A few days ago, I noticed a sensitive file on my desktop downloaded through my browser after I stepped away for a few minutes to grab a bite to eat. Upon reviewing the system logs I found someone with admin access to my PC had been making changes to my settings while I was not there. Upon further review, I realized than on that same PC there were 4 windows profiles I never created which stopped me from changing back certain settings. I checked add/remove programs and found virtual desktop software that I was unable to delete due to the elevated admin privileges of the hacker. I disconnected the Wi-Fi and checked the other devices in my home, and sure enough they were all suffering the same issue (profiles with admin access I never created).
Also, upon pasting my router/modem logs into chat GPT, it told me there were multiple fishy things going on which indicate the network could possibly be compromised, so I'm assuming that the malware spread through the Wi-Fi.
I've kept everything off WIFI, got a new modem from Xfinity, and purchased a new PC so that I could have something secure to use in the meantime for work, but upon setting up the Wi-Fi and completing Windows setup on the new PC, I noticed the same issue (multiple profiles with admin access I never created) directly after setup. I used a new Microsoft account which I created during Windows setup and took tried using every measure I knew possible to make sure the new router and PC were clean.
I didn't want to use any devices I was actively using for setting up the new stuff, but I also didn't want to have to spend a bunch of money buying a new smartphone either. I tried resetting one of my iPhones, but even after turning off iCloud backup and Find My and doing a full reset, and signing out, the phone had backups and Find My on after logging in with my Apple ID. This persisted after 3 resets and contacting apple support for assistance leading me to believe the phone was toast.
I ended up using a Samsung phone that's been powered off for years and got a prepaid sim so I could access the Xfinity app to setup the router. Assuming that this only happened recently, I didn't think to reset the phone which I probably should have. That said, the only way I can think that it possibly got reinfected is the fact I used this phone to setup the Wi-Fi, but I haven't used the phone since 2021. Does that mean that whoever did this hacked me all the way back in 2021 or even before, and the Samsung device was infected through compromised Wi-Fi back then, and reinfected my new modem which in turn reinfected the computer?
If this has been happening for years and hackers have had remote access, collecting info to try to ransom me, steal my identity, or something worse, what are the next steps I should take? I've already filed an IC3 and taken steps to secure my most vulnerable accounts, but I'm at my wits end and feel like I need to contact a cyber security professional in my area to help me sort this out. I just can't find anyone online who has delt with this level of compromise to know I'll be getting my money's worth if I end up going that route, and I'm not well off enough to pay big money for this.
---
TLDR: I got completely pwned, PC's, Phones, WIFI all ratted.
What should I do to get at least the Wi-Fi, one phone, and one PC secured without buying anything new or spending more hours on the phone trying to get help from xfinity, verizon, and apple?
How do I protect my family and I from identity theft, or ransom before they do anything?
Is this a targeted attack specifically towards me?
Given the level of compromise, should I assume the hard drives and possibly other components are toast on my PC's?
Is it possible to find out who did this?
Could this be the work of some kind intelligence agency? (P.S I'm not a criminal)
Could this have happened as a result of the recent zero-day exploit on apple computers with intel chips on outdated software? (I have one).
---
Any and all feedback is appreciated.
Thank you in advance.
Having read through the overwhelming extent of the breach you've experienced, I can understand your sense of frustration and urgency. My name is Shofiur Rahman, and I am an experienced Cybersecurity professional offering proactive and effective solutions to clients around the globe. My vast skills ranging from Windows Security & Forensics to Web Application Security make me the perfect fit to resolve the critical situation you're currently facing. Having attained my certifications as a Certified Ethical Hacker and Web Security Specialist among others, rest assured that I possess not only theoretical but also practical knowledge on how to recover and secure compromised systems.
Over my decade-long tenure within the cybersecurity sector, I have cultivated what it takes to handle such substantial breaches as yours. I specialize in identifying vulnerabilities, even including zero-day vulnerabilities, to ensure your systems are absolutely secure. My proficiency extends well beyond just detection; I am able to develop thorough plans for remediation and fortification.
I understand the gravity of this situation on not only a personal level but also professionally as an expert who is well-versed in neutralizing hacks. With claims to being one of the top 1% of Cybersecurity Engineers on Freelancer, I guarantee you comprehensive security and peace of mind. Together, let's close these loopholes and fortify your digital world against any future threats.
Hello,
I understand the urgency and complexity of your situation and can assure you that I have the expertise to address this effectively. With over nine years of experience in cybersecurity and network administration, I specialize in identifying, mitigating, and preventing advanced threats like malware infections, unauthorized access, and network compromises.
I will conduct a thorough investigation of your devices, network, and logs to identify the root cause of the issue. I'll implement robust security measures to restore your system integrity, secure your devices, and safeguard your data. My approach will also ensure your family’s protection against identity theft and further intrusions.
Rest assured, I will provide clear guidance on the next steps and help you regain peace of mind. Let's work together to resolve this swiftly and comprehensively.
Thanks,
Rajesh
Hello,
I am deeply familiar with the challenges you are facing and can confidently assist in resolving this complex situation. With over 9 years of experience in cybersecurity, network troubleshooting, and malware removal, I specialize in tackling targeted attacks and compromised environments like yours. I will analyze your devices and network to identify vulnerabilities, neutralize threats, and restore your systems' security. Furthermore, I can provide actionable steps to protect your identity and prevent future intrusions.
Rest assured, I will bring clarity and resolution to this stressful situation. Let’s connect to secure your devices and regain your peace of mind.
Thanks,
Vipin
Hi, As red team and worked in offensive security , I analyzed your request, I can say that it fits my experience. I think I can contribute well to this; let's connect and talk more about the requirements. awaiting your response.
Hey man, first of, really sorry to hear that you are going trough this experience, its really awful. I am putting a lower price than most because i really want to help you out with this, i am genuinely interested in figuring out what happened first out of solidarity to a person that needs it and second because i am passionate about cyber security.
About my credentials: I work full time as a cyber security engineer, i have completed over 300 CTF challenges and i look at malware samples in my free time.
You’ve reported a complete compromise of your devices, including personal computers, phones, and Wi-Fi infrastructure, believed to be infected with Remote Access Trojans (RATs) and potentially other malware. Your main concerns include securing your family’s data, mitigating risks of identity theft, and determining the attack’s source and scope.
Scope of Work:
Incident Investigation: Analyze the attack, identify malware, uncover vulnerabilities, and create a timeline of events.
Device & Network Security: Securely wipe and reset affected devices, secure Wi-Fi infrastructure, and implement necessary security measures.
Identity Protection: Advise on protecting against identity theft and securing financial accounts.
Forensic Report: Provide a detailed report with findings, root cause analysis, and actionable security steps.
Timeline:
Investigation & Remediation: 2-4 days
Final Report: 1-2 days
Why Choose Me:
Certified DFIR expert with extensive experience in investigating and securing compromised systems.