Jump to content

All devices compromised, harasses for over a year

Recommended Posts

  • Root Admin

Good day @exploitedsquirrel

That person was not hacked. They simply did not understand how Windows works and thought all these files that are hidden by default by Microsoft were signs of a hack when the file and extensions were unbidden.

If you'd like help checking your computer please get us some logs.



To begin, please do the following so that we may take a closer look at your installation for troubleshooting:

NOTE: The tools and the information obtained are safe and not harmful to your privacy or your computer, please allow the programs to run if blocked by your system.

  • Download the Malwarebytes Support Tool
  • In your Downloads folder, open the mb-support-x.x.x.xxx.exe file
  • In the User Account Control pop-up window, click Yes to continue the installation
  • Run the MBST Support Tool
  • In the left navigation pane of the Malwarebytes Support Tool, click Advanced
  • In the Advanced Options, click Gather Logs. A status diagram displays the tool is Getting logs from your machine
  • A zip file named mbst-grab-results.zip will be saved to the Public desktop, please upload that file on your next reply

Thank you


Link to post
Share on other sites

Unfortunately, hes out of Pakistan, so combined with payment and schedule it has not been efficient. For starters I need to block socks protocol from my IOS device. This is accomplished by something called link director Apple found during diagnostics. Additionally, what needs to be changed to lock down a bio/uefi from having memory flashed. That is how the attack is initiated on a PC. How that part works, I have no idea. But the end result is a virtual network interface that is a bridge to an outside party. The bios changes from stock naming to having AMI in the title. 

Link to post
Share on other sites

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.