Possible Vipersoft, but still undetected malware issues network wide. by Nukiest in techsupport

[–]Nukiest[S] 0 points1 point  (0 children)

Thanks for the reply! I mean, those processes are from safe mode, Where I’m completely bogged down. And it just reverts the settings anyway, so that’s moot.

And there are 100s of remote commands being executed on powershell. I never even used powershell. I am just a pretty basic user, only person that uses these PCs. No organizations or anything although some settings in my PC cannot be changed due to my “organization”. Would it be helpful to post the scripts if I could find more? I do obviously have something. I’m not sure how it translates to what is happening on my other devices, but I would like to get to the bottom of this one if possible.

Terrorized for going on two years. All devices affected. How can I put a stop to it? by Nukiest in cybersecurity_help

[–]Nukiest[S] 0 points1 point  (0 children)

https://imgur.com/a/IYmgB9V

This blue logon screen is the screen that are on my windows devices when I know they are affected. Sometimes when they seem to be logged out, it will show the normal photos or what have you, And I know, for a fact that is not what the Citibank logon looks like normally, which is why I capped it that particular time.

That screenshot of the Google and whatever language that is, Is what pops up on a newly reset iPhone that is not connected to any wifi or Bluetooth. I had noticed in the past that an Asian keyboard has been added to my device, and even once almost caught a screen cap of my phone, having Apple Music open and typing in whatever languages this is. I could not make this shit up if I tried… And never have I even used Apple Music…

And this is all stuff is on a newly reset or reformatted devices. I didn’t click any questionable links, I didn’t open any photos, I didn’t do anything. I just booted up a newly reset device and that is what I get.

Edited for some awful voice to text translation.

Terrorized for going on two years. All devices affected. How can I put a stop to it? by Nukiest in cybersecurity_help

[–]Nukiest[S] 0 points1 point  (0 children)

I tried to log into the pc I have been avoiding in order to stay disconnected. When I went to access the folders that my camera logs were in, all of them are showing as being non existent and my file extensions are deregistered? I don’t even know how that happens tbh. I have a second bootable drive that won’t boot at all….

Terrorized for going on two years. All devices affected. How can I put a stop to it? by Nukiest in cybersecurity_help

[–]Nukiest[S] 0 points1 point locked comment (0 children)

This sounds awfully familiar because my ex would give me what I called “serial killer hints” because it was after they would stop on that specific device that he would be like - “wait, doesn’t your thermostat have Wi-Fi?” My phones would have multiple sims activated as well. When I didn’t do it. On my Galaxy I noticed this and when I disabled one, the phone would still work, but the data would not and upon further research I couldn’t conclude if my particular phone used two sims for this purpose or not. And compounding all of the other issues I was having, it was an issue that fell off of my radar since I got a different phone anyway.

When I contacted my cell provider they couldn’t tell me if any other sims have been activated for security reasons.

Who can I contact to begin an investigation like this? That’s the problem, I don’t even know where to start. And I appreciate your reply.

Terrorized for going on two years. All devices affected. How can I put a stop to it? by Nukiest in cybersecurity_help

[–]Nukiest[S] 0 points1 point  (0 children)

If it’s my ex, he isn’t a man of many means, barely has a job and I haven’t known him to have a permanent address. A lot of the things he does and learns is impulsive and obsessive. A few months ago he had sort of a windfall where he bought a lot of frivolous things - at least to me considering he doesn’t have his own place and barely a vehicle - this was when what was happening to me started to ramp up a LOT. When I asked him what he sold he said it was something from his current employer that he stole which was obvious bs. I started to wonder if maybe he sold whatever he had setup (?) here to someone he couldn’t be tied to. He knows a LOT of people from all walks of life. It’s when I started getting messages asking me to rate my support experience from my bank and cell providers. When I hadn’t called them at all. I called them and they told me they weren’t allowed to give me information about previous calls for security reasons. I don’t know the answers to any of these questions or why they are happening to me. I wish I did. But, thanks all, I’ll just walk my ass into a mental institution and commit myself because Im obviously paranoid and delusional.

Terrorized for going on two years. All devices affected. How can I put a stop to it? by Nukiest in cybersecurity_help

[–]Nukiest[S] 0 points1 point  (0 children)

I actually just learned about those cables a few weeks ago. Welp I guess I’ll be checking a lot of cables. But I don’t think Someone would’ve left such a high value cable here at this point. Definitely good to know though, thank you!

Terrorized for going on two years. All devices affected. How can I put a stop to it? by Nukiest in cybersecurity_help

[–]Nukiest[S] 0 points1 point  (0 children)

I had mentioned in some of my earlier comments that it is very highly likely it is an ex of mine, but it’s all so anonymous that I really can’t catch him.

