you for your patience..
Last edited: