User Panel
Quoted: op you probably should change your passwords and get two step auth. also I got hacked one time, someone used my damn credit card and IP address to monthly subscribe to plumper pass and Cher Bear 22's only fans. That bastard! had to calm the wife down when she saw the fraudulent charges View Quote This is a safe space. You can tell us that you bought the BBBBW porn. |
|
Quoted: Most likely you don’t have a virus, you just entered your credentials into a phishing email. View Quote Right. And Verizon said now the bot is going to keep trying to attack everything linked to my one email until it gets tired of doing so. But for now I think I took care of everything that could be linked. So I guess I have to wait and see what happens. |
|
|
The first thing you should do after securing a hacked email is to go in and make sure no forwarding rules were added to your email account.
|
|
Quoted: Right. And Verizon said now the bot is going to keep trying to attack everything linked to my one email until it gets tired of doing so. But for now I think I took care of everything that could be linked. So I guess I have to wait and see what happens. View Quote View All Quotes View All Quotes Quoted: Right. And Verizon said now the bot is going to keep trying to attack everything linked to my one email until it gets tired of doing so. But for now I think I took care of everything that could be linked. So I guess I have to wait and see what happens. Your personal email password is now unique, ~20 characters, and you’ve implemented multi factor authentication (not via text message?). Then yeah, pretty solid. Bank should be similar though too many of them love sms based MFA. Quoted: The first thing you should do after securing a hacked email is to go in and make sure no forwarding rules were added to your email account. |
|
Quoted: Right. And Verizon said now the bot is going to keep trying to attack everything linked to my one email until it gets tired of doing so. But for now I think I took care of everything that could be linked. So I guess I have to wait and see what happens. View Quote View All Quotes View All Quotes Quoted: Quoted: Most likely you don't have a virus, you just entered your credentials into a phishing email. Right. And Verizon said now the bot is going to keep trying to attack everything linked to my one email until it gets tired of doing so. But for now I think I took care of everything that could be linked. So I guess I have to wait and see what happens. You know what all of the IT people in this thread agree on? MFA. That's a clue, since GD can't even figure out if traps are gay. If this had happened to me, I'd just wipe the computer with a fresh install of Win10/11. Its probably unnecessary, but its relatively technically easy to do. OP does need to save all of the files he cares about from his harddrive somewhere first. |
|
Quoted: I tend to agree that MOST of this is probably OP falling for a phishing email, and having zero MFA/common passwords between accounts. You know what all of the IT people in this thread agree on? MFA. That's a clue, since GD can't even figure out if traps are gay. If this had happened to me, I'd just wipe the computer with a fresh install of Win10/11. Its probably unnecessary, but its relatively technically easy to do. OP does need to save all of the files he cares about from his harddrive somewhere first. View Quote What is MFA? |
|
Happened to be a few years ago. Weak password on my email...
Check your phone and mailing addresses on your accounts. They changed those. https://haveibeenpwned.com/ |
|
Quoted: Happened to be a few years ago. Weak password on my email... Check your phone and mailing addresses on your accounts. They changed those. https://haveibeenpwned.com/ View Quote They tried on the bank account logins. Changed the login and password. Changed the mailing address and phone number. |
|
|
Password Vault and MFA now, I'm sure this has already been said but I cannot stress enough how important unique and strong passwords are!
|
|
|
|
Quoted: Ok. Have to figure out how to switch everything over to that. Thanks View Quote https://www.cisa.gov/sites/default/files/publications/NCSAM_MFAGuide_2020.pdf Lock Down Your Login |
|
|
Quoted: Ok. Have to figure out how to switch everything over to that. Thanks View Quote View All Quotes View All Quotes Quoted: Quoted: Multi-factor authentication You sign in with a password, but also have to provide another form of ID, such as a six-digit code generated from an app on your smartphone Ok. Have to figure out how to switch everything over to that. Thanks Take a look at 1password. It's a fantastic way to stay safe. |
|
Call your bank immediately and lock your accounts. Tell them that you've been compromised.
