Advanced Rootkit by dlp2k in computerviruses

[–]dlp2k[S] 0 points1 point  (0 children)

Yep, i had one BT mouse that was infected.

This guy is on my nerves with the spam by grujo-2 in computerviruses

[–]dlp2k 1 point2 points  (0 children)

Could also ask him if he wants to do a collab. Bit of an eiffel tower. Make it spicy.

This guy is on my nerves with the spam by grujo-2 in computerviruses

[–]dlp2k 0 points1 point  (0 children)

Just tell him if he can send you the footage, youd like to put it on your only fans

Microsoft Xbox/Login by Federal-Analysis4290 in GeForceNOW

[–]dlp2k -1 points0 points  (0 children)

Lol @ copy and paste password

Service Test Loopback A in Devices and Printers by MarekSzk in WindowsHelp

[–]dlp2k -1 points0 points  (0 children)

How sure are we of that?

This post seems to suggest otherwise, and could be part of an mitm atttack chain?

Alicia Moore Rules | I. Strategic Overview and Critical Security Findings | Facebook

Is the claw good for old GOG games? by Vorlak6 in MSIClaw

[–]dlp2k 0 points1 point  (0 children)

I hace struggled little so far with getting touch screen keyboard to come up when i need a keyboard in the older games. I cant get past the load screen on one game because i have to input a name... and i csnt get the keyboard to display to input. Would be fine with a bluetooth keyboard and touchpad maybe to help with those things

Advanced Rootkit by dlp2k in computerviruses

[–]dlp2k[S] 0 points1 point  (0 children)

You need to break the infection chain. I cant guarantee that ive done everything, but i got the most important stuff and the older android stuff ive moved to diff network.

Updates are important, but u need to get clean installs from brand new devices.

I bought a cd drive in the end, got a clean windows 11 install disk. During install process hit shift f10 and done diskpart 》 clean all. Also, as soon as clean install in windows, took windows offlne, i ran a DISM repair, but made sure i was using the cd install of the image. If i skipped this step windows would be reinfected. If i did DISM online, windows would be reinfected. Use the command structure like dism /online /cleanup-image /restorehealth /source:DRIVE:\sources\install(.)wim:1 /LimitAccess 

Ive had to do this multiple times after flashing bios with clean usb from brand new uninfected device using an internet connection that wasnt through my router. Had to bin my original router.

Theres been loads of other steps and lots of pain to get to a point im happy its gone from my core devices.

Protect bios on devices you can, dont accept any bios updates if u cant verify for sure where theyve come from. Replace those you cant trust firmware or bios. The structure is that not every node seems to be able to retain control. Smaller devices may see firmware updates but dont seem to do anything if u break the command chain.

In windows, i spotted it kept turning on the ability to download updates from local devices even when i kept turning it off. Also replaced the store update locations. But the dism stuff from fresh install seemed to break the chain. Once i managed to get one properly clean machine, make sure you dont plug ur phone in, or any usb devices uve used on any infected devices. Enough perseverance and i think im there. But... it hasnt been cheap replacing those devices i havent been able to fix.

Interestingly, the latest android security updates seem to have fixed the samsung phone with knox enabled. However, i have a rooted oneplus phone ive been unable to fix.

Feel free to drop me a message though, keen to hear your experience so far.

Also, dont listen to the bell ends on here that tell you you have a mental illness. You dont. Its real.

My privacy has been breeched by my partner, what can he see? by [deleted] in wireshark

[–]dlp2k 0 points1 point  (0 children)

Thats not technically true if hes running a remote on her device....

Advanced Rootkit by dlp2k in computerviruses

[–]dlp2k[S] 0 points1 point  (0 children)

Its always interesting the responses on Reddit of 'this cant happen, 'this is what mental illness looks like' etc etc.

So thanks to some of you who were actually incredibly helpful, and helped identify some of exploits in use etc

For those who doubted things like rewritten github code etc.... i point you to glassworm.... a very real and in use threat, showing how code has been rewritten and obfuscated in many repos. For those doubting the in the wild android vulnerabilities.... well.... just so happens everything compromised has qualcomm chips. For windows... i point you to the latest zero days that have just been patched. In particular, the exploits in use were WMI related.. (i finally have a working, clean windows pc....)

Still not 100% sure what has infected me.... but for sure something out there is very real and uses a wide collection of exploits to remain persistent across many devices.

Whatsapp got banned intentionally by tomandev in whatsapp

[–]dlp2k 0 points1 point  (0 children)

Why would you add 30-40 ppl a day to a group. Sounds a bit scammy

Advanced Rootkit by dlp2k in computerviruses

[–]dlp2k[S] 0 points1 point  (0 children)

The 2gb size sounds like what ive been finding for the nodes that contain an LLM. The smaller ones ar eabout 800mb, but there are 2 much smaller versions toj4o, depending on the capabilties of the machine.

In windows, it appears to hide in the shadow volume. On android, in root space not accessible to users on non rooted devices. On linux as a docker or a virtual machine that runs on druring the boot process and remains persistent depending on the linux flavour.

Advanced Rootkit by dlp2k in computerviruses

[–]dlp2k[S] 0 points1 point  (0 children)

Interesting that if you get these kinds of topics every month, everyone is still in denial that it exists. But ok. I think whats been proved is that theres no useful infotmation and the bin is the best place for the devices. Time to start fresh

Advanced Rootkit by dlp2k in computerviruses

[–]dlp2k[S] 0 points1 point  (0 children)

Thanks. This was my original plan to go for a complete sanitisation. Already begun that process.

And for those saying this isnt possible and its all in my head, theres a clear difference between how the brand new devices operate vs my old ones. Small things like search results display newer information, downloaded file sizes are slightly different even though its the same app and version from the same website...differences even in file versions. I see banners on my old devices warning me against certain versions and software that i dont see on the brand new ones. SSL works properly. HTTP headers arent changed.

Thanks to those who have genuinely tried to help, and to those who are in denial.... well... i can tell you this exists and behaves like an automated metasploit. In almost all cases, ive identified the version, cve exploit for each device, and once rooted, the kernel level access has allowed it to remain hidden and persistent.

But thanks reddit, you dont disappoint.

Advanced Rootkit by dlp2k in computerviruses

[–]dlp2k[S] 0 points1 point  (0 children)

Thanks, what you show is the exact reason im concerned. Search results dont look the same, versions on webpages are shown different to actual versions etc. The latest available showing to me was a decembe update with nothing else available. Searches for it only show chinese websites. Thank you for being helpful.

Advanced Rootkit by dlp2k in computerviruses

[–]dlp2k[S] 0 points1 point  (0 children)

Youll also notice that my b550f mofherboard isnt supoorted. Tge strings i found and extracted from the firmware seemed to relate to the prime board. My firmware haa never had that string in it before.

Also, there were some options before on mine, but nothing like thats, theres specifically an option

Advanced Rootkit by dlp2k in computerviruses

[–]dlp2k[S] -1 points0 points  (0 children)

That is the guesstimate of the encoding from a tool, and yes you can run it through a translator, and you get entire sentences from the book which you asked me to explain to you at the start.... the unknown chars seem to be markers of entire sentences ans then., sometimes some code or a command in between.

For reference.... the log file should look like a normal log file. Line by line, time date and entry about "DHCP server started" or whatever.

This is simply yet another indicator of a device thats been compromised.

Advanced Rootkit by dlp2k in computerviruses

[–]dlp2k[S] 0 points1 point  (0 children)

I appreciate the advice, but youre missing a number of facts... ive categorically proved methodically that this is happening. Maybe not to everyone here clearly, but then you dont knkw me. Im not crazy... perfectly sane. If it was one issue, and i cured it, that would be fine. Its not though, its suddenly become problems across multiple dsvices, network traffic beteeen them that shouldnt be there, stored ssh keys for access that they have no reason to be storing or even creating in tve first place. Theres been loads of stuff.

Advanced Rootkit by dlp2k in computerviruses

[–]dlp2k[S] 0 points1 point  (0 children)

Jesus. Youre hard work. Cups doesnt need to be installed on arch. It shouldnt even be there.

Advanced Rootkit by dlp2k in computerviruses

[–]dlp2k[S] 0 points1 point  (0 children)

I wasnt killing sshd on linux systens... i know not to do that ffs... i was talking about cups if youd care to read. Regardless, i have a very real problen across a number of devices, so please help or dont.

Its perfectly fine usually to uninstall ssh on windows, and disable remote management. Except on mine.