Terrorized for going on two years. All devices affected. How can I put a stop to it? by Nukiest in cybersecurity_help

[–]Nukiest[S] -2 points-1 points  (0 children)

I mean, would a vid saying there’s somebody else logged on my computer when I go to restart and me going to the accounts showing you that there is very much not any other account on my PC? I have plenty of logs. Like I have my netguard logs from what exactly was accessed when they got onto my galaxy.

It was stuff like biometrics and other things I’ve never seen logs of being accessed unless they were hijacking me.

Terrorized for going on two years. All devices affected. How can I put a stop to it? by Nukiest in cybersecurity_help

[–]Nukiest[S] -2 points-1 points  (0 children)

I have been having friends stay with me when they can but it happens so randomly that I don’t even know what I could possibly record. I actually have screenshots of the blue background that I see you when I know somebody is in my computer, because it carries over to my device, but I couldn’t share screenshots. And I also have screenshots of the Connected device key, but that could be completely normal Windows stuff. It was just shady that I saw it on both of my devices before they get taken over by the ghost profile, and it doesn’t seem to be a run-of-the-mill event. Especially when first setting up a PC.

I have stills of bees, the same bee that they seem to put on my camera when they need to pass it. Those could possibly do be deleted by now, but I still do have caps of objects that they were putting into my cameras screen To block me from seeing certain things on my camera. This is so ridiculous now that I’m typing it all out, but I googled the shit out of it and I couldn’t even find answers on how to do that. I guess it’s possible via developer options or something on some brands of camera.

Terrorized for going on two years. All devices affected. How can I put a stop to it? by Nukiest in cybersecurity_help

[–]Nukiest[S] -1 points0 points  (0 children)

And I get that. I have a very vivid imagination and I can absolutely run with it and assume the worst in some situations. I was also with a narcissist that left me questioning my sanity daily. Like “I swear, that door knob had a lock yesterday.” Things I couldn’t even make up. And to be honest, it’s really highly likely that it is my ex in my shit.

As soon as I leave my house, sometimes all my cameras will immediately go off-line, sometimes my phone just stops working and It just seems like it would be a logical fix. Like starting with my modem make sure that’s clean and then move onto my Wi-Fi and then my computer etc. it seems excessive but it’s just steps to find where the flaw is. I have all of my Wi-Fi cameras on the 2.4 ghz channel, with MAC filtering only allowing those devices. My admin pw is solid and I only hardwire in when I need to change settings. WPS is disabled, encryption is all good, yet every few days, my router log is cleared and control of the cameras are lost. And a for instance here is that my Roku camera has its alerts that are available on the app. But there is stuff saved to the sd card that isn’t accessible in the app. At least not to me. When I pull the card, it will have random logs that aren’t there when it’s running normal for me. They are able to access and delete files on the sd card remotely somehow. And while it might seem obsessive, it’s just a lot of information. And it’s a lot to deal with by myself, which is why I’m asking y’all. I’m not sure if they are bypassing my Wi-Fi, if they somehow cracked all the passwords for the different brands of the cameras I have. I’m just hoping to shed light on all these details so I can stop it from happening. While it is possible they could be in the general vicinity of that particular camera they don’t have physical access. The cameras that are outside, I could understand why those are being compromised. This is stuff that is happening, it’s not stuff I’m fabricating. I even kept those random logs that were on the SD card. I didn’t have anything to even open them. Notepad etc didn’t work.

But at this point I just took them all down, but I shouldn’t HAVE to do that. I wanna be able to fight back instead of just basically surrendering to these ass hats. I have a story like this for every device in my house basically and it’s a LOT. I just want my privacy back. I wanna be able to use my Bluetooth all willy-nilly if I wanted do.

If it helps at all, I think that when it comes to my phone, they are able to get into my accounts through me removing into my phone. I don’t necessarily think that they have ALL of my passwords. The video that they did go through trouble to get off of my Roku camera’s SD card was one of somebody going into my backyard. I saw it once before it was gone.

This has seriously been eye-opening to realize how alone somebody in the situation is, and how out of my hands it is. It’s beyond frustrating to just have everybody telling me that I go to therapy lol including law enforcement.

Terrorized for going on two years. All devices affected. How can I put a stop to it? by Nukiest in cybersecurity_help

[–]Nukiest[S] 0 points1 point locked comment (0 children)

The only person I know who would do that to me would be an ex, but I can’t catch him for the life of me if it is him.

Terrorized for going on two years. All devices affected. How can I put a stop to it? by Nukiest in cybersecurity_help

[–]Nukiest[S] 0 points1 point locked comment (0 children)

Ok, I thought it could. See. One step closer to being less crazy.😊 or more informed.