Then change the password on your e-mail. Make it secure. Then get a password manager like Bitwarden and change ALL YOUR PASSWORDS. Enable 2-factor authentication on all your bank accounts and credit cards. Get a large flash drive and back up all your documents / pics. Wipe your computer and/or get a new one if it's already really old Factory reset your phone after backing up anything you need. |
|
|
Quoted: Multi Factor Authentication. Usually your login/password followed by a PIN sent via text message. View Quote View All Quotes View All Quotes Quoted: Quoted: What is MFA? Multi Factor Authentication. Usually your login/password followed by a PIN sent via text message. |
|
Get 2 factor authentication on everything you can. It isn't perfect but will slow down scumbags.
|
|
Quoted: Get 2 factor authentication on everything you can. It isn't perfect but will slow down scumbags. View Quote Yes, because I was being prompted with either my bank or one of the other companies and I ignored it and they STILL got in. But over the last two days this bot was going through everything. I'm sure there's still things I haven't thought of but all the bigger things I've already addressed. |
|
|
|
Quoted: Cloned my SIM card....like physically? No one had any access to my phone. Or can that be done virtually? If so, how do I see if that happened? View Quote View All Quotes View All Quotes Quoted: Quoted: If they have cloned your SIM card, they could be receiving these messages also. Cloned my SIM card....like physically? No one had any access to my phone. Or can that be done virtually? If so, how do I see if that happened? Its arguably possible to remote clone a SIM card in some situations, however, I've not seen it. What I have seen is a SIM card getting cloned many months or even years before a bad actor used it. Its also possible that MFA wasn't enforced, and you could log on without it, depending on how shitty it was setup. OR email verfication was also enabled, and the bad actor used that instead, then deleted the email traces in your account so you wouldn't see them. Another possibility how SMS based MFA can be bypassed is an OMG cable , or similar. Are ALL of your cables OEM or completely trusted OP, and you've never plugged your phone into a sketchy free one? |
|
Quoted: Cloned my SIM card....like physically? No one had any access to my phone. Or can that be done virtually? If so, how do I see if that happened? View Quote Some people will steal a "master phone" from a Verizon store that has admin access, allows them to clone SIM cards. I am not an expert about this but it's possible. It's unlikely that it happened in your case, but possible. |
|
Quoted: Most people would benefit from something like a $30-$50 Yubikey which adds two factor to any FIDO-compliant app. I've used them for years including with the DoD - we issued them out as a second requirement for admins on top of their CAC access cards. https://m.media-amazon.com/images/S/aplus-media-library-service-media/d9d210be-70bb-4ba7-adc4-87a96a12e897.__CR0,0,1213,750_PT0_SX970_V1___.jpg View Quote |
|
Quoted: Ok. Have to figure out how to switch everything over to that. Thanks View Quote View All Quotes View All Quotes Quoted: Quoted: Multi-factor authentication You sign in with a password, but also have to provide another form of ID, such as a six-digit code generated from an app on your smartphone Ok. Have to figure out how to switch everything over to that. Thanks it sounds like you have not followed it yet and locked down your account |
|
Quoted: You're talking to a guy who still uses Hotmail. Do you really think he understood a single word of that post? View Quote View All Quotes View All Quotes Quoted: Quoted: First- Unplug your comp from the internet. On another comp, download zorin OS, yes it linux but it was designed for our grandmas to use linux. I hope you had backups of your files. DO NOT do anything with your current computer, you may have a keylogger. Flash Zorin OS to a USB thumb drive. Boot from that thumb drive. One at the install screen, go advanced and erase hard drive. Once installed, change email from microcrap to proton mail or fastmail. Pay for your email. Download and use keepassXC, one password for your database/ Seperate usernames and passwords for each account. Plus, put a fraud alert on your credit reports. https://zorin.com/os/download/17/core/ https://keepassxc.org/ You're talking to a guy who still uses Hotmail. Do you really think he understood a single word of that post? and doesn't know how to do a virus scan. |
|
Quoted: Right. And Verizon said now the bot is going to keep trying to attack everything linked to my one email until it gets tired of doing so. But for now I think I took care of everything that could be linked. So I guess I have to wait and see what happens. View Quote No. You need to be pro-active. Go in and start fixing stuff NOW. Did you turn on 2FA for hotmail? Did you restart your router? Did you restart your computer? Did you restart your modem? |
|
OP's password of "P@ssw0rd123" was probably too weak... or his info was hacked somewhere else.
