|
Post by hefferman1 on Feb 18, 2013 18:30:48 GMT -5
Hey everybody, If you got an email from my account today, do not open it. My Email account has been hacked. The email seems to have a virus in it. I was notified of the hack this AM, and have not sent out any emails today. I have changed my passwords.
Friends seem to know this was not me, because of how things ere written, still it seems some names where put to accounts, and some were not. I am trying to figure out who did this and why.
If you get an email from me saying "Not to judge me" and having an attachment do not open the attachment.
This sucks, I am contacting people to help find out who did this.
Ed Foster
|
|
|
Post by safetalker on Feb 18, 2013 19:53:57 GMT -5
Heff First you need to get a good virus detector that will do a root check. The guily [arty if probably that you got on a bad site. This places a root virus which is activated probably a week ago. Then when you next check your email it starts sending to the people on your addrsess book.
This is why I run linux.
|
|
|
Post by avordvet on Feb 19, 2013 4:58:06 GMT -5
Get a couple virus programs, run 'em day and night, and update 'em day and night. After I got hacked, I run multiple virus programs and a couple different encryption routines.
I also set up a couple old hard drives as portables along with some flash drives using various encrypted layers for periodic back-ups.
Heh, a good rule of thumb is; you better get me good when you got me... 'cause there usually won't be a second opportunity.
You need to run a couple programs that go to the root before replacing your anti-virus, make sure you are starting with a clean base... Ad aware is a good one, Clean Sweep is another... matter of fact run 'em both.
The best thing you can do is set the virus detection programs up for auto updates, then periodically, do a full sweep, not the usual "quicky" scan so you can get back to surfing porn, but a full in-depth smoke a cigarette after it scan... ESPECIALLY if your computer stays on full time, which in most cases means you don't get the boot scan, just monitoring.
and if there are any here not running and daily updating a virus detector while online, and especially in this "climate" you are a dumb ass.
|
|
|
Post by avordvet on Feb 19, 2013 5:02:04 GMT -5
AND as I told the wife, Do Not use the Internet Mail address books... shortly before someone got access to said address book.
Yahoo, MSN, Gmail, etc. These are all ripe for "harvesting", if you got 'em delete 'em.
AND stop passing on frigging "Forwards" which can go right to the "harvesters", if its that important to pass on, then strip the email and send as new.
|
|
|
Post by safetalker on Feb 19, 2013 9:18:33 GMT -5
Get a couple virus programs, run 'em day and night, and update 'em day and night. After I got hacked, I run multiple virus programs and a couple different encryption routines. --------------- One way however many virus programs will spend all of their time detecting and trying to delete the virus search data bases of the other virus programs. The only safe way is to open and read you emails on the providers site instead of on your local email reader. These viruses do not reside on the providers site they reside on your computer. This is why I use Linus. Windows uses the same engine for your browser as they do for your email client and your operating system. This makes it much more capable to host a virus than Linux or Apple except when you run windows programs on an apple. I mentioned a program called tails in another thread. It allows you to plug in the thumbdrive and boot to it and then go on line with no windows, linux, or apple os. From this thumbdrive you can check anything you download on the thumb and not on your hard drive. Remember! Bill Gates is a bad guy who thinks you and I should not have any money just credit cards that our employers pay with our wages. He also thinks we should be limited to how many kids he and his buddies allow us, and that there are already too many of us so we need to be killed so he can move about better. Download UBUNTU Linux as a DVD IOS and burn it. Then boot from it as a test and see why I like it much better than I ever did Windows. Plus it is free. It comes with a complete office that allows you to open, save, and write Office documents and output them and your email to a pdf for saving. I can access any of windows office's documents with my open office and read and resave and send knowing I didn't get or give a virus to any one. If I open a file with a virus it just looks like code in a location under a line. It does this without you losing you windows or your gates based programs. They even have a program called wine to allow you to run your windows programs you can't live without. Try it you will like it!
|
|
|
Post by midnightrider on Feb 19, 2013 9:24:57 GMT -5
ST, I am using Ubuntu as recommended, The part of your instructions about the DVD or thumbdrive I could not figure out. Any thing you can shed some light on this?
|
|
|
Post by aronatbc on Feb 19, 2013 11:39:14 GMT -5
|
|
|
Post by hefferman1 on Feb 20, 2013 21:06:44 GMT -5
This was not a normal Hack. I had virus protection and all the normal phishing stuff, and mal-ware protection. This did not show up, till they sent out the emails, it is like they were ghost for weeks till they tried to make me look bad.
