Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

ACCOUNT TAKE OVER


  • Please log in to reply
25 replies to this topic

#1 Bionda

Bionda

  •  Avatar image
  • Members
  • 14 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Texas
  • Local time:08:23 PM

Posted 20 June 2023 - 01:10 PM

HI JACKED! I really need help and would appreciate any assistance. Oh em gee! I don't even know where to start. Nearly a four year nightmare.

Direct Access- through remote intrusion. So many devices compromised. Started with MS 365 apps and Google workspace.

 

Sooo much info, here it goes...My current new laptop. Every time IT remotes in my network changes and I see the logs have changed as well. The ghost hides until IT logs out and then boom changes everything. I should be the rooted admin. However, I don't think so any more. Purchased laptop 45 days ago and already had to reinstall Windows because "remote admin" disabled the firewall, updates and installed much older version of windows.Today I see Browser redirects, and changes in settings to Mozilla Firefox and Thunderbird.

 

Attached files and not sure about Windows Panther and WOW files. TIA

 

 

Edition    Windows 10 Pro
Version    22H2ijack
OS build    19045.3086

Experience Pack

 



BC AdBot (Login to Remove)

 


#2 Pkshadow

Pkshadow

  •  Avatar image
  • BC Advisor
  • 10,618 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:On the Brow of the Hill, West Coast, Canada
  • Local time:06:23 PM

Posted 20 June 2023 - 03:33 PM

Hi, we are sorry we can not help you or the condition.  Good Luck.


" mosquitoes really wake up everyday and choose violence "   — dalia (@_dalia7)
www.cnn.com/2020/07/23/health/mosquitoes-attraction-humans-future-wellness-scn/index.html
 

I-7 ASUS ROG Rampage II Extreme  / ASUS TUF Gaming F17 / I-7 4770K ASUS ROG Maximus VI Extreme


#3 cryptodan

cryptodan

    Bleepin Madman


  •  Avatar image
  • Members
  • 32,303 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:01:23 AM

Posted 20 June 2023 - 04:04 PM

"Remote / IT Admins" I smell a troll post.

My Linux Systems Specifications: My Desktop - https://dpaste.com/AKGGCBGSW - My Server - https://dpaste.com/8M228Z6ZM - My laptop Arch - https://dpaste.com/FKSMU4MM2

-----------------------------------------------------------------------------

Masters of Science in Computer and Digital Forensics - Stevenson University 
-----------------------------------------------------------------------------
US Navy Veteran - 2002 to 2006 - Blue and Gold and Proud to Serve - Honor, Courage, and Commitment
 

#4 Bionda

Bionda
  • Topic Starter

  •  Avatar image
  • Members
  • 14 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Texas
  • Local time:08:23 PM

Posted 20 June 2023 - 05:52 PM

Thank you for your service sir. And your response. What does Remote IT Admin/ smell a troll mean?



#5 cryptodan

cryptodan

    Bleepin Madman


  •  Avatar image
  • Members
  • 32,303 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:01:23 AM

Posted 20 June 2023 - 06:02 PM

Your post smells trollish and full of fluff and paranoia

Download and install min-toolbox from here: https://www.bleepingcomputer.com/download/minitoolbox/
 
minitoolbox.png
 

With the following:
 
Last 10 error messages from the logs
Installed Application
Problematic Devices 
List users and partitions


A remote admin wouldn't have access to a new laptop.

My Linux Systems Specifications: My Desktop - https://dpaste.com/AKGGCBGSW - My Server - https://dpaste.com/8M228Z6ZM - My laptop Arch - https://dpaste.com/FKSMU4MM2

-----------------------------------------------------------------------------

Masters of Science in Computer and Digital Forensics - Stevenson University 
-----------------------------------------------------------------------------
US Navy Veteran - 2002 to 2006 - Blue and Gold and Proud to Serve - Honor, Courage, and Commitment
 

#6 Bionda

Bionda
  • Topic Starter

  •  Avatar image
  • Members
  • 14 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Texas
  • Local time:08:23 PM

Posted 21 June 2023 - 08:33 AM

Well I am not a TROLL and fluff IDK maybe that is the lingo used. IT is not my trade. Concerned parent. All I can do is ask for help when I don't understand what is going on. I do know that Malwarebytes found a ROOTKIT and I have ongoing Fraud via debit and credit cards, having to get a new card every few months. Numerous crashed mobile devices, icloud and gmail issues being locked out. If you call that fluff then so be it! AND yes it has created paranoia.  Apple and Google advised my to call the police. Two reports filed and nothing. Thank you for the Toolkit. A lot of errors and issues.Code integrity errors. Especially the router- pinging Google and YAHOO.I don;t have either installed on this laptop. Have a nice day!


Edited by Bionda, 21 June 2023 - 09:21 AM.


#7 cryptodan

cryptodan

    Bleepin Madman


  •  Avatar image
  • Members
  • 32,303 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:01:23 AM

Posted 21 June 2023 - 08:46 AM

A rootkit on a new 45 day old computer?

Can you run the above tools?

My Linux Systems Specifications: My Desktop - https://dpaste.com/AKGGCBGSW - My Server - https://dpaste.com/8M228Z6ZM - My laptop Arch - https://dpaste.com/FKSMU4MM2

-----------------------------------------------------------------------------

Masters of Science in Computer and Digital Forensics - Stevenson University 
-----------------------------------------------------------------------------
US Navy Veteran - 2002 to 2006 - Blue and Gold and Proud to Serve - Honor, Courage, and Commitment
 

#8 Bionda

Bionda
  • Topic Starter

  •  Avatar image
  • Members
  • 14 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Texas
  • Local time:08:23 PM

Posted 21 June 2023 - 10:31 AM

The rootkit was found on another device. I have still have the log and can pull it up if you would like to know more. It seems to follow me. At one point "they- i call remote admin" had my network connected to theirs. As well as every smart device I owned. I felt like i was being traced and trace 24/7.

2021 I sold everything! House, car, all devices and electronics with bluetooth capabilities. New phone, number and email.:"They followed, and continue to gain access.

I did run the tools. A lot of issues, network, connectivity, router/server, code integrity.

And this just happened below. I contacted admin support to get back in. They said I got hit with a bad spam filter.

ERROR IN POSTING

[#1001]

You are not allowed to visit this community.

Need Help?

    Our help documentation
    Contact the community administrator



#9 Nukecad

Nukecad

  •  Avatar image
  • Members
  • 819 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:UK Lake District
  • Local time:02:23 AM

Posted 21 June 2023 - 10:42 AM

Just to ask, who exactly is this "remote IT" who are accessing your machines and disabling your firewalls?

How did you first find/contact them?

Is it also them who are showing you the changed logs?

Because what you say sounds like an IT support scam.

PS. Does your Windows version actually say "22H2ijack"? Can you screenshot that and post it here?

Edited by Nukecad, 21 June 2023 - 10:50 AM.

*** Out of Beer Error ->->-> Recovering Memory ***


#10 Bionda

Bionda
  • Topic Starter

  •  Avatar image
  • Members
  • 14 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Texas
  • Local time:08:23 PM

Posted 21 June 2023 - 11:07 AM

Thank you for responding. I honestly, don't know. I have my suspicions on who and where the access is coming from. The MITRE/Triage 100 page report reflect direct access remotely. Authentications/tokens.  I call it remote admin but that could be the wrong terminology.

IT is not my field of expertise by any means. What I have learned ( not much) is from my learning on my own. A friend that is a software engineer did the set up on this device. Not long after he exited my laptop via remote, the firewall settings were disabled, as well as windows updates. Also, somehow installed an old version of windows. I ran the logs through event viewer and saved them. I should have known better than to connect my new computer to a new modem and router prior to installing a wired network switch firewall. I believe "they" gained access through a one of my devices-TV, mobile phone, or printer from a MAC address. Also I  know that for the past couple of years I had issues with browser redirects. I thought I was working with customer support for Microsoft, ATT and Adobe but not so. My friend looked at the emails and said NO those emails are not authentic. I believe that customer support issue is happening again on this laptop with AVG and Malwarebytes.

 

Fast forward a few weeks. I was referred to another IT guy. We spend 6 hours looking at the laptop together and he did not see anything that looks suspicious. I had my doubts. The toolbox kit I ran tells me there are MANY issues and the router is being redirected.I don't know how to explain it other than It is kinda like a ghost mirroring my devices and the ultimate MF and nightmare for me ...


Edited by Bionda, 21 June 2023 - 11:15 AM.


#11 Nukecad

Nukecad

  •  Avatar image
  • Members
  • 819 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:UK Lake District
  • Local time:02:23 AM

Posted 21 June 2023 - 11:18 AM

Sorry, but you have been told this 'support' is not genuine but you are still contacting them and letting them access your new machines.

That would be stupidity and why your posts here do not ring true.

Although I do often help people with mental health issues, so am less quick to judge about odd behaviours
(Screenshot of the Windows version?)

Edited by Nukecad, 21 June 2023 - 11:22 AM.

*** Out of Beer Error ->->-> Recovering Memory ***


#12 cryptodan

cryptodan

    Bleepin Madman


  •  Avatar image
  • Members
  • 32,303 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:01:23 AM

Posted 21 June 2023 - 12:03 PM

No major company would ever remote into your computer to help you solve an issue not even your isp.

My Linux Systems Specifications: My Desktop - https://dpaste.com/AKGGCBGSW - My Server - https://dpaste.com/8M228Z6ZM - My laptop Arch - https://dpaste.com/FKSMU4MM2

-----------------------------------------------------------------------------

Masters of Science in Computer and Digital Forensics - Stevenson University 
-----------------------------------------------------------------------------
US Navy Veteran - 2002 to 2006 - Blue and Gold and Proud to Serve - Honor, Courage, and Commitment
 

#13 Bionda

Bionda
  • Topic Starter

  •  Avatar image
  • Members
  • 14 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Texas
  • Local time:08:23 PM

Posted 21 June 2023 - 04:27 PM

This is exactly when and how it started. Issues with my iPhone, iCloud, apps and Mac Book. One thing lead to another compromising PC, laptops, and other devices

Apple fixes zero-days used to deploy Triangulation spyware via iMessage

Apple addressed three new zero-day vulnerabilities exploited in attacks installing Triangulation spyware on iPhones via iMessage zero-click exploits.

"Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7," the company says when describing Kernel and WebKit vulnerabilities tracked as CVE-2023-32434 and CVE-2023-32435.

The two security flaws were found and reported by Kaspersky security researchers Georgy Kucherin, Leonid Bezvershenko, and Boris Larin.

Kaspersky also published a report earlier today with additional details on an iOS spyware component used in a campaign the cybersecurity company tracks as "Operation Triangulation."

"The implant, which we dubbed TriangleDB, is deployed after the attackers obtain root privileges on the target iOS device by exploiting a kernel vulnerability. It is deployed in memory, meaning that all traces of the implant are lost when the device gets rebooted," Kaspersky said today.

"Therefore, if the victim reboots their device, the attackers have to reinfect it by sending an iMessage with a malicious attachment, thus launching the whole exploitation chain again. In case no reboot occurs, the implant uninstalls itself after 30 days, unless this period is extended by the attackers.

Used by U.S. state hackers per FSB claims

The attacks started in 2019 and are still ongoing, according to Kaspersky, who reported in early June that some iPhones on its network were infected with previously unknown spyware via iMessage zero-click exploits that exploited iOS zero-day

Apple also patched today a WebKit zero-day vulnerability (CVE-2023-32439) reported by an anonymous researcher that can let attackers gain arbitrary code execution on unpatched devices by exploiting a type confusion issue.


The list of affected devices is quite extensive, as the zero-day affects older and newer models.

Since the start of the year, Apple has patched a total of 9 zero-day vulnerabilities that were exploited in the wild to compromise iPhones, Macs, and iPads.

Last month, the company fixed three more zero-days (CVE-2023-32409, CVE-2023-28204, and CVE-2023-32373), the first reported by Google Threat Analysis Group and Amnesty International Security Lab researchers and likely used to install commercial spyware.

#14 cryptodan

cryptodan

    Bleepin Madman


  •  Avatar image
  • Members
  • 32,303 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:01:23 AM

Posted 21 June 2023 - 04:57 PM

You aren't a target for government / state based hackers and those with the intelligence and intellectual ability to attack you a commoner.

They woukd go after people like me who is/was a government employee with a clearance.

My Linux Systems Specifications: My Desktop - https://dpaste.com/AKGGCBGSW - My Server - https://dpaste.com/8M228Z6ZM - My laptop Arch - https://dpaste.com/FKSMU4MM2

-----------------------------------------------------------------------------

Masters of Science in Computer and Digital Forensics - Stevenson University 
-----------------------------------------------------------------------------
US Navy Veteran - 2002 to 2006 - Blue and Gold and Proud to Serve - Honor, Courage, and Commitment
 

#15 Pkshadow

Pkshadow

  •  Avatar image
  • BC Advisor
  • 10,618 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:On the Brow of the Hill, West Coast, Canada
  • Local time:06:23 PM

Posted 21 June 2023 - 08:05 PM

Not going to jump in here but you need to look in your browser/s and check if they are using Google or Yahoo DNS, switch to another if available.

 

One time all browsers could set what DNS Provider and those 2 were options.   Mine I switched long ago to CIRA Canadian Shield and seem to be locked in to that.

 

You were given and told to run the MTB and to post the results so that we could help you.  

 

With out doing as asked there can be no help provided.

 

Do this please :  

Please Post a "link" of Speccy Report.
Please install Speccy Free : https://m.majorgeeks.com/files/details/speccy.html
Use Custom Install
  At the Top Left Corner of Speccy --> Click File and then Click Publish Snapshot Report, a window will popup and Click YES. --> Another popup will appear and then Click "Copy To Clipboard" then Paste that "link" to your next reply in your thread.

 

Download Minitoolbox from the below link :
http://www.bleepingcomputer.com/download/minitoolbox/
  Run the tool and only select the following tick boxes.
    -List last 10 Event viewer errors
    -List installed programs
    -List devices
    -List users, partition and memory size
Now click "Go" and Copy/Paste and post the output text in your next reply


" mosquitoes really wake up everyday and choose violence "   — dalia (@_dalia7)
www.cnn.com/2020/07/23/health/mosquitoes-attraction-humans-future-wellness-scn/index.html
 

I-7 ASUS ROG Rampage II Extreme  / ASUS TUF Gaming F17 / I-7 4770K ASUS ROG Maximus VI Extreme





1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users