OP: Get a password manager. Something like Keepass. Learn how to use it, watch YouTube videos if you need to. CHANGE ALL OF YOUR PASSWORDS AND NEVER USE THE SAME PASSWORD IN MORE THAN ONE PLACE. MAKE THEM LONG AN UNMEMORABLE. Enable two factor authentication everywhere you can, and if you have the option of using a passcode generator (like on your phone), do that instead of SMS messages. This is a start, but act like they got into EVERYTHING. Adding: Get off of using your Hotmail email address. I'd recommend paying for something like ProtonMail, and once you have an account set up, you get a few aliases. Set one up for your banking and financial uses. Set one up for general things, and set one up for social media. Update any other service using your hotmail account to the new email account. If they won't let you change your email, CANCEL whatever it is, and set up a new account using your new email address. As for your computer, it's hard to tell if the compromise originated from there, or if they just cracked your password (or obtained it from a leak somewhere else). I'm more inclined to think the latter, though. If anything, call Dell support and have them walk you through wiping your computer and reinstalling the OS. |
|
I would have a professional PC Repair shop do a backup of your files then reformat your Windows PC. Should be under $200. Some of the spyware used today is very very sneaky. Your PC might be fine but I always assume the worst. Reformat is the only way to be sure.
You are going to want to lock your credit too. If they've got this much on you they will for sure be trying to open new lines of credit and bank accounts using your information. Probably got most of your info from a dark web leak and got you to click on a bad e-mail to get the rest of the access they needed. All of our info is out there thanks to poor security from these big corporations that we all use. I would go to http://www.aura.com (from a CLEAN PC) and sign up for their service. You have to give them a bunch of info but they are legit and I have several clients that use them. It's basically a one stop shop for identity theft and credit monitoring. Makes things simple. Costs like $25/mo I think. You can lock your credit through Aura for most of the credit agencies and you will get alerts if someone tries to open accounts in your name. I highly suggest trying them out. You need to change all your passwords for every service you use. Use unique passwords and enable 2 factor authentication on every service that allows it. This type of identity theft happens all the time and the steps above should be your first move. You have to act fast because the criminals that are targeting you are already several steps ahead of you. You ARE actively being targeted. |
|
Access to you primary email is the master-key to your life (it is the primary mechanism for password resets on most online accounts). Reusing the same email/password pair of your primary email on other online accounts is suicidal, and one of the most common ways for your email account to be compromised.
On your email account settings page, make sure your email is not being forwarded to another outside account somewhere, and that there are not any rules automatically moving your mail to a subfolder you don't normally check. You need to change all your important passwords from a clean machine as soon as possible, and make sure you use a unique strong password for each account. Start with your email account and work you way out. You need to be using multifactor on any account that offers it... but if it is going to take you an extended period of time to figure out how to do it, change your passwords first, then go back and add MFA later... stop the bleeding. Put a freeze on your credit with the big 3. |
|
Quoted: I would have a professional PC Repair shop do a backup of your files then reformat your Windows PC. Should be under $200. Some of the spyware used today is very very sneaky. Your PC might be fine but I always assume the worst. Reformat is the only way to be sure. You are going to want to lock your credit too. If they've got this much on you they will for sure be trying to open new lines of credit and bank accounts using your information. Probably got most of your info from a dark web leak and got you to click on a bad e-mail to get the rest of the access they needed. All of our info is out there thanks to poor security from these big corporations that we all use. I would go to http://www.aura.com (from a CLEAN PC) and sign up for their service. You have to give them a bunch of info but they are legit and I have several clients that use them. It's basically a one stop shop for identity theft and credit monitoring. Makes things simple. Costs like $25/mo I think. You can lock your credit through Aura for most of the credit agencies and you will get alerts if someone tries to open accounts in your name. I highly suggest trying them out. You need to change all your passwords for every service you use. Use unique passwords and enable 2 factor authentication on every service that allows it. This type of identity theft happens all the time and the steps above should be your first move. You have to act fast because the criminals that are targeting you are already several steps ahead of you. You ARE actively being targeted. View Quote I've seen a bad actor sit around for 10 months before springing an ACH fraud scam, and I know that some of them are even more patient. |
|
Quoted: SMS MFA is pretty weak, though its significantly better than nothing. I would either take the Yubi key suggestion, or use Duo. For most stuff Duo or Microsoft Authenticator are going to be the better choices over SMS based stuff. View Quote View All Quotes View All Quotes Quoted: Quoted: Quoted: What is MFA? Multi Factor Authentication. Usually your login/password followed by a PIN sent via text message. I use DUO (fob, no cell phone allowed) at work. My credit union uses SMS. |
|
Buy a Yubikey and start using a password manager to create randomly generated 20 character passwords for all of your accounts.
|
|
Quoted: We used to have a thread about stuff people had bought online while hammered, or after taking a z drug like ambien. This is a safe space. You can tell us that you bought the BBBBW porn. View Quote View All Quotes View All Quotes Quoted: Quoted: op you probably should change your passwords and get two step auth. also I got hacked one time, someone used my damn credit card and IP address to monthly subscribe to plumper pass and Cher Bear 22's only fans. That bastard! had to calm the wife down when she saw the fraudulent charges This is a safe space. You can tell us that you bought the BBBBW porn. If I weren't married, I'd have like the highest subscription...but I am married and trying to be a good husband. |
|
Nobody suggested wrapping the OP’s phone and pc in aluminum foil?
