don’t really know where to post these questions. I’ll give it a shot here. 3 days ago, Google asked me to verify the login. The login location was exactly where I am, so I clicked on yes. Several hours later, I started to get messages that my Robinhood account, which I only use on my phone had a bank transfer. Then my google play account tried to send some1 money. Then my autofill started to show up with other people’s addresses and emails and passwords that I don’t know. Then I realized the login attempt was a hacker. My system was reinstalled about 2 weeks ago, and I have windows defense, Malwarebytes installed. No malware found. There are two things that really disturbed and confused me. I will list them below.
I started to check my google account activity, and I found something strange. The device I am using, a desktop, logged in with several different IP addresses, The first one is mine, and it belongs to spectrum. So does the 3rd and 5th ip addresses. The 2nd and 4th both belongs to the same ISP. But what confuses me is that how can my Desktop device log in to chrome with so many different IP addresses which clearly isn’t mine, since I never used VPNs.
Simultaneously, the same day, my mother’s bank account was hacked. It might have been thru my google chromes autofill or a data breach since she uses the same email/password everywhere. The hacker tried to threaten my mom via text messages with her personal information, like addresses where she used to live. And interestingly enough, the attacked texted her a company name with a truck tracking number(this is a pdf file that’s only my Desktop, which was downloaded a few days ago using Chrome). The file has the tracking number in its title, but the company name is only in the file.
Now, I am really concerned about how compromised I am. I dont understand how the hacker who tried to threaten my mom knows something thats only on my PC, and this same desktop of mine has logged in chrome via different ip addresses which dont belong to me.
My assumption is that the attacker got my google password from a data breach, then tried to get all the information from my account, then switched to logging in to my mother’s bank account thru google autofill, then also found out about that pdf file in my download history(I am not sure about this part because the download history is only device-specific.) But this doenst explain why my PC logged in to chrome using so many different IP addresses. Could it be that my machine has some kind of virus that provides a backdoor to the attacker? Please help.
My wife inadvertently clicked on a flash player update and suddenly my chrome browser is being managed by org. something about enterprise policy yadda yadda. I tried deleting chrome and reinstalling but to no avail. How do i get rid of this devil spawn browser hijacker for good?
Several of my personal accounts were hacked by my former employer (files were altered). I confronted them, mentioned the platforms but only sent them evidence of my Google account being hacked knowing that they might try to sweep it under the rug.
They conducted an “internal investigation” and concluded that the Apple Mail on my work device triggered those sign-ins. Besides the fact that their explanation doesn’t explain why my other accounts were hacked, I tested their theory and couldn’t replicate it. I looked it up and some people said that pull requests from Apple Mail don’t trigger logins. Can anyone confirm?
In addition, I did more digging and downloaded my Facebook data and this is what I found. It shows everything including the browser used, which a third-party app is not.
The hacks coincide with both a complaint I submitted to IT about their questionable practices and false allegations (made by IT a week after my complaint) that led to my dismissal.
I know that BIOS can get virus but it’s very rare, but it seems to me it’s pretty impossible or improbable for a virus to creep into your BIOS via normal computer use. Let’s say I’m using windows 10, even if I go as far as downloading a malware on my windows 10, it would seem that the worst damage it can do it to my windows 10 itself, not the BIOS, is that accurate? (Or at least, it’s incredibly difficult). If I don’t deliberately take a usb drive, and go into BIOS to m-flash it, how can I possibly infect a BIOS? So similarly, since your network would only work in the OS level, how can anyone possibly modify your BIOS by hacking your operating system?
And in the other direction, Supposed by some means my BIOS was infected with some virus, how can anyone possibly steal information on an operating system using the BIOS when the BIOS itself cannot be connected to the internet?
It seems to me the damage a BIOS can do is very local.
I received an email on the 14th saying that a hacker has access to my pc it says that at the time of hacking my account (firstname.lastname@example.org) had this password (it was a version of my password but not one that I’ve ever used for my gmail) and it claimed to have been watching me for months and that it had infected my pc through a adult website and had video of me when I was on the site doing you know what and that it would send it to my contacts and correspondence but I don’t have any contacts on my pc and also I use a different user and email when I do that, also why didn’t it send it to that email and not any of the other emails I have saved on my pc. Am I falling for a bullshit email or do I have something to worry about? Also it said I have 48 hours to pay them in bitcoins and that it would track when I opened it and start the countdown and I just opened it last night
The hack redirects all my sites to https://joinsilverclubbb.com
All are running WP 5.4.1 (latest) and I even have a site that barely runs any plugins, just a simple open source theme with 3 common plugins – Contact Form 7, etc.
Thus, can i assume the attacker might be coming from A2 Hosting?
I connect to my github repo using ssh keys which I have whitelisted in GitHub. I do pull/push to this repo from my linux server which is hosted in AWS.
If a hacker gains access to this AWS server, what all damage can he do to my code in github? Can he/she remove my repos permanently from GitHub?
Hi My computer is hacked, All my searches and files are read, could you tell me how to find out the hacked or compromised Service , so that I can block it
I have a (maybe dumb) question for you. I was wondering if there is a way to know if my router has been hacked.
I secured it the best that I can and also made it so only the mac addresses of the devices that I know can access my WiFi.
I turned off uspn, WPS, and remote access to the router settings even though I noticed that the page won’t load anymore on the device I used to set it up but it loads on my phone.
While days ago it would not load on my phone but it would on other devices but I keep seeing accesses to my social medias by devices that seem to be mine but I nor everyone else in my family used lately.
I’m afraid someone hacked my router and is using my devices remotely. How can I be sure? Would calling my ISP help? My router is from my ISP.