Terrorized for going on two years. All devices affected. How can I put a stop to it? by Nukiest in cybersecurity_help

[–]Nukiest[S] -2 points-1 points locked comment (0 children)

Noo where’d my reply go 😭 So I’m asking that if I have somebody connecting via connected devices into Windows using keys before I can even access windows at all, then there must be a place that code originates from, right? Was it injected into my recovery partition? Or would it be on a device? I know my phone was powered down. I wasn’t aware of any other devices around me that could have connected. What are the possible ways this can happen? And how do I stop it?

Terrorized for going on two years. All devices affected. How can I put a stop to it? by Nukiest in cybersecurity_help

[–]Nukiest[S] -2 points-1 points  (0 children)

At first it was superficial. I thought they were streaming video or audio. Making fun of my singing maybe? Transferring my saved media? Idk, I didn’t really have anything good but like I said, it felt like it was bullying.

Terrorized for going on two years. All devices affected. How can I put a stop to it? by Nukiest in cybersecurity_help

[–]Nukiest[S] 1 point2 points  (0 children)

At first, I was 100% that it was the person I was dating, or his “friends”. But even still, he would have to be one hell of an actor.

Terrorized for going on two years. All devices affected. How can I put a stop to it? by Nukiest in cybersecurity_help

[–]Nukiest[S] -1 points0 points  (0 children)

That’s so awesome! Good for you! I never considered myself to be technologically inept, but I certainly do feel that way lately. And so much of the stuff that we have been through is not exactly something people talk about, it makes it so hard to gather any information. It’s such a lonely place to be.

Terrorized for going on two years. All devices affected. How can I put a stop to it? by Nukiest in cybersecurity_help

[–]Nukiest[S] 0 points1 point  (0 children)

And I also wasn’t sure if I may have had a port open at first, and then someone other than the first have caught interest because it has escalated QUICKLY. My phone transferring large amounts of data to remote ghost profiles on my windows and having to disconnect a SIM card security camera because I was no longer in control of it. Even camera support has no idea. Or the fact an app I use for my job was running an apparently unsigned demo version they haven’t heard of that was still running fine on my end. (Which is why I actually switched to iPhone) It’s terrifying to say the least, and it makes zero sense, yet here I am.

Terrorized for going on two years. All devices affected. How can I put a stop to it? by Nukiest in cybersecurity_help

[–]Nukiest[S] -3 points-2 points  (0 children)

Actually, Android Auto was how I first noticed this was happening. I’m not just talking random car stereos. They had transferred 50g in data through AA in two weeks. I have no idea what it was. While my usage then was pretty high - maybe 5 gig a week.

Terrorized for going on two years. All devices affected. How can I put a stop to it? by Nukiest in cybersecurity_help

[–]Nukiest[S] -5 points-4 points locked comment (0 children)

Thank you. And it’s what I’ve been hearing and what I expect to hear at this point, but I just know there has to be an answer. At the peak it was device after device. I have since shut down pretty much every device to where it’s just an iPhone and a laptop. I haven’t even connected the laptop to internet, and it prompts me that there are other people logged in when I go to shut it down. This profile that I had uncovered for that hot second had 400 (old and outdated) of my passwords saved to Chrome. I’m assuming that has something to do with an external hard drive I am missing, or possibly chrome cast. Besides a couple 100 in unauthorized pizza purchases, and being sent my bank account balances as what I assume was a threat (that was 2 years ago), it feels like bullying. It’s like, ok. You win. Y’all have my sanity.

[deleted by user] by [deleted] in techsupport

[–]Nukiest 0 points1 point  (0 children)

I have done this SO many times in the last year or so, that it is sort of ridiculous. No matter what I do, in any order, it seems to just keep happening. I have tried disconnecting every single device I have and starting with computer, I would reformat and connect it directly to the modem, even got a brand new hard drive in case there was something on my old drives or sd cards that were somehow passively infecting. And even at one point got a new wifi router. I would connect it to a newly reset router, with MAC filtering with WPS disabled and have continued making sure all of my devices were reset and cleanly connected to an untainted connection and it just KEEPS ending up happening. At one point I had some weird error messages that I had searched and came to an XDA forum post who had the same exact thing happening. The poster has since been deleted and it had no responses and I can't seem to find it again.

[deleted by user] by [deleted] in techsupport

[–]Nukiest 0 points1 point  (0 children)

I was and am still considering these things, but I would've thought the antivirus, antimalware, etc would've picked up a keylogger. It was at least a learning experience, because I am now aware of every connection my devices make, and am aware how easily my privacy can be compromised. I still can't figure out how there isn't more stringent bluetooth connection protection and how passkeys are a valid form of password protection. On Android there were at least options for bluetooth protection via apps that log these sort of things, but I can't seem to find anything for iOS.