LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Linux - Mobile (https://www.linuxquestions.org/questions/linux-mobile-81/)
-   -   Mounting my phone. How do I stop them. (https://www.linuxquestions.org/questions/linux-mobile-81/mounting-my-phone-how-do-i-stop-them-4175625988/)

Danwilliams1989 03-20-2018 09:39 PM

Mounting my phone. How do I stop them.
 
Hi guys.

Someone is hacking my home networking. Using Linux OS and mounting and creating lib files/documents and locking me out. It seems they are able to do this without rooting or jail breaking my devices. The latest example is my Amazon fire stick. The most weird example is my PS4.

Problems is I am having my new replacement s8 plus that I have had to claim on because they did what they did.

I don’t know how to keep them out I’ve tried VPN and antiviruses. They just seem to turn the software on me to their advantage like change the permissions of the app or add parts of code to be malicious.

I have no idea why. Well I do from what I’ve seen it seems they want to spy on me using VOIP I’ve found logs of this. I’ve also used an intruder app and caught half a face on camera when they’ve initially gone into to change the app.

There’s loads to the story but I’m just wondering what can I do to stop them mounting my device using ssh and removing and self signing certificates to uncertify my device. The are also harvesting cookie information for passwords but not using them. I only know because they are using chromium and when I put in http://chrome/chrome-urls I get all their stored information show up. They have also dropped ssl security on apps and webpages so I’m surfing unsecurely.

I think I covered most of things.

If anyone can help keep them out. Can you give me the advice. It would be best to mention also they have penetrating my home Wifi using kali or metasploit already and are using the old smb hack attack.

I hope I’ve made sense and someone can help please help

Danwilliams1989 03-20-2018 09:45 PM

I forgot to mention the are using last loads of different open source software as well to be malicious (they put the license information on my devices) is there anyone I can contact for help with that.

For example I’ve seen a lot lately about oauth2 which I read is something to do with like authentication when logging in. Also
I wanted to ask what a login token was and how they can use it to login into my accounts using it. Even though I use 2 step on everything

ferrari 03-20-2018 11:36 PM

I think you may be in need of expert help to help resolve this. If your devices are compromised as you describe , security credentials (and other personal/sensitive data) may have been harvested. The gateway router/firewall needs to be checked for security, and all connected devices checked. It's not a trivial task. It could be that malware is installed and enabling a hacker to further attack your network.

https://www.cnet.com/forums/discussi...k-been-hacked/

sundialsvcs 03-21-2018 08:04 AM

I definitely agree: you need to solicit professional help.

TB0ne 03-21-2018 08:49 AM

Quote:

Originally Posted by Danwilliams1989 (Post 5833462)
I forgot to mention the are using last loads of different open source software as well to be malicious (they put the license information on my devices) is there anyone I can contact for help with that.

For example I’ve seen a lot lately about oauth2 which I read is something to do with like authentication when logging in. Also
I wanted to ask what a login token was and how they can use it to login into my accounts using it. Even though I use 2 step on everything

Yeah...haven't we been here before??
https://www.linuxquestions.org/quest...nk-4175624013/

Your last thread, and this one, seem to be nothing but wild speculation about some 'they' who is hacking you somehow...and now they're in your phone too? Sorry, nothing you're saying is adding up. If you have these logs and 'proof', then you only need to take this to the police cybercrimes unit, and they can act. You claim to have proof, so use it.

According to you, they are wizard-class hackers, able to hack your iphone, PS4, computer, and whatever else they want. And even though you have no proof, you KNOW they're using 'kali linux' to do this somehow. Nothing in these past two threads makes actual, technical sense. Sorry, it just doesn't; you string together technical terms that make no sense in the context you're using them. Your first post here is so inconsistent with the story you're telling (and have told), that it's not even funny.

The only thing that is probably happening, is that they're using your wifi through the BT admin password, which (AGAIN) are trivial to guess. Get another wifi point that is secure, and turn off BT wifi. Past that...I agree with sundialsvcs

dugan 03-29-2018 03:37 PM

Quote:

Originally Posted by Danwilliams1989 (Post 5833459)
spy on me using VOIP I’ve found logs of this

Quote:

I’ve also used an intruder app and caught half a face on camera when they’ve initially gone into to change the app.
Quote:

I only know because they are using chromium and when I put in http://chrome/chrome-urls I get all their stored information show up.
You clearly need to get a more informed evaluation of these than what you can do yourself.

So show them to us.

Or show someone you trust at a LUG.

Or show a security professional (if you're willing to invest in the services of one).

Or show the police.

Because no offence, but the "my Amazon fire stick was used as an attack vector" is literally proof that you've misinterpreted something.

To be clear: I said "that you've misinterpreted something". Not that that you don't actually have a problem (we don't know that).

BW-userx 03-29-2018 07:28 PM

This one time in New Genny I was working in office / computer supply store and this old lady came in in a frantic. So I asked her what the problem was. She told me she delete the internet.

I asked here how did she do that?

she told me, she deleted the little world icon off of her windows desktop, so now the internet was gone.

Yes, she actually believed she had deleted the entire internet.

true story. :D except for the place happened at.

sundialsvcs 03-29-2018 09:09 PM

I used to work in Academic Computing at my University during minicomputer days, and the first few weeks of classes were always interesting. A lady came into the office and said the computer wasn't working. I went to her station where everything – even a "BASIC coding form," neatly filled in – was laid out just so. I sat down, absently reached to the back of the terminal to turn it on, did so ... and she abruptly said, "Stop. Thank you." And basically hurried me off. It took me a few minutes to piece together what must have happened. But, I'm not making any fun of her, even to this day. "Computer anxiety" is real. (She was very disciplined, put hard work into her classes, and excelled.)

TB0ne 01-06-2019 02:21 PM

Quote:

Originally Posted by misskarportiro (Post 5945360)
I wanted to ask what a login token was and how they can use it to login into my accounts using it. Even though I use 2 step on everything

Read the LQ Rules; open your own thread for your own question, and don't hijack someone elses thread with your own. And before doing any of that, you need to read all of the posts above, and think about what you're asking, and how. What 'they' are you talking about, why do you think 'they' are logging in to your accounts, what accounts are you talking about, on what version/distro of Linux?

This entire thread was pretty much junk; please don't add to it.

ondoho 01-07-2019 01:45 AM

Quote:

Originally Posted by misskarportiro (Post 5945360)
I wanted to ask what a login token was and how they can use it to login into my accounts using it. Even though I use 2 step on everything

i just reported this user.
they are resurrecting old, smartphone-related threads, quoting the OP and adding a few keywords.
in this quote, the terms "Notepad++ Malwarebytes FileZilla" are visually hidden links.
i already reported two other posts where the keywords were porn-related (and i didn-t notice they were links).

hazel 01-07-2019 05:54 AM

Quote:

Originally Posted by BW-userx (Post 5837122)
She told me she deleted the internet. I asked here how did she do that? She told me, she deleted the little world icon off of her windows desktop, so now the internet was gone.

Yes, she actually believed she had deleted the entire internet.

It's a lovely story, but I wonder if that's really what she meant. Being an old woman myself and knowing how such people's minds work, I think she probably believed she had permanently lost the means of accessing the Internet by deleting that icon. So, as far as she was concerned, the Internet was gone.

sevendogsbsd 03-02-2019 03:03 PM

Sounds like the OP needs to seek professional substance abuse help, in the form of methamphetamine detox. Meth and crack addicts suffer from extreme paranoia and ramble like this.

ondoho 03-03-2019 12:06 AM

Quote:

Originally Posted by ferrari (Post 5969127)
Reported ^^

again those hidden links, in TB0ne's quoted text this time.
Quote:

Originally Posted by ondoho (Post 5945571)
they are resurrecting old, smartphone-related threads, quoting the OP and adding a few keywords.
in this quote, the terms "Notepad++ Malwarebytes FileZilla" are visually hidden links.



All times are GMT -5. The time now is 08:42 PM.