LinuxQuestions.org
Help answer threads with 0 replies.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Mobile
User Name
Password
Linux - Mobile This forum is for the discussion of all topics relating to Mobile Linux. This includes Android, Tizen, Sailfish OS, Replicant, Ubuntu Touch, webOS, and other similar projects and products.

Notices


Reply
  Search this Thread
Old 03-20-2018, 10:39 PM   #1
Danwilliams1989
LQ Newbie
 
Registered: Feb 2018
Location: Swansea
Distribution: Ubuntu
Posts: 27

Rep: Reputation: 0
Mounting my phone. How do I stop them.


Hi guys.

Someone is hacking my home networking. Using Linux OS and mounting and creating lib files/documents and locking me out. It seems they are able to do this without rooting or jail breaking my devices. The latest example is my Amazon fire stick. The most weird example is my PS4.

Problems is I am having my new replacement s8 plus that I have had to claim on because they did what they did.

I donít know how to keep them out Iíve tried VPN and antiviruses. They just seem to turn the software on me to their advantage like change the permissions of the app or add parts of code to be malicious.

I have no idea why. Well I do from what Iíve seen it seems they want to spy on me using VOIP Iíve found logs of this. Iíve also used an intruder app and caught half a face on camera when theyíve initially gone into to change the app.

Thereís loads to the story but Iím just wondering what can I do to stop them mounting my device using ssh and removing and self signing certificates to uncertify my device. The are also harvesting cookie information for passwords but not using them. I only know because they are using chromium and when I put in http://chrome/chrome-urls I get all their stored information show up. They have also dropped ssl security on apps and webpages so Iím surfing unsecurely.

I think I covered most of things.

If anyone can help keep them out. Can you give me the advice. It would be best to mention also they have penetrating my home Wifi using kali or metasploit already and are using the old smb hack attack.

I hope Iíve made sense and someone can help please help
 
Old 03-20-2018, 10:45 PM   #2
Danwilliams1989
LQ Newbie
 
Registered: Feb 2018
Location: Swansea
Distribution: Ubuntu
Posts: 27

Original Poster
Rep: Reputation: 0
I forgot to mention the are using last loads of different open source software as well to be malicious (they put the license information on my devices) is there anyone I can contact for help with that.

For example I’ve seen a lot lately about oauth2 which I read is something to do with like authentication when logging in. Also
I wanted to ask what a login token was and how they can use it to login into my accounts using it. Even though I use 2 step on everything
 
Old 03-21-2018, 12:36 AM   #3
ferrari
LQ Guru
 
Registered: Sep 2003
Location: Auckland, NZ
Distribution: openSUSE Leap
Posts: 5,376

Rep: Reputation: 1044Reputation: 1044Reputation: 1044Reputation: 1044Reputation: 1044Reputation: 1044Reputation: 1044Reputation: 1044
I think you may be in need of expert help to help resolve this. If your devices are compromised as you describe , security credentials (and other personal/sensitive data) may have been harvested. The gateway router/firewall needs to be checked for security, and all connected devices checked. It's not a trivial task. It could be that malware is installed and enabling a hacker to further attack your network.

https://www.cnet.com/forums/discussi...k-been-hacked/

Last edited by ferrari; 03-21-2018 at 12:37 AM.
 
Old 03-21-2018, 09:04 AM   #4
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 9,435
Blog Entries: 4

Rep: Reputation: 3378Reputation: 3378Reputation: 3378Reputation: 3378Reputation: 3378Reputation: 3378Reputation: 3378Reputation: 3378Reputation: 3378Reputation: 3378Reputation: 3378
I definitely agree: you need to solicit professional help.
 
Old 03-21-2018, 09:49 AM   #5
TB0ne
LQ Guru
 
Registered: Jul 2003
Location: Birmingham, Alabama
Distribution: SuSE, RedHat, Slack,CentOS
Posts: 24,303

Rep: Reputation: 7147Reputation: 7147Reputation: 7147Reputation: 7147Reputation: 7147Reputation: 7147Reputation: 7147Reputation: 7147Reputation: 7147Reputation: 7147Reputation: 7147
Quote:
Originally Posted by Danwilliams1989 View Post
I forgot to mention the are using last loads of different open source software as well to be malicious (they put the license information on my devices) is there anyone I can contact for help with that.

For example Iíve seen a lot lately about oauth2 which I read is something to do with like authentication when logging in. Also
I wanted to ask what a login token was and how they can use it to login into my accounts using it. Even though I use 2 step on everything
Yeah...haven't we been here before??
https://www.linuxquestions.org/quest...nk-4175624013/

Your last thread, and this one, seem to be nothing but wild speculation about some 'they' who is hacking you somehow...and now they're in your phone too? Sorry, nothing you're saying is adding up. If you have these logs and 'proof', then you only need to take this to the police cybercrimes unit, and they can act. You claim to have proof, so use it.

According to you, they are wizard-class hackers, able to hack your iphone, PS4, computer, and whatever else they want. And even though you have no proof, you KNOW they're using 'kali linux' to do this somehow. Nothing in these past two threads makes actual, technical sense. Sorry, it just doesn't; you string together technical terms that make no sense in the context you're using them. Your first post here is so inconsistent with the story you're telling (and have told), that it's not even funny.

The only thing that is probably happening, is that they're using your wifi through the BT admin password, which (AGAIN) are trivial to guess. Get another wifi point that is secure, and turn off BT wifi. Past that...I agree with sundialsvcs
 
Old 03-29-2018, 04:37 PM   #6
dugan
LQ Guru
 
Registered: Nov 2003
Location: Canada
Distribution: distro hopper
Posts: 10,189

Rep: Reputation: 4753Reputation: 4753Reputation: 4753Reputation: 4753Reputation: 4753Reputation: 4753Reputation: 4753Reputation: 4753Reputation: 4753Reputation: 4753Reputation: 4753
Quote:
Originally Posted by Danwilliams1989 View Post
spy on me using VOIP I’ve found logs of this
Quote:
I’ve also used an intruder app and caught half a face on camera when they’ve initially gone into to change the app.
Quote:
I only know because they are using chromium and when I put in http://chrome/chrome-urls I get all their stored information show up.
You clearly need to get a more informed evaluation of these than what you can do yourself.

So show them to us.

Or show someone you trust at a LUG.

Or show a security professional (if you're willing to invest in the services of one).

Or show the police.

Because no offence, but the "my Amazon fire stick was used as an attack vector" is literally proof that you've misinterpreted something.

To be clear: I said "that you've misinterpreted something". Not that that you don't actually have a problem (we don't know that).

Last edited by dugan; 03-29-2018 at 04:55 PM.
 
Old 03-29-2018, 08:28 PM   #7
BW-userx
LQ Guru
 
Registered: Sep 2013
Location: Somewhere in my head.
Distribution: Slackware (current), FreeBSD, Win10, It varies
Posts: 9,952

Rep: Reputation: 2149Reputation: 2149Reputation: 2149Reputation: 2149Reputation: 2149Reputation: 2149Reputation: 2149Reputation: 2149Reputation: 2149Reputation: 2149Reputation: 2149
This one time in New Genny I was working in office / computer supply store and this old lady came in in a frantic. So I asked her what the problem was. She told me she delete the internet.

I asked here how did she do that?

she told me, she deleted the little world icon off of her windows desktop, so now the internet was gone.

Yes, she actually believed she had deleted the entire internet.

true story. except for the place happened at.
 
Old 03-29-2018, 10:09 PM   #8
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 9,435
Blog Entries: 4

Rep: Reputation: 3378Reputation: 3378Reputation: 3378Reputation: 3378Reputation: 3378Reputation: 3378Reputation: 3378Reputation: 3378Reputation: 3378Reputation: 3378Reputation: 3378
I used to work in Academic Computing at my University during minicomputer days, and the first few weeks of classes were always interesting. A lady came into the office and said the computer wasn't working. I went to her station where everything Ė even a "BASIC coding form," neatly filled in Ė was laid out just so. I sat down, absently reached to the back of the terminal to turn it on, did so ... and she abruptly said, "Stop. Thank you." And basically hurried me off. It took me a few minutes to piece together what must have happened. But, I'm not making any fun of her, even to this day. "Computer anxiety" is real. (She was very disciplined, put hard work into her classes, and excelled.)

Last edited by sundialsvcs; 03-29-2018 at 10:11 PM.
 
Old 01-06-2019, 03:21 PM   #9
TB0ne
LQ Guru
 
Registered: Jul 2003
Location: Birmingham, Alabama
Distribution: SuSE, RedHat, Slack,CentOS
Posts: 24,303

Rep: Reputation: 7147Reputation: 7147Reputation: 7147Reputation: 7147Reputation: 7147Reputation: 7147Reputation: 7147Reputation: 7147Reputation: 7147Reputation: 7147Reputation: 7147
Quote:
Originally Posted by misskarportiro View Post
I wanted to ask what a login token was and how they can use it to login into my accounts using it. Even though I use 2 step on everything
Read the LQ Rules; open your own thread for your own question, and don't hijack someone elses thread with your own. And before doing any of that, you need to read all of the posts above, and think about what you're asking, and how. What 'they' are you talking about, why do you think 'they' are logging in to your accounts, what accounts are you talking about, on what version/distro of Linux?

This entire thread was pretty much junk; please don't add to it.
 
Old 01-07-2019, 02:45 AM   #10
ondoho
LQ Addict
 
Registered: Dec 2013
Posts: 18,138
Blog Entries: 12

Rep: Reputation: 5535Reputation: 5535Reputation: 5535Reputation: 5535Reputation: 5535Reputation: 5535Reputation: 5535Reputation: 5535Reputation: 5535Reputation: 5535Reputation: 5535
Quote:
Originally Posted by misskarportiro View Post
I wanted to ask what a login token was and how they can use it to login into my accounts using it. Even though I use 2 step on everything
i just reported this user.
they are resurrecting old, smartphone-related threads, quoting the OP and adding a few keywords.
in this quote, the terms "Notepad++ Malwarebytes FileZilla" are visually hidden links.
i already reported two other posts where the keywords were porn-related (and i didn-t notice they were links).
 
1 members found this post helpful.
Old 01-07-2019, 06:54 AM   #11
hazel
LQ Guru
 
Registered: Mar 2016
Location: Harrow, UK
Distribution: LFS, AntiX, Slackware
Posts: 5,871
Blog Entries: 16

Rep: Reputation: 3461Reputation: 3461Reputation: 3461Reputation: 3461Reputation: 3461Reputation: 3461Reputation: 3461Reputation: 3461Reputation: 3461Reputation: 3461Reputation: 3461
Quote:
Originally Posted by BW-userx View Post
She told me she deleted the internet. I asked here how did she do that? She told me, she deleted the little world icon off of her windows desktop, so now the internet was gone.

Yes, she actually believed she had deleted the entire internet.
It's a lovely story, but I wonder if that's really what she meant. Being an old woman myself and knowing how such people's minds work, I think she probably believed she had permanently lost the means of accessing the Internet by deleting that icon. So, as far as she was concerned, the Internet was gone.
 
1 members found this post helpful.
Old 03-02-2019, 04:03 PM   #12
sevendogsbsd
Senior Member
 
Registered: Sep 2017
Distribution: FreeBSD
Posts: 2,252

Rep: Reputation: 1008Reputation: 1008Reputation: 1008Reputation: 1008Reputation: 1008Reputation: 1008Reputation: 1008Reputation: 1008
Sounds like the OP needs to seek professional substance abuse help, in the form of methamphetamine detox. Meth and crack addicts suffer from extreme paranoia and ramble like this.
 
Old 03-03-2019, 01:06 AM   #13
ondoho
LQ Addict
 
Registered: Dec 2013
Posts: 18,138
Blog Entries: 12

Rep: Reputation: 5535Reputation: 5535Reputation: 5535Reputation: 5535Reputation: 5535Reputation: 5535Reputation: 5535Reputation: 5535Reputation: 5535Reputation: 5535Reputation: 5535
Quote:
Originally Posted by ferrari View Post
Reported ^^
again those hidden links, in TB0ne's quoted text this time.
Quote:
Originally Posted by ondoho View Post
they are resurrecting old, smartphone-related threads, quoting the OP and adding a few keywords.
in this quote, the terms "Notepad++ Malwarebytes FileZilla" are visually hidden links.
 
1 members found this post helpful.
  


Reply

Tags
android, hacking, linux, mobile


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Smart Phone mounting it as a USB? jamiebbbb Linux - Newbie 18 05-27-2017 05:01 AM
Question on mounting of Andriod Phone in Linux michalng Debian 3 12-28-2014 08:34 AM
[SOLVED] Problem Mounting Android Phone Pinonoir Slackware 11 06-06-2014 10:52 AM
Mounting phone filesystem via bluetooth CrownAmbassador Linux - Hardware 1 04-27-2008 08:50 AM
telephone de modem adsl FAI doesn't stop answer phone on Fax brancher FranceTelecom starlyte Linux - Networking 3 06-26-2007 03:51 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Mobile

All times are GMT -5. The time now is 09:30 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration