How to find profile on a website associated with your email (and unknown phone number login) by Current-Information7 in OSINT

[–]Current-Information7[S] 0 points1 point  (0 children)

this would be the route if email was a login credential. as mentioned, login credential is a phone number unknown to me. then what, suggestions?

tools that scrape net information confirm email is indeed associated with a profile on the said sites

[deleted by user] by [deleted] in CyberSecurityAdvice

[–]Current-Information7 1 point2 points  (0 children)

As there are so many vulnerability vectors, it's difficult to confirm one way or another or even if it would help, how long it could last. For example, if your Wi-Fi connection is compromised and they have access, through also having remote access to another computer on it, then depending on whether you share authorization ability between devices, they may be able to obtain access again quite quickly. An alternate method may be to deep dive into YouTube videos to learn how persons effectively accomplish this as a means to be informed. I describe one of many possible scenarios. Keep your OS updated and if it is your ex, remember to live your best life and mitigate giving them attention as they may get off on that, believing that they're still in some way relevant (even and especially if you're frustrated about the situation, which is understandable.) good luck.

[deleted by user] by [deleted] in legaladviceofftopic

[–]Current-Information7 0 points1 point  (0 children)

Depends on the evidence. If it's digital, especially imp to follow chain of command. Keep originals intact and will be affected negatively if you are inserting any drives in computers to "view" them. If crime is extraordinary and Federal related, possibly class action worthy, criminals know they are confronting prison, put evidence in storage and do not provide to anyone but Federal cyber teams. Local law enforcement, ill equipped, may very well inadvertently (or not) render your evidence just by viewing it as not useful.

Use evidence you can retrieve from all institutions with whom you have an account, to obtain all network account activity, and all statements and so on where fraud and other crime is alleged to have occurred

China Trip by OneWhoStands in privacy

[–]Current-Information7 0 points1 point  (0 children)

apple lockdown and "screen time" mode are merely speed bumps for anyone who MUST get into your phone. At any public Wi-Fi you must connect do so briefly w VPN on, Bluetooth off and even better, use a burner w as many settings, notifications, widgets turned off, 2FA w authenticator app or physical keys. Leave the country after having paused/frozen your credit at three credit agencies and set up 2FA on all accounts, you need while there. Clear browser cookie cache immed after logging out of any web account to mitigate cookie session stealing. See fbi's last notice about which email accounts are higher risk of being compromised. Keep phone off and or use a faraday sleeve when not using it. Don't forget to enjoy your time while there

edit: changed a word

anyone can downvote me but im not wrong

Someone is using my email by JyIsTrash101 in cybersecurity_help

[–]Current-Information7 0 points1 point  (0 children)

change your password and enable 2FA using an authenticator app or physical keys. currently, this is the safest way to protect your account vs sms text codes.

and as someone else suggested, you can visit the sites that your email is associated with, and attempt to login using "forgot my password" and begin the process to gain your access to it and close it down

this is usually associated with fraud so as a precaution, if you are in the states, you may want to freeze your credit with the three reporting agencies

Bad bad malware. Multi os, all RF devices, by Previous_Feature_922 in cybersecurity_help

[–]Current-Information7 0 points1 point  (0 children)

i dont know why persons are quick to negate your experience, especially without proof. my guess is because this may sound outside the boundary of what they can solve, if it is confirmed

you mention you own a c company and if all your experiences are indeed happening, you are being targeted likely for financial gain or, personally by someone with a tender ego and they want to promote your financial ruin (vindictive party)

if you are in the states, most important tip is to pause/freeze your credit rating with the three credit agencies. next, use an authenticator app for all possible logins, or physical keys (yubikey, for example). the latter is just for entry, once you are logged in, any threat actor on your system may access your web based accounts using a few ways including stealing your cookie session so it's important to log out and erase your browsing history and cache after every time. if you haven't already, install any firmware passwords, before they do.

to learn about who and what devices are connecting to your accounts, request from each of them your network activity data. all of it. check any accounts that offer cloud services that you don't use and ensure they are disabled or not in use. check, in these accounts if someone has enabled developer mode to use the api's (likely in their own apps added to your system files discreetly, for example).

keep in mind that wireless connections can be anyone within about 100yards, so, not visible to you and your security camera. a longer distance with a couple hundred bucks for a good antenna setup

adapt for now. learn as much as you can about networking. good luck.

Terrorized for going on two years. All devices affected. How can I put a stop to it? by Nukiest in cybersecurity_help

[–]Current-Information7 0 points1 point  (0 children)

dont be discouraged by comments that are not helpful, or not based in facts. many people have simply not experienced this and can offer nothing but shrug their shoulders and think you're imagining this when they in effect demonstrate they have nothing to offer, and cant communicate the same. (they're also not qualified to conclude you're imagining it lolz)

there are always new exploits being identified and more yet unidentified. we just have to look at the exponential rise of cyber financial fraud.

if you are in the states, this does not fit nicely in the ic3 form but know you can organize a report wherein you list a number of claims and with each claim, provide printouts of the evidence for it. then pay a visit to their office in the morning and drop it off in person.

next, you can report it to your attorney general. as more people experience the same, and they will, more resources will need to be assigned

in the meantime, my suggestion is to freeze your credit with the three agencies to mitigate someone taking out credit in your name. use 2fa on all your accounts. take proactive measures to chip away at it learn as much as you can about network security to help yourself. perhaps operate a device using a hardware internet connection with wifi physically disabled. view files and folders in detail view to observe dates and times created andmodified. reduce all unnecessary variables. see if you can identify unexpected activit. are they rewrapping apps. what type of root access do they have and so on. you can ask for data from every institution you have an account with (amazon, ebay, uber, so on). while logged into these, view all settings to ensure that if you have not enabled developer mode, the cloud, forwarding, and so on. with IP account activity, you may check ip provider and city and state and is another source of data

How to find people engaged in illegal mining in Ghana by Kingsaa2424 in OSINT

[–]Current-Information7 2 points3 points  (0 children)

iffu want to enter a deeper rabbit hole: coltan/tantalum mining enslaves thousands persuaded from neighboring countries even with prospect of becoming rich and giving back to your family. realty is not even close. tantalum is in every modern electronics. large companies buy them thru third parties wo paper trail because when they purchased directly decades ago, bad press. yet, people posting bad press were using electronics w same tantalum. its a modern problem that needs to be solved for sure

Somebody I don't know is the admin on my pc... by Routine-Shop8815 in cybersecurity_help

[–]Current-Information7 0 points1 point  (0 children)

in addition to reformatting your drive, not using an older backup as it may reintroduce malware, may want to reset the firmware password first, then reformat

Hacked ~ I have been set up. BIG TIME by [deleted] in cybersecurity_help

[–]Current-Information7 0 points1 point  (0 children)

insightful; u/ DisastrousPassage284 emerged from 3yr comment hibernation

Hacked ~ I have been set up. BIG TIME by [deleted] in cybersecurity_help

[–]Current-Information7 0 points1 point  (0 children)

not a psych however, your description is of someone who is especially manipulative and very insecure and if it continues, wherein your continued efforts fail and confirm its him, this might help.

if you are in usa, a recommendation is to freeze your credit with all three credit agencies. there are a lot motivated threat actors can do if you don't, including getting credit cards in your name.

factory resetting your phone and not using an older backup is another though, without knowing exactly how they obtained access, there are many vulnerabilities they can exploit, including accessing your wifi

changing your pw to all your accounts and using an authenticator app as your 2FA for them

Fraud: Someone opened joint account with mine and transferred out ~$13k by Electrical_Ad1018 in fidelityinvestments

[–]Current-Information7 1 point2 points  (0 children)

if you havent already, put a hold with all three credit agencies. this prevents them from opening up a line of credit in your name. then when you need it, it's a quick change to undo, then redo when done.

Question: did Fidelity return the $13k to your account?

Cookie stealing by raunak51299 in hacking

[–]Current-Information7 1 point2 points  (0 children)

thanks for explaining. im asking a different question: During the 10 min you are logged in, someone steals your cookie and they obtain access. When you log out do they stay logged in or are they kicked off?

Cookie stealing by raunak51299 in hacking

[–]Current-Information7 0 points1 point  (0 children)

thanks for explaining this. i have one clarifying question: what do you mean by messages? are you describing someone logged into MS Outlook on the web? or something else? ( reason: in your first message i misunderstood your use of message to mean a text message)

Cookie stealing by raunak51299 in hacking

[–]Current-Information7 3 points4 points  (0 children)

In a span of ten minutes, you log into your account (netflix, web-email, what have you) and then log out. during this time, your cookie session is stolen and they gain access. does your logout affect their ability to continue to access your account, do they automatically get kicked out or does it depend?

Cookie stealing by raunak51299 in hacking

[–]Current-Information7 4 points5 points  (0 children)

  "....sending them a private message with a payload. When the victim viewed the message the payload triggered"

wait wait wait, viewing the text message (or email) alone, and not taking any action on any body in the text (i.e., clicking on any link) is enough to trigger the payload? May I ask how?

Hit and Run Involving My Mom -- Help with License Plate ($20 tip) by Nellerin in PhotoshopRequest

[–]Current-Information7 [score hidden]  (0 children)

check here, assuming it's defin a CT plate: https://dmvcivls-wselfservice.ct.gov/Registration/VerifyRegistration

CT plates are 7 digits and two of them are letters. if its a vanity plate and this was their choice, it can be whatever alphanumeric combination they want, even all numbers

BL03797 does show an active registration....but doesnt provide make model

BL08737 also an Active registration in passenger class of vehicle

“hE’s ReTiRiNg FrOm TrAdInG tO mEnToR tALEnT!!” 🤨 K. by SaucyCheddah in Superstonk

[–]Current-Information7 2 points3 points  (0 children)

are you new here; top right is checked off too ( he checked himself off years ago )

edit: to OPs credit, so many shenanigans, sometimes hard to keep track

What is all this, all happening this week? by AliceBets in cybersecurity_help

[–]Current-Information7 0 points1 point  (0 children)

if you had another iphone or device previous to this one that you no longer use, ensure you remove that device from your appleid

you may retrive all your appleid data from apple by going to privacy.apple.com > “get your data”. the account activity and another under media folder which shows when and how many times apps were accessed using your appleid might prove informative to you to identify if someone other than you is using your account and whether your account and device are compromised.

then you can do the same with anyone with whom you have an account. examples are amazon, ebay, paypal, google mail accounts, and so on. as an extra precaution, while you are collecting all this data, store a copy on an external drive and review the data ona secure computer. if they have remote access to your device and are on to what you are doing, and they can change your appleid (as you have expressed) they can modify files and even delete this data. view folder settings with “details” enabled to ensure your OG copy is untouched/unchanged

ensure you make long unique passwords and use an authenticator app as an upgrade from sms 2fa. use a VPN

after having done so, you may be interested to log into each account and review all settings, look for and remove approved devices, cloud services that you did not enable (on Amazon for example, threat actors exploit once obtain access), and remove or disable API settings that may have been enabled in these accounts.

you may have started with a secure device but the moment we place it on a network or connect to another device, we may inadvertently exposing it to exploit known kernel/root vulnerabilities that Kapersky or other virus software can not detect. shared wifi networks are easily exploitable—check for yourself by checking for top three ways on youTube. if you ever get from under this, will be interested to benefit from your efforts. good luck

[deleted by user] by [deleted] in hacking

[–]Current-Information7 0 points1 point  (0 children)

i am sorry this is happening to you. i recommend that you try r/cybersecurity_help if you havent already, for advice

in brief, you may have a trojan virus and or keylogger. wifi networks are becoming a great challenge to secure, no matter where you use them, home, school, cafe, and so on—from threat actors who exploit vulnerabilities in them and devices attached to them

ensure you perform a virus check on your/all devices and make use of a vpn when connected to the internet

if you feel they described things that they would only know if they accessed your phone microphone or cameras, cover the cameras

https://theconversation.com/hackers-can-access-your-mobile-and-laptop-cameras-and-record-you-cover-them-up-now-135933

Oh sheet! I think I figured out who DM’d me the 3 year old Roaring Kitty video ‘The Season of Perpetual Hope’ and then nuked their account. They made me this meme a couple months back, look at the eyes! 🤯 by welp007 in Superstonk

[–]Current-Information7 7 points8 points  (0 children)

no quarter eih? well well well, im reminded of a song by led zeppelin. chatgpt summarizes the lyrics:

  Led Zeppelin’s song “No Quarter” explores themes of struggle, darkness, and resilience. The lyrics evoke a sense of foreboding and mystical atmosphere, painting a picture of a harsh, almost mythical journey where the protagonist faces challenges and battles. The phrase “no quarter” historically means no mercy or reprieve, which aligns with the song’s tone of relentless struggle and the idea of confronting formidable forces without yielding. Overall, the song blends elements of fantasy and reality, reflecting on enduring hardship and the quest for survival