B
B
bji2021-04-08 21:19:53
Android
bji, 2021-04-08 21:19:53

How to protect Android from remote access intruders?

I really need advice, I'm being chased by hackers. I changed a lot of smartphones, phone numbers, accounts. Every time they track, write all sorts of humiliations (even on this site), turn applications on and off.

VPN and Tor did not help, antiviruses are useless. I know that w3bsit3-dns.com has firewalls that control the traffic of individual applications. Is there something more serious to protect all traffic (like IPS)? Or in such circumstances, it remains to postpone the 12th iPhone?

Answer the question

In order to leave comments, you need to log in

7 answer(s)
A
Alexander, 2021-04-08
@NeiroNx

If someone needs you, they will hack you. And phones are now full of holes up and down, the iPhone is no exception - it's just more expensive to break it.
Perhaps in order to lose interest, you need to "disappear" for a while. Judging by the fact that you are saving for the 12th iPhone, this is your only option, because everything else costs money. And to go into the wilderness and forget - you can for 10 thousand.

D
Developer, 2021-04-08
@samodum

The phone is not here.
Your personal data has been leaked.
Changing to an iPhone won't help.
Here you need to study your history personally. Perhaps you need to change all accounts, mail, change passwords everywhere.

C
CityCat4, 2021-04-09
@CityCat4

Too general a question to make any specific recommendation. Most likely, it is not "hackers" who are chasing, but one "hacker" who simply knows enough to ignore the change of accounts or, well, a weak fantasy - come up with an atypical login.
It also just seems like a joke to me.
But let's assume that this actually happens. What can be done:
- change the phone to "grandmother's phone". Choose the most stupid model, with a large jar.
- change the phone number(s), go to an operator that you never had
- rearrange Windows on your home computer (computers) with full disk formatting (of course there is a backup?), if you have a tablet - reset it to zero
- after that!create new mailboxes, block-delete-redirect all old ones, if possible, change the server to one where you have never been

R
rPman, 2021-04-12
@rPman

Why did you decide that this android is to blame?
An example of an attack - they hack a home computer and even a router, using one of a thousand ways to determine that the phone is yours (for example, on the page where you go from the phone there is a pixel image that looks for a local server, for example a router, the fact that the page is opened will confirm that the phone is in your local network), which means that the account on the service is also yours - here is the connection, the lines of attack are different, from mail / social network messages to attacks on the applications used.
The infection must be cleaned comprehensively throughout the network from all devices, unfortunately, without knowledge and experience, a targeted attack is almost an order of magnitude more difficult to identify and neutralize the attack itself.
The easiest thing for you is to reinstall / reset on all devices on the OS network to factory settings (the router is also reset, but it will need to be configured correctly), not to contact a specialist yourself (who work for money and not 'friends for thanks', otherwise such people can plant their bugs for thanks - perhaps this happened?), reset all authorizations in chats and social networks, change ALL passwords (and do this from a reliable clean machine after cleaning and not before).
And of course, change the way of digital life to a more reliable one. How did the Trojan get into the network? - you run applications from file hosting services and not trusted off sites? One password for everything - holes, not even discussed. Launch apps from attachments in chats? - himself a sheep. etc.

P
PetrovArtemii29, 2021-04-24
@PetrovArtemii29

If you really want to get rid of it, write a statement to the police, then to the prosecutor's office, then to the prosecutor's office. Attach screenshots. At the same time, write to the FSB in your personal account - all this is not on paper, but through state services., Or through the website. Do the same screenshots of all submitted complaints.
One thing is a single withdrawal of money, for example. The other is natural terror. The FSB has SORM, they will quickly trace everything.

F
Forbidden to ask questions!, 2021-05-07
@prizgost

This is very difficult, the easiest way is to disconnect from the network and connect only the programs you need to it.

K
Konstantin, 2021-05-20
@webmaster

Option 1
Boot from a windows or linux boot disk so that there is a desktop and a browser with the Internet.
And change all the passwords of your accounts, routers. In short, the most basic ones (then change them to the forums).
Next, download the new windows image from this boot disk and burn it to a blank or USB flash drive.
Reinstall Windows with formatting the system disk (if you don’t know how to do it, then ask a specialist), after copying the necessary / important data to another partition / disk.
Reset the smartphone by default, but rather reflash, because. most likely you have already built the backdoor application as a system one and after the reset it will remain. (if you do not know how to do it, then ask a specialist)
Get a new Google account, transfer contacts from the old one through the browser, there is an export-import.
Install a firewall on Android, such as NetGuard. Set it up so that by default all traffic is blocked. Allow applications as needed.
Option 2
you have bad karma, all of the above will not help.
Everything under the prism - https://www.gnu.org/proprietary/malware-google.html

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question