Amateurs….. |
|
|
Every account you have used that password or a version of that password for will be compromised.
|
|
What do you mean Microsoft stepped in and unblocked things? Did they tell you to contact them? Very common scam
|
|
Quoted: It's actually kind of nice when a serious GD thread gets mostly helpful responses instead of shitposts. View Quote View All Quotes View All Quotes Quoted: Quoted: Nobody suggested wrapping the OP's phone and pc in aluminum foil? Amateurs .. yea, I had to double check I wasn't in team sorry this happened OP, but good reminder to us all to stay vigilant |
|
Quoted: yea, I had to double check I wasn't in team sorry this happened OP, but good reminder to us all to stay vigilant View Quote Yes!!! I'm extremely appreciative for this!!! As for being vigilant. I did activate 2 step authentication and this bot is going nuts!! I got 200-300 rapid fired notifications to authenticate for the hacked email. They are actively trying to get in hour by hour. I'm getting hit with 100 spam messages that I then have to go in and flag as spam as well. After the dust settles and I don't have to constantly be engaging this bot/hacker, I'll start to educate myself with the key/password devices and the other hardware or software suggested here. But I am trying to keep my business afloat with requires my attention so for now running my business and fighting this bot/hacker is all I can do. I wish there was a way to destroy the thing, I'm just not tech savvy enough to go on the offensive. But yes, thank you all for your helpful info/replies. While I can't simultaneously do all of them, I do still appreciate you sharing and I'll be going back and evaluating them one by one to gear myself up so this mess doesn't happen again. But as it was described to me, I have to wait for this bot to get bored/tired and go away. EDIT: It is actively sending me like 200+ spam messages at the rate of 1 per second. Is there actually anything I can do? Or just put up with this BS for however long it wants to keep going? I report the spam/phishing but it just keeps coming. Thanks |
|
Quoted: Yes!!! I'm extremely appreciative for this!!! As for being vigilant. I did activate 2 step authentication and this bot is going nuts!! I got 200-300 rapid fired notifications to authenticate for the hacked email. They are actively trying to get in hour by hour. I'm getting hit with 100 spam messages that I then have to go in and flag as spam as well. After the dust settles and I don't have to constantly be engaging this bot/hacker, I'll start to educate myself with the key/password devices and the other hardware or software suggested here. But I am trying to keep my business afloat with requires my attention so for now running my business and fighting this bot/hacker is all I can do. I wish there was a way to destroy the thing, I'm just not tech savvy enough to go on the offensive. But yes, thank you all for your helpful info/replies. While I can't simultaneously do all of them, I do still appreciate you sharing and I'll be going back and evaluating them one by one to gear myself up so this mess doesn't happen again. But as it was described to me, I have to wait for this bot to get bored/tired and go away. EDIT: It is actively sending me like 200+ spam messages at the rate of 1 per second. Is there actually anything I can do? Or just put up with this BS for however long it wants to keep going? I report the spam/phishing but it just keeps coming. Thanks View Quote View All Quotes View All Quotes Quoted: Quoted: yea, I had to double check I wasn't in team sorry this happened OP, but good reminder to us all to stay vigilant Yes!!! I'm extremely appreciative for this!!! As for being vigilant. I did activate 2 step authentication and this bot is going nuts!! I got 200-300 rapid fired notifications to authenticate for the hacked email. They are actively trying to get in hour by hour. I'm getting hit with 100 spam messages that I then have to go in and flag as spam as well. After the dust settles and I don't have to constantly be engaging this bot/hacker, I'll start to educate myself with the key/password devices and the other hardware or software suggested here. But I am trying to keep my business afloat with requires my attention so for now running my business and fighting this bot/hacker is all I can do. I wish there was a way to destroy the thing, I'm just not tech savvy enough to go on the offensive. But yes, thank you all for your helpful info/replies. While I can't simultaneously do all of them, I do still appreciate you sharing and I'll be going back and evaluating them one by one to gear myself up so this mess doesn't happen again. But as it was described to me, I have to wait for this bot to get bored/tired and go away. EDIT: It is actively sending me like 200+ spam messages at the rate of 1 per second. Is there actually anything I can do? Or just put up with this BS for however long it wants to keep going? I report the spam/phishing but it just keeps coming. Thanks I'm assuming the spam messages are email. Set up an email rule to send messages from that address to junk or trash and ignore them. |
