Hacking for hacking's sake, like art for art's sake.Some are sadist
Hacking for hacking's sake, like art for art's sake.Some are sadist
Tier 1
Cyberbullying and Online Harassment (Most Likely)
This is the most common type of online malicious activity and aligns with much of the evidence presented in these posts.
Assessment
The screenshots showing in-game chat, Discord messages, and social media posts are hallmarks of targeted cyberbullying. This is a form of harassment that leverages personal information, often obtained through social engineering or public sources, to cause emotional distress. The attackers may be "a couple of kids," but the impact can be significant. Their motivation is often cruelty, notoriety within a small group, or a desire for a sense of power.
Recommendations
Disengage and Block
Do not engage with the harassers. Block them on all platforms.
Document Everything
Keep a detailed record of all harassing messages, including dates, times, and screenshots. This is crucial for any future reports.
Report to Platforms
Report the abusive accounts to the respective platforms (Discord, Reddit, X.com, etc.). Their terms of service prohibit this kind of behavior.
Inform Law Enforcement
If the harassment includes threats or doxxing (publishing private information), it should be reported to local law enforcement. Cyberbullying is a crime.
Tier 2
Targeted Hacking with a Remote Access Trojan (RAT) (Possible)
This scenario involves a higher level of technical skill than simple cyberbullying but is far from a nation-state operation.
Assessment
The users belief that their devices are being monitored could be explained by a RAT. These are often spread through malicious downloads (e.g., pirated software, email attachments) and can give an attacker control over a device, including the webcam and microphone. The claim that the attackers mentioned a "firmware rootkit" could be a bluff to intimidate the user and make their capabilities seem more advanced than they are.
Recommendations
The advice provided by " @Victor M " is excellent and aligns with industry best practices.
Device Reset
Perform a full factory reset on the iPhone and a clean installation of the operating system on the PC. Do not restore from backups, as they may be compromised. Manually reinstall applications from official sources.
Secure Accounts
Change all passwords for all online accounts, especially email. Enable two-factor authentication (2FA) everywhere it is available.
Network Security
Secure your Wi-Fi network with a strong password and consider using a reputable VPN service.
Endpoint Protection
Use a high-quality security suite on your computer.
Tier 3
Nation-State Level Operation (Highly Unlikely)
As I noted earlier this is the least likely scenario.
Assessment
The resources required for the kind of attack described (zero-click exploits, firmware rootkits) are immense and typically reserved for high-value targets like journalists, activists, and political figures. Using such assets on an ordinary citizen for personal reasons would be an extraordinary waste of resources and risk exposing these valuable tools.
Recommendations
Professional Consultation
If, after taking all the steps above, the activity persists, and you have credible reason to believe you are the target of a state-level actor, the appropriate course of action is to contact national law enforcement agencies that specialize in cybercrime, such as the FBI in the United States
Ok that could have been me being extra paranoid from being harassed like this, so maybe I was wrong and it was definitely a coincidence. However, like I've stated, they've done this sort of harassment countless times, these are just a few instances I've uploaded here.But I just winna mention that all flights from Vegas to the UK used to land at Heathrow Terminal 3, now they changed it to 5. So it's a known fact that everyone travelling from Vegas will be at HTRW 3/5... There is no hacking or spying involved.
Can you upload a few more instances please?Ok that could have been me being extra paranoid from being harassed like this, so maybe I was wrong and it was definitely a coincidence. However, like I've stated, they've done this sort of harassment countless times, these are just a few instances I've uploaded here.
As a free medical tip, if covered by your medical insurance, ask for thyroid chemistry check (TSH with or without T3 levels).Ok that could have been me being extra paranoid from being harassed like this, so maybe I was wrong and it was definitely a coincidence. However, like I've stated, they've done this sort of harassment countless times, these are just a few instances I've uploaded here.
Can you upload a few more instances please?
male, 24. These hackers, psycho I call them are female, they're like late 20s or 30. Chinese, they have huge criminal network, multiple guys and girls involved.Excuse my questions if you find them intrusive, what's your gender? How old are you?
Ok bro, but why would they refer to you as "bitch" and what's the story with the dad? How are you related to dad? Very generic post, this is probably not related to you.male, 24. These hackers, psycho I call them are female, they're like late 20s or 30. Chinese, they have huge criminal network, multiple guys and girls involved.
I verbally attacked her basically, and acted in a way that's apparently similar to her dad, so she called me a bitch. Maybe because I acted like one, and deserved it but I do not deserve to have my life ruined by mere words I've spewed, and justified by the way.Ok bro, but why would they refer to you as "bitch" and what's the story with the dad? How are you related to dad?
You don't think I've tried almost everything after all these years? Nothing works aside from going blank slate and complete isolation of all devices, they have hacking skills rivaling APT.So what actions did you take, did you change all passwords, scan any device with Norton Power Eraser (Windows)?
If I am correct on this, these people are some extreme criminal group, similar to Group 764, except they have elite hacking skills, and engage in cyberbullying, harassment, and destruction online abusing that hacking power. I don't know how they have so much resources to do this but they do.
Yeah I mean I grew up in a terrible household, my self esteem was eroded by abusers. I went online to the internet world and vented my ass off, and said very demeaning stuff about myself as a coping mechanism or to process trauma, and these hackers just happen to be there and utilize or weaponized it and put me in the spotlight for many people to see, adding in more and more trauma.Well, just know that whatever they say is not important. You are not worthless, cuck... not even sure why and how, rat and bastard, this is how I talk to my friends. Whatever they've shown, good on them... do you lack confidence?
Why don't you leave all these toxic places like Discord, Reddit and so on (I avoid them like plague) and start going on, going to the gym and you know...? All the stuff suitable for a 24-year-old dude...Yeah I mean I grew up in a terrible household, my self esteem was eroded by abusers. I went online to the internet world and vented my ass off, and said very demeaning stuff about myself as a coping mechanism or to process trauma, and these hackers just happen to be there and utilize or weaponized it and put me in the spotlight for many people to see, adding in more and more trauma.
At least I'm still mentally well to work and function, but yeah.
Good advice. Stop visiting those sites. You won't find true friends there.Why don't you leave all these toxic places like Discord, Reddit and so on (I avoid them like plague) and start going on, going to the gym and you know...? All the stuff suitable for a 24-year-old dude...