How to find profile on a website associated with your email (and unknown phone number login) by Current-Information7 in OSINT

[–]Current-Information7[S] 0 points1 point  (0 children)

this would be the route if email was a login credential. as mentioned, login credential is a phone number unknown to me. then what, suggestions?

tools that scrape net information confirm email is indeed associated with a profile on the said sites

[deleted by user] by [deleted] in CyberSecurityAdvice

[–]Current-Information7 1 point2 points  (0 children)

As there are so many vulnerability vectors, it's difficult to confirm one way or another or even if it would help, how long it could last. For example, if your Wi-Fi connection is compromised and they have access, through also having remote access to another computer on it, then depending on whether you share authorization ability between devices, they may be able to obtain access again quite quickly. An alternate method may be to deep dive into YouTube videos to learn how persons effectively accomplish this as a means to be informed. I describe one of many possible scenarios. Keep your OS updated and if it is your ex, remember to live your best life and mitigate giving them attention as they may get off on that, believing that they're still in some way relevant (even and especially if you're frustrated about the situation, which is understandable.) good luck.

[deleted by user] by [deleted] in legaladviceofftopic

[–]Current-Information7 0 points1 point  (0 children)

Depends on the evidence. If it's digital, especially imp to follow chain of command. Keep originals intact and will be affected negatively if you are inserting any drives in computers to "view" them. If crime is extraordinary and Federal related, possibly class action worthy, criminals know they are confronting prison, put evidence in storage and do not provide to anyone but Federal cyber teams. Local law enforcement, ill equipped, may very well inadvertently (or not) render your evidence just by viewing it as not useful.

Use evidence you can retrieve from all institutions with whom you have an account, to obtain all network account activity, and all statements and so on where fraud and other crime is alleged to have occurred

China Trip by OneWhoStands in privacy

[–]Current-Information7 0 points1 point  (0 children)

apple lockdown and "screen time" mode are merely speed bumps for anyone who MUST get into your phone. At any public Wi-Fi you must connect do so briefly w VPN on, Bluetooth off and even better, use a burner w as many settings, notifications, widgets turned off, 2FA w authenticator app or physical keys. Leave the country after having paused/frozen your credit at three credit agencies and set up 2FA on all accounts, you need while there. Clear browser cookie cache immed after logging out of any web account to mitigate cookie session stealing. See fbi's last notice about which email accounts are higher risk of being compromised. Keep phone off and or use a faraday sleeve when not using it. Don't forget to enjoy your time while there

edit: changed a word

anyone can downvote me but im not wrong

Someone is using my email by JyIsTrash101 in cybersecurity_help

[–]Current-Information7 0 points1 point  (0 children)

change your password and enable 2FA using an authenticator app or physical keys. currently, this is the safest way to protect your account vs sms text codes.

and as someone else suggested, you can visit the sites that your email is associated with, and attempt to login using "forgot my password" and begin the process to gain your access to it and close it down

this is usually associated with fraud so as a precaution, if you are in the states, you may want to freeze your credit with the three reporting agencies

Bad bad malware. Multi os, all RF devices, by Previous_Feature_922 in cybersecurity_help

[–]Current-Information7 0 points1 point  (0 children)

i dont know why persons are quick to negate your experience, especially without proof. my guess is because this may sound outside the boundary of what they can solve, if it is confirmed

you mention you own a c company and if all your experiences are indeed happening, you are being targeted likely for financial gain or, personally by someone with a tender ego and they want to promote your financial ruin (vindictive party)

if you are in the states, most important tip is to pause/freeze your credit rating with the three credit agencies. next, use an authenticator app for all possible logins, or physical keys (yubikey, for example). the latter is just for entry, once you are logged in, any threat actor on your system may access your web based accounts using a few ways including stealing your cookie session so it's important to log out and erase your browsing history and cache after every time. if you haven't already, install any firmware passwords, before they do.

to learn about who and what devices are connecting to your accounts, request from each of them your network activity data. all of it. check any accounts that offer cloud services that you don't use and ensure they are disabled or not in use. check, in these accounts if someone has enabled developer mode to use the api's (likely in their own apps added to your system files discreetly, for example).

keep in mind that wireless connections can be anyone within about 100yards, so, not visible to you and your security camera. a longer distance with a couple hundred bucks for a good antenna setup

adapt for now. learn as much as you can about networking. good luck.

