Man, my life has turned to shit.

Man, my life has turned to shit. I have been being tortured for the past 4 weeks of my life by the absolute WORST Trojan/Malware/Worm/Virus I have ever seen in my life. I cannot explain how this is occurring but I can promise you that it is.

My website got hacked at the end of Aug. I was really dumb for letting my site back up into my personal Dropbox every day. My DB synced with every single device I owned. When my site was hacked, the hackers injected a folder with a ton of Javascript files and PNG files in it. They either injected it into my site through hacking it somehow or they got my password to my DB because at around the same time this happened, 60+ Million DB passwords were dumped onto the dark web.. Either way, they screwed me really bad because every computer I own including my iPhone, and iMac got infected.

I am now seeing remote access happening and I actually saw that all of my saved passwords that I had in Chrome and Safari (I now know I am an butthole for this) were uploaded to an unknown server. I then realized that commands were being run on my computer via SSH and it still happened even when I disabled WiFi!!! Everything I could possibly do to shut down my wireless connections, I did. Still happening.. What the frick!? I then though that maybe the malware is written to still connect to my phone or any other device via bluetooth maybe? I have no answer to this...

I wiped my devices MULTIPLE TIMES! I even did a secure wipe on my laptop and let the thing sit for a whole day. The moment I installed the new OS, I kept seeing remote/sharing activity. I locked it down with Little Snitch and kept blocking connections I saw. I tried tracing the IP's connecting to me but I keep hitting dead ends. They come back to Ripe Networks and other cloud hosting companies.

A Conspiracy Theorist Is Talking Shirt $21.68

It's All Fucked Shirt $22.14

A Conspiracy Theorist Is Talking Shirt $21.68

  1. 2 months ago
    Anonymous

    I tried calling Apple probably 30 times in the past 4 weeks and I have spoke with SO many people. None of them could help. They would sometimes send me an email with a packet sniffing .dmg file to download so that I can let it sniff all the connections. The download button NEVER works; nor does the "Send Files To Apple" button in the email. I thought it was my DNS settings that were changed. (I have been getting redirects to malicious sites a lot) The DNS settings were not changed, but I changed them to OpenDNS' IP's. This didn't help. I am sure whoever it is, has my home IP address, and even when I changed out my router/modem, it did NOTHING. Time Warner Cable didn't know what to do with me. They suck so bad. I told them to give me a new IP and they "can't." What do I have to do to get some help from these people??

    I sent a lot of logs that show all of this hacking activity to [email protected] and even Time Warner's abuse email. I haven't heard shit from anyone! A "Senior Apple Tech" promised he would call me today after we spoke last Friday... He didn't... When I bring my computer and iPhone 7 into the store, they look at me like I am nuts because these idiots believe their system is SUPER secure. Well, it's NOT. The head of the genius bar sat with me and saw the logs and the weird processes running and all she could say was that she would wipe my computer AGAIN and she said there is absolutely no way I could get infected again after I did it. So she did it AGAIN and of course, it happened again.

    When I changed my gmail password in the beginning, I was getting google codes sent to me from the 2-step authentication from a FAKE phone number! I always get the code from the 5 digit number 220-00. I would always receive the code instantly as soon as I tried to log on but after the hack, it wouldn't come for a minute or two and it would come from the weird phone number...

    • 2 months ago
      Anonymous

      ask yourself if the problems you're paranoid about are actually affecting your ability to work. perhaps your only problem is paranoia

    • 2 months ago
      Anonymous

      mate you are clearly having a mental breakdown and possibly a schizophrenic / psychosis episode

      You need to seek medical help

    • 2 months ago
      Anonymous

      Now you have first hand experience about the reality of apple customer service and security don't buy apple devices for security ever
      Most competent security professionals and black hat hackers swear by this
      Apple has the worst security ever
      My iPhone got hacked fricking twice with 0 day vulnerabilities with both 5 and 7 never with android ever

      That definitely looks like code exploiting apples systems. It seems that most of that would not be happening on a normal device. Please explain every single suspicious looking input in the log file... anything that could be interpreted as suspicious. If you can do that, then maybe you'll have some sort of credit. But if you cant, you don't know enough information to be telling anyone that something malicious isn't happening. Because you do not know... you think... but you do not know. I don't see you trying to explain these things, you are just saying we are crazy. Try actually backing yourself up a bit, maybe?

      Op got 0-dayed
      Imagine bootlicking trillion dollar corporation

      I have reviewed your posts here and your posts on the apple forum, in which you post many screenshots or pastes of netstat still returning entries despite having your network adapters disconnected.

      You need to be aware that even with your network adapters disabled, dozens of programs use "loopback networking" to communicate with other processes also on your computer. A program can listen on a port for connections, and other programs on the same computer can then connect to those listening programs and communicate.

      This is a normal and common programming practice when there are systems on your computer that have a "backend" and a "frontend". Consider file search indexers - a program that looks through all your files to generate a memo of filenames and file types and stuff, so when you open