|
Quoted: I'm assuming the spam messages are email. Set up an email rule to send messages from that address to junk or trash and ignore them. View Quote Ok, I can try that. I did accidentally open one of them but not the attachment in it....while trying to sign out of the email. Am I fucked all over again? It's still actively attacking memberships even the ones I haven't used in years....that are associated with that email address. Ex. Booking.com, Linked In, etc. I'm making a list of what I see so when I have a chance today I can go to those sites and either delete the accounts or change the passwords....if able to I'll do the 2 step authentication for them as well. Haven't received any spam or log in attempts in 1-2 hours. I'm wondering if that's because it's resting, because it already got in or because it's bored/done. Thoughts? Thanks! |
|
Quoted: Ok, I can try that. I did accidentally open one of them but not the attachment in it....while trying to sign out of the email. Am I fucked all over again? It's still actively attacking memberships even the ones I haven't used in years....that are associated with that email address. Ex. Booking.com, Linked In, etc. I'm making a list of what I see so when I have a chance today I can go to those sites and either delete the accounts or change the passwords....if able to I'll do the 2 step authentication for them as well. Haven't received any spam or log in attempts in 1-2 hours. I'm wondering if that's because it's resting, because it already got in or because it's bored/done. Thoughts? Thanks! View Quote You can probably block the sender though I’m sure they use multiple emails. Yes, them going after accounts you haven’t used is typical credential stuffing attack, and a lesson on why we don’t use the same password across the internet. |
|
Quoted: Ok, I can try that. I did accidentally open one of them but not the attachment in it....while trying to sign out of the email. Am I fucked all over again? It's still actively attacking memberships even the ones I haven't used in years....that are associated with that email address. Ex. Booking.com, Linked In, etc. I'm making a list of what I see so when I have a chance today I can go to those sites and either delete the accounts or change the passwords....if able to I'll do the 2 step authentication for them as well. Haven't received any spam or log in attempts in 1-2 hours. I'm wondering if that's because it's resting, because it already got in or because it's bored/done. Thoughts? Thanks! View Quote View All Quotes View All Quotes Quoted: Quoted: I'm assuming the spam messages are email. Set up an email rule to send messages from that address to junk or trash and ignore them. Ok, I can try that. I did accidentally open one of them but not the attachment in it....while trying to sign out of the email. Am I fucked all over again? It's still actively attacking memberships even the ones I haven't used in years....that are associated with that email address. Ex. Booking.com, Linked In, etc. I'm making a list of what I see so when I have a chance today I can go to those sites and either delete the accounts or change the passwords....if able to I'll do the 2 step authentication for them as well. Haven't received any spam or log in attempts in 1-2 hours. I'm wondering if that's because it's resting, because it already got in or because it's bored/done. Thoughts? Thanks! I doubt it's "resting". Either the attack is over or maybe the device hosting the bot is not connected to the internet due to the rather large cell service outage. |
|
....annnnnnnd the bot just attacked again and the 2 step authentication prompted me like 200+ times in a 5 min span. Then it stopped.
As I was typing, happened again but only a few times. Maybe the bot is getting bored?? |
|
Quoted: ....annnnnnnd the bot just attacked again and the 2 step authentication prompted me like 200+ times in a 5 min span. Then it stopped. As I was typing, happened again but only a few times. Maybe the bot is getting bored?? View Quote The password for the account the bot is attacking has been changed since the original compromise right? |
|
AR15.COM is the world's largest firearm community and is a gathering place for firearm enthusiasts of all types.
From hunters and military members, to competition shooters and general firearm enthusiasts, we welcome anyone who values and respects the way of the firearm.
Subscribe to our monthly Newsletter to receive firearm news, product discounts from your favorite Industry Partners, and more.
Copyright © 1996-2024 AR15.COM LLC. All Rights Reserved.
Any use of this content without express written consent is prohibited.
AR15.Com reserves the right to overwrite or replace any affiliate, commercial, or monetizable links, posted by users, with our own.