They cloned my IP (Internet Protocol), and took over my email account. They did not take any credit card numbers, or do anything else to get money, or anything. They just watched me at first, then they sent out the emails the other day.
They were never on line for over 1 minute, and even a level 3 Tech could not trace it. They bounced between secure servers. The security guys could not find how they got in, but redid the entire security on my computer to prevent anyone else from being able to do this. It cost a pretty penny, but is worth it.
They tried to send out emails with links to things that would go after my character. I just went on line while they were doing this, and that is what messed them up.
I knew a few good hackers in college, but nothing like this. This seems to be an almost professional job.
|
|
|
Post by safetalker on Feb 20, 2013 22:23:25 GMT -5
ST, I am using Ubuntu as recommended, The part of your instructions about the DVD or thumbdrive I could not figure out. Any thing you can shed some light on this? when you started Ubuntu it asked if you wanted to install it on a USB. If you type into your browser "ubuntu install USB drive" you will get a very concise set of directions. The same is true for the TAILS program which is set up in a USB Stick. I use one that is 16GB ($19.95 at Sams) It is usually only for security. I use it on the library computer and they go bananas when the alarms go off but I get my mail and they have no changes to their computers.
|
|
|
Post by avordvet on Feb 21, 2013 4:37:01 GMT -5
I knew a few good hackers in college, but nothing like this. This seems to be an almost professional job. Pretty much the same happened to me TWICE awhile back during a period when I was really piling on the Obamanation, although they got through multiple layers of security, I nailed it the first time when the program started grabbing files and either changing file names or cloning them for nefarious uses. I am no dolt around computers, and hold a couple certifications in repair and networking (MCP), I isolated the virus(s) and locked the system down hard. took a day or so to straighten out the mess. I re-secured the PC and backed critical data again, but within a week I got hit again, and this time overwhelmingly bad. I was watching the PC do a couple odd things and I started digging around, must woke something up. Before I could lock the thing down, it started going after root files and generally just trashing the system. At the time I was running a good firewall, a good virus detector and a good malware scanner, got past all. In the end and before the programming totally locked up, a new program I was running ended up identifying a slew of Trojans and other misc viruses, buried though out the drive. If anyone gets through this one their really working at it, and if they do, another preloaded BAKSYS awaits.
|
|
|
Post by hefferman1 on Feb 21, 2013 14:34:27 GMT -5
I knew a few good hackers in college, but nothing like this. This seems to be an almost professional job. Pretty much the same happened to me TWICE awhile back during a period when I was really piling on the Obamanation, although they got through multiple layers of security, I nailed it the first time when the program started grabbing files and either changing file names or cloning them for nefarious uses. I am no dolt around computers, and hold a couple certifications in repair and networking (MCP), I isolated the virus(s) and locked the system down hard. took a day or so to straighten out the mess. I re-secured the PC and backed critical data again, but within a week I got hit again, and this time overwhelmingly bad. I watching the PC do a couple odd things and I started digging around, must woke something up. Before I could lock the thing down, it started going after root files and generally just trashing the system. At the time I was running a good firewall, a good virus detector and a good malware scanner, got past all. In the end and before the programming totally locked up, a new program I was running ended up identifying a slew of Trojans and other misc viruses, buried though out the drive. If anyone gets through this one their really working at it, and if they do, another preloaded BAKSYS awaits. Interesting we were both hit, even with good protection. Jack and I were talking and he said, "I am surprised it was you who got hit. I expected Don to get hit first. He is even more outspoken than you are." I will admit I felt a little ashamed, being not as outspoken as you are. I will try and work hard in the future.
|
|
|
Post by avordvet on Feb 21, 2013 14:37:40 GMT -5
Yup, ya start poking the hornets nest, you better expect a couple good stings.
|
|
Deleted
Deleted Member
Posts: 0
|
Post by Deleted on Feb 21, 2013 20:47:39 GMT -5
OK...forgot to mention...I had to get a new computer about a month ago...the old one was completely locked up and trashed by something. I hired the top tech at my wifes office. I didn't really think too much about it because the software and computer were so old.
He had to disassemble the computer and do something directly with the drive to copy and save my original files.
|
|
|
Post by hefferman1 on Feb 22, 2013 10:59:40 GMT -5
Once is an accident. Twice is a coincidence. Three times is enemy action.
Can anyone trace this? The guy I had tried but, said they were never on for more than 1 minute and bounced between servers.
|
|