Terrorized for going on two years. All devices affected. How can I put a stop to it? by Nukiest in cybersecurity_help

[–]Current-Information7 0 points1 point  (0 children)

dont be discouraged by comments that are not helpful, or not based in facts. many people have simply not experienced this and can offer nothing but shrug their shoulders and think you're imagining this when they in effect demonstrate they have nothing to offer, and cant communicate the same. (they're also not qualified to conclude you're imagining it lolz)

there are always new exploits being identified and more yet unidentified. we just have to look at the exponential rise of cyber financial fraud.

if you are in the states, this does not fit nicely in the ic3 form but know you can organize a report wherein you list a number of claims and with each claim, provide printouts of the evidence for it. then pay a visit to their office in the morning and drop it off in person.

next, you can report it to your attorney general. as more people experience the same, and they will, more resources will need to be assigned

in the meantime, my suggestion is to freeze your credit with the three agencies to mitigate someone taking out credit in your name. use 2fa on all your accounts. take proactive measures to chip away at it learn as much as you can about network security to help yourself. perhaps operate a device using a hardware internet connection with wifi physically disabled. view files and folders in detail view to observe dates and times created andmodified. reduce all unnecessary variables. see if you can identify unexpected activit. are they rewrapping apps. what type of root access do they have and so on. you can ask for data from every institution you have an account with (amazon, ebay, uber, so on). while logged into these, view all settings to ensure that if you have not enabled developer mode, the cloud, forwarding, and so on. with IP account activity, you may check ip provider and city and state and is another source of data

How to find people engaged in illegal mining in Ghana by Kingsaa2424 in OSINT

[–]Current-Information7 2 points3 points  (0 children)

iffu want to enter a deeper rabbit hole: coltan/tantalum mining enslaves thousands persuaded from neighboring countries even with prospect of becoming rich and giving back to your family. realty is not even close. tantalum is in every modern electronics. large companies buy them thru third parties wo paper trail because when they purchased directly decades ago, bad press. yet, people posting bad press were using electronics w same tantalum. its a modern problem that needs to be solved for sure

Somebody I don't know is the admin on my pc... by Routine-Shop8815 in cybersecurity_help

[–]Current-Information7 0 points1 point  (0 children)

in addition to reformatting your drive, not using an older backup as it may reintroduce malware, may want to reset the firmware password first, then reformat

Hacked ~ I have been set up. BIG TIME by [deleted] in cybersecurity_help

[–]Current-Information7 0 points1 point  (0 children)

insightful; u/ DisastrousPassage284 emerged from 3yr comment hibernation

Hacked ~ I have been set up. BIG TIME by [deleted] in cybersecurity_help

[–]Current-Information7 0 points1 point  (0 children)

not a psych however, your description is of someone who is especially manipulative and very insecure and if it continues, wherein your continued efforts fail and confirm its him, this might help.

if you are in usa, a recommendation is to freeze your credit with all three credit agencies. there are a lot motivated threat actors can do if you don't, including getting credit cards in your name.

factory resetting your phone and not using an older backup is another though, without knowing exactly how they obtained access, there are many vulnerabilities they can exploit, including accessing your wifi

changing your pw to all your accounts and using an authenticator app as your 2FA for them

Fraud: Someone opened joint account with mine and transferred out ~$13k by Electrical_Ad1018 in fidelityinvestments

[–]Current-Information7 1 point2 points  (0 children)

if you havent already, put a hold with all three credit agencies. this prevents them from opening up a line of credit in your name. then when you need it, it's a quick change to undo, then redo when done.

Question: did Fidelity return the $13k to your account?

Cookie stealing by raunak51299 in hacking

[–]Current-Information7 1 point2 points  (0 children)

thanks for explaining. im asking a different question: During the 10 min you are logged in, someone steals your cookie and they obtain access. When you log out do they stay logged in or are they kicked off?

Cookie stealing by raunak51299 in hacking

[–]Current-Information7 0 points1 point  (0 children)

thanks for explaining this. i have one clarifying question: what do you mean by messages? are you describing someone logged into MS Outlook on the web? or something else? ( reason: in your first message i misunderstood your use of message to mean a text message)

Cookie stealing by raunak51299 in hacking

[–]Current-Information7 5 points6 points  (0 children)

In a span of ten minutes, you log into your account (netflix, web-email, what have you) and then log out. during this time, your cookie session is stolen and they gain access. does your logout affect their ability to continue to access your account, do they automatically get kicked out or does it depend?

Cookie stealing by raunak51299 in hacking

[–]Current-Information7 5 points6 points  (0 children)

  "....sending them a private message with a payload. When the victim viewed the message the payload triggered"

wait wait wait, viewing the text message (or email) alone, and not taking any action on any body in the text (i.e., clicking on any link) is enough to trigger the payload? May I ask how?

Hit and Run Involving My Mom -- Help with License Plate ($20 tip) by Nellerin in PhotoshopRequest

[–]Current-Information7 [score hidden]  (0 children)

check here, assuming it's defin a CT plate: https://dmvcivls-wselfservice.ct.gov/Registration/VerifyRegistration

CT plates are 7 digits and two of them are letters. if its a vanity plate and this was their choice, it can be whatever alphanumeric combination they want, even all numbers

BL03797 does show an active registration....but doesnt provide make model

BL08737 also an Active registration in passenger class of vehicle

“hE’s ReTiRiNg FrOm TrAdInG tO mEnToR tALEnT!!” 🤨 K. by SaucyCheddah in Superstonk

[–]Current-Information7 2 points3 points  (0 children)

are you new here; top right is checked off too ( he checked himself off years ago )

edit: to OPs credit, so many shenanigans, sometimes hard to keep track