Jump to content

Recommended Posts

Posted

Hello I am in dire need of help. For the pastyear I have been tormented by an ex roommate/ partners x partner. I just want my digital life back. 

Trying to cram a years worth of events into one post will probably be challenging so forgive me if I don’t go to far into depth on some things. I really need help but seems in the past I was shuned away from people that have the knowledge to help with comments like “ that could happen but its highly unlikely someone you know has the knowledge to do those things. So I’ve just been kinda taking the punches and didn’t even try to get help. January 5th made it a year and I just want it to stop. I can’t own a digital device that uses any protocols without it getting ruined. I have been through 23 android phones 5 computers 2 tvs 2 hotspots and 2 Tmobile internet services that I had to disconnect. I’ve lost all digital data I had . The most important are pictures of my kids that I’ll never see again. 

I really I can get a few suggestions for a solution to this problem I’m facing so I’m gonna attempt to explain to the best of my ability what’s been going on although even a year later I feel like I’m 50 steps behind him and I’m up against an internet god. 

 

I met my partner 2 years ago and shortly later moved in to his house. He had an ex that was still staying at the house ( need this included for motive) in a different  room. Me and the ex got along good I thought. I’ve always had an interest for learning computers and android but hadn’t even made it to learning the command line yet. He seemed to know quite a bit about computers and said he was a gamer back in the day so he had to learn networking so he could setup his console to compete online. At the time I was thinking “that’s badass!!” Maybe he can teach me a thing or two. So conversations usually revolved around the topic of computers but would always be short with him usually changing the subject. He never let off that he  knew anymore then basic networking. I knew nothing about networking at the time and am most likely more confused today so I took him at his word and didn’t think much of it for the next year. 

About 4 months  had passed and I decided I needed internet so I called the cable company and they came out and installed internet. From day one I started having issues and knowing what I know today there’s no doubt he was behind it. Being right next door was a perfect place to do what ever he wanted. Seems I was on the phone more than online for the next month. I was so furious at the internet company and was blaming the installer for hacking my router. I don’t wanna go in depth about that situation because at the time I was oblivious to living next door to a hacker for a year without knowing so I’ll fast forward to when I found out. Actually shortly before  when I purchased my first computer since I’d been here. 

The computer was just a cheap hp elite mini desktop. I had recently gotten Tmobile internet and felt I needed a computer so I got a cheap one. So I was surfing the web and I noticed a hidden network in the Wi-Fi that just seemed to appear one day at this point about 10 months in to living here my suspicions are growing that he might be doing something with my network but had no idea of his capabilities till one day I get off work and my router has been reset. I know the only way to do that is press the button so I knew dude reset it cause he was the only one here. At this point my I’m growing more suspicious by the moment. I go to sign into my Tmobile account and once I sign in I’m instantly booted out. Not realizing that he sent a phishing page to my phone I just shrugged it off that night. I turned my router off and went to sleep. Next morningi woke up bright and early and called Tmobile the roommate was still sleeping. I informed the agent of my issue and she reset my router from her end. Well as soon as she did and my router came on. I noticed on my Wi-Fi app that where the hidden network was before the reset stood his 3 devices one even said his name and his phone so there was no doubt he hacked onto my router and made a different network and

He’s caught. I figured that was the end of him messing with my internet but it was actually just the beginning. That day was January 5th 2023.

 

His devices sat in my router for a short period and I suddenly heard scurrying in his room and they disappeared. I confronted him with my findings by way of a screenshot. He tried to deny it saying he plugged a usb in and was suddenly on my internet but it was bullcrap and at this point I think I’m dealing with someone that took advantage of me being at work. It wasn’t till later that night when my computer starts going hay wire I didn’t realize it at the time but now I know he installed a back door and gained root permissions  through audits then gained remote access and I was oblivious. He got my Microsoft account password by making me stumble over my typing. I thought for sure I’d be locked out of my account but he never changed the password. It was like he was saying you know it’s me but you don’t know what I’m capable of. I never really got to use that computer again after that day. Every time I got on it was something else wrong. Then something was said in the kitchen to piss him off and that night he showed me beyond a doubt that he was a real hacker. But at the same time he would never admit it. That night he started messing with my cellphone. Just making it not load and just stopping me from anything I wanted to do so I thought I need a firewall. Once installed I realized my problems were far from over. I had heard of  A DDOS attack but only in companies he started flooding me with hundreds of different up addresses at once. It was that time that I knew I was out of my league. I got so furious I threw  my cellphone cracking my Motorola Moto powers screen. It was the first device of many to reach that fate. I still had my Motorola one but it seems he was controlling the cellphone too. He had full control over my phone. And it made me feel very vulnerable. At this point I knew he didn’t tell me about his all his computer knowledge. Then I thought of how when someone  brags about being a hacker they are usually just running other hackers scripts but you will never know true hacker. That makes me worried that I have a hacker targeting me not a beginner. He proved his knowledge online and launched me into a part of android I never knew existed. After much research and virtual a#% kickings I piece together he has taken control of my phone by replacing the recovery image with an image of one he has configured making use of ASOP  And project treble. Once his image is installed he installs his version of google play services with his ridiculous permissions and I have lost total control of my phone reguargless of what I’d do. He could turn my mic on he could turn the camera on or what ever he wanted and I couldn’t do anything to stop him. I took me months just to figure out what I just explained. Frustrations is an understatement !! I’d throw the phone smashing the screen to pieces with a sigh of relief I broke it so I could get a new one and start over but he was always right there no mater what I done to avoid it. Then I started realizing he was hijacking’s the SIM card and putting himself as the service provider. It got where I’d pay for a month of service and 2 weeks later he would turn my service off I can’t call support because he disconnects us in mid conversation. Can’t go online for help because he has my network configurations to go through his DNS. He gained higher authority over my devices then I can somehow and can make options greyed out. 

This post is getting a bit long so imma speed it up. Today he has control of my network traffic on my iPhone . He is able to control the iPhone but not to the extent he could the android or maybe he just hadn’t yet. He made my real SIM card unreadable. It’s like he wants to control my network traffic more than anything. As well as have a reliable access to a mic. 

He destroys windows fast. It usually takes 3 days and he has full access of Microsoft so I have been using a lot of Linux live bootable usb  to try to learn a way to stop him but it seems I’m always 20 steps behind him.  In Linux he does things I never knew was possible. I disconnected all internet interfaces and Bluetooth or so I thought. It seems his newest shenanigans are doing something I don’t even understand with my cpu. I think with flags but could be wrong. I can upload a log on the cpu. 

Chances are a person will never be targeted by a real hacker. But it’s my luck I am. The odds are slim but it has happened. He has been ruining every os I manage to download mainly because he can’t see all my traffic. Please help. 

Is this guy unstoppable and I’ll have to endure this till he decides to stop? 

 

I’m sorry this post is so long.  The hacker is asleep so hopefully this gets out to someone who can help . 

Not proofreading due to time restraints with his sleep. No way will this get out if he’s awake. 

 

  • Upvote 1
Posted

This is going to sound harsh, but we get requests like this every few months and they are always scams trying to recruit people to do illegal activities.

If this is real, file police reports and send some actual evidence.

  • Upvote 2
Posted

You kind of lost me at the TVs. You can remote control them and cast media, but that's really it without opening them up and hacking into the hardware. All the mentioned devices can be reset, so I don't understand the need to keep replacing them. Plus, new devices are fully updated, making me more skeptical, not to mention your deep pockets. 

Anyway, I plan to read the whole post but TL;DR. 

  • Like 1
Posted

Some of it is plausible; some of it is nonsensical. If you call an ISP to reset your router, customer service will give you instructions on how to do it. Once a router is reset, any device connected will be disconnected. And Wi-Fi app? DDoS attacks cannot realistically be done on a home network. You mention only Android phones and then say that you have an iPhone. He really would have to be a master to remotely access an iOS device. You didn't know anything about networking, but somehow you can recognize a DoS attack, including the associated "addresses." 

He could only have flashed your phone if he had physical control of it. Nowadays, technologies like Factory Reset Prevention should prevent that. And since when has Google's Project Treble been a hacking tool? 

Just kick him out and reset your devices. Change your passwords, and you'll be fine. 

  • Like 1
Posted

He won’t let me comment on here. It says I reached my limit after 1 comment. I’ve been private messaging you. I can back up all I say except when I said ADB daemon. After a little more research I realize it wasn’t the adb darmon . Please remember I have never said I knew what I was talking about or I wouldn’t be looking for help. Before all this happened I knew nothing so trying to explain things absolutely correctly without being wrong a little should be expected I Can assure you that I am being hacked especially on android phone. He takes complete control. In return I notice his control and try to google the problem because I feel it’s better then doing nothing. I look into the results and try to make sense of it and although I may think at the time I figured things out a little bit I usually find out later I was clueless. 
the hacker definitely has a lot of experience with google app development . 
 

im not even sure if this will be posted or stopped like the rest of them. I’ve uploaded pictures, replied multiple times and private messages you. Just to find out today it’s gone and your comment about not responding is what made me realize you were not getting my replies. This is what I’ve been dealing with so it’s pointless to try to get help right now if I can’t communicate and respond 

 

Posted

If he has a way to remotely take over a new Android phone then he had a million dollar exploit in his pocket. He would not waste it annoying you he would sell it and be enjoying the high life. Similar for the rest of the attacks you describe.

The limits you've seen on the forum are the same limits all new users get, you aren't special.

As expected, we've had at least one "I recommend contacting x" reply to this thread. This is one of the scams, there are a few backwards and forwards replies then suddenly all is fixed and a glowing review is posted for person x.

The other common one is to gain someone's trust then give them an account supposedly belonging to the attacker and tell them if they could gain access to this account for them they would have all the proof they need. This isn't the attacker's account, it is just someone they want to get access to and they are having you do the initial illegal act for them.

Out of interest, how many people have been contacted directly by this person?

  • Upvote 1
Posted
9 hours ago, Dekcah laudividni said:

im not even sure if this will be posted or stopped like the rest of them. I’ve uploaded pictures, replied multiple times and private messages you. Just to find out today it’s gone and your comment about not responding is what made me realize you were not getting my replies. This is what I’ve been dealing with so it’s pointless to try to get help right now if I can’t communicate and respond 

 

I wondered if you were trying to respond, but I never sent any message about you not responding. 

 

7 hours ago, digininja said:

If he has a way to remotely take over a new Android phone then he had a million dollar exploit in his pocket. He would not waste it annoying you he would sell it and be enjoying the high life. Similar for the rest of the attacks you describe.

The limits you've seen on the forum are the same limits all new users get, you aren't special.

As expected, we've had at least one "I recommend contacting x" reply to this thread. This is one of the scams, there are a few backwards and forwards replies then suddenly all is fixed and a glowing review is posted for person x.

The other common one is to gain someone's trust then give them an account supposedly belonging to the attacker and tell them if they could gain access to this account for them they would have all the proof they need. This isn't the attacker's account, it is just someone they want to get access to and they are having you do the initial illegal act for them.

Out of interest, how many people have been contacted directly by this person?

Yes, there was a post that looked like a scam, but OP has yet to do anything suspicious or even ask for anything. However, the actions described cannot be explained by typical hacker motives. Hackers usually don't waste so much time, effort, and risk of prison on lols. 

Posted

I will try to be gentle, but..

a lot of what you're saying doesn't make much sense. Is he in the house (just to clarify), or is he next door ?
If he has access to your hardware, well..protect your hardware. Live usb linux, well, if someone has access to the usb drives, and they can write a new os to them (custom made live with a backdoor), game over...
As for hacking your phone, as someone else pointed out, if he has a remote exploit, i doubt he would use it to harass you, is worth a pretty penny if he sold it.
Resettting the router, it can reset due to a power glitch, or update from your ISP, so nothing alarming there.

So, please, a bit more info, and be very specific and clear on what you experience, when, where and how 🙂

/NX

  • 1 month later...
Posted

Your post.... 😵

If this is real and you're not on some acid trip, i'm not sure why you're using Linux on a compromised network. If anything at basic level... cloud all your files to OneDrive or iCloud, factory reset all your devices via bootable USB, reset and restore from the cloud. Do the same for your network and ask the ISP to move the router to your room, as you are concerned for your privacy. 

In this order: 

1/ Upload all files to cloud.

2/ Bootable USB OS for Laptop

3/ Disconnect all devices from the router. 

4/ Reset router and create your own secure wifi settings. 

5/ Reformat laptop, reset iPhone. 

6/ Connect to the router and restore from iCloud or OneDrive. 

You mentioned his attack vectors are phishing and network spoofing, if you know how to use Linux then learn how to use Kismet, this way you know the router you connect to is yours and not some one he has conjured via an "Evil Twin" attack.

WPA3 security is also a thing now, read more about it. Good Luck!

  • 1 month later...
Posted
On 1/26/2024 at 6:56 AM, DramaKing said:

You kind of lost me at the TVs. You can remote control them and cast media, but that's really it without opening them up and hacking into the hardware. All the mentioned devices can be reset, so I don't understand the need to keep replacing them. Plus, new devices are fully updated, making me more skeptical, not to mention your deep pockets. 

Anyway, I plan to read the whole post but TL;DR. 

I have had similar instances of my TVs being hacked. In my case I had a work colleague who utilized LANSweeper app which was installed on with laptop to get all serial numbers, MAC addresses and IMEI addresses of everything on my home network. Once the CEO asked me to find someone to replace him that’s when I became targeted.

He was able to gain access to my personal laptop and  then access to my Samsung account as it is required to have one in order to add apps to your Samsung TV. With that information he added my account to a Samsung Hub. I have 3 TVs and tried in the TV settings I tried resetting the Hub, resetting the TV to factory settings after which I was able to successfully turn off WiFi. I went to the TVs hidden menu to attempt to disable BlueTooth and discovered that the Knox Security app (Built in to Frame TVs) was missing several configuration items including the one which would allow me to Turn off Bluetooth. 
 

By the time I returned to the main screen the WIFI settings no longer showed as disabled and the only connection option that was available was to connect via WIFI even though I use LAN for my TVs. 
 

I believe in my case the hacking is tied to the Samsung account and Potentially Device Management via Knox Security. In my testing I would log in to the Samsung account, configure the TV and then immediately sign out of the account on the TV and then delete the account. I found that they moved from using my account to using my partner’s account which we’ve been trying to regain access to so we can delete that and determine whether we are dealing strictly with Samsung account being utilized via a hub or whether it is Knox Security via Managed Device. 
 

Nonetheless, TVs can be hacked and/or compromised either by the account used to configure it, a Hub application managing it, a Device Management software that the TV may have been enrolled in or by malware. In my case I’ve narrowed it down to Samsung account or Knox Security Mobile Device Management think of (Sidestepper vulnerability).

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...