I
I
Irven762022-01-23 03:08:43
Phishing
Irven76, 2022-01-23 03:08:43

How to close access to your Internet network from the outside to a phishinger, stalker, hacker?

In general, a person from the outside obsessively connects to my network (through the IP address or something. I don’t know how .. somehow).
has access to cameras, wiretapping (directly eavesdrops on everything that happens near devices), to search queries, passwords, correspondence, files on devices (on the account of files: it definitely has access on the phone. About the computer - it’s not clear.).
I have a router, I use Wi-Fi at home. I connect my android phone to the wi-fi network. It's all. 2 devices. Computer and phone have access to the Internet.
In android rummages thoroughly. has access to cameras, to a microphone, and quietly rummages through files, applications, correspondence. The computer is without a webcam, microphone and speakers (now they are removed, but the hacker could connect to them through a computer, even through a phone, even through a computer). I think that this is somehow connected with the local network, with the IP address of the network, with DNS public servers. It can only stalker me when I'm connected to the Internet. BUT! At the same time, when I leave home with a phone (and I don’t have Internet on the street), the phone records everything that happens (sound, if I turn on the camera, then video). Then when I come home and connect the phone to the Internet, the hacker takes out the data from somewhere and can listen to it all - (where I was, what I did, where I went). I really need to close this hole. through which all sorts of anonymous with playful little hands can crawl through the Internet into my devices. Knowledgeable help is needed!
Doesn't help: Antivirus, factory reset, vpn apps and extensions, system reinstallation, the router is flashed with the latest firmware, the router has remote access disabled, the computer too...

-------------- -------------------------------------------------- ------------------------------
well, let's say. I will describe what I did:
1) I deleted all my possible accounts that I have. it is important.
2) reset the phone to factory settings, put it aside.
3) the next item turned to the provider, connected an external ah-pi address to change the IP. the one that was before connecting the external one will change in a few days in any case after the service is turned off
4) reinstalled the system
5) setting up the router. complex passwords, SSids, firmware updates, changing the local address from the default address, in the settings, allow only your phone to connect to Wi-Fi by MAC address. (maybe, by the way, someone will advise which DNS server to install is reliable ... although I set different ones supposedly encrypted from prying eyes ...)
6) I put antiviruses on the phone, on the computer. I close extra ports on the command line. firewall without root for android
and that's it...
Then I create an account on Avito, for example. this person finds me from familiar photographs (he specifically tracks me around the city, at an address that he already knows long after the first hack) sends any spam (yes, at least a set of letters "roproproolg") and hacks. It may not be necessary to write a set of letters, but to start talking to me in a manner characteristic of this person (cattle-sociopathic) and can write about that, that I immediately understand who it is.
I already zadolbalsya with this rubbish to fight.

Answer the question

In order to leave comments, you need to log in

5 answer(s)
E
ewgenc, 2022-01-23
@ewgenc

Contact the police.

D
Drno, 2022-01-23
@Drno

Change phone. On an iPhone. Once you are sure that resetting to the factory does not help. Because the problem, if any, is in the phone
. On the PC, completely format all disks and reinstall the system. Although the entry point here is most likely a phone or router
Router - factory reset and reconfiguration. There was some kind of remote control activated - it will be reset.
But personally, I'm not at all sure that there is a problem. Resetting the phone should remove any left tracking apps. There is an option that they simply follow Google. (Where I was where I went). Make a new mail. Well, or geolocation is shared in a cart or watsap)
About recording video / conversations - are you sure? Is there concrete evidence?

R
rPman, 2022-01-23
@rPman

'Was there a boy?' Where do you get such confidence that you have been hacked and tapped?
Here I constantly receive messages in the spam folder of the mail like - 'I hacked into your devices and now I have your spicy photos, the N-th amount of money came out and then your friends will not see it'. Needless to say, a spammer has none of this (it's hard to have something that doesn't exist in principle).
Each type of attack has its own methods. For example, to listen to a smartphone, it is enough to install an application with the appropriate permission to the microphone, moreover, you can go to the attacker's website, which will request the same permission!

Unfortunately, a ready-made solution will not be given here.
Не поняв то как злоумышленник проникает в вашу сеть и на ваши устройства, скорее всего сделать ничего будет нельзя.
В общем случае злоумышленник запускает свое приложение на машинах жертвы, особенно это актуально для смартфонов, обычно без действий пользователя сделать это затруднительно (существуют бекдоры но чаще всего основной способ это действия самого владельца).
Мало того, сброс до заводских настроек, если ранее на устройстве была заменена прошивка (или просто настроен root доступ и приложение злоумышленника получило к нему доступ), может не помочь! грамотный троян заразит саму прошивку. В этом случае необходимо заново перепрошить устройство надежной, например официальной прошивкой от производителя (осторожно, некоторые действия по установке кастомных прошивок прямо ограничивают возврат на официальные, иначе можно окирпичить свой смартфон).

ps everything said by the author of the question may turn out to be true if such companies as Google or Yandex (or for example Chinese wechat) are named as an attacker, but they most likely will not tell their victims about it, they use this information by themselves

T
TheBigBear, 2022-01-24
@TheBigBear

There are programs that are not officially Trojan viruses.
For example, "Stakhanovets" (there are others, I have not come across them closely) https://stakhanovets.ru/
Installed on a computer-smartphone has full access to everything you do
. detect by service called stkh, and activity on port 13289, in the latest versions you can change the service name and port I
recommend
1. completely reinstall the system (with formatting or replacing the disk) 2.
Create an administrator account with a password and a user account with limited rights
Make it a rule to work only under the user
4. Enter a phone number purely for authorization And insert this SIM card into the handset. Change passwords in accounts on websites and mail and put mandatory confirmation by SMS

T
tenpix, 2022-01-26
@tenpix

I installed Tails somehow, you know what? it didn’t help, I watched the video on YouTube about the rocking chair, after a couple of days the neighbor’s children discussed approximately the same meaning.
set the password to boot in the bios, go all to Yuh. Verbatim. In a day or two, two alcoholic-looking peasants pass by me and one says to the other, “
You can’t swear?
-Yes, you can't.
I could have cited many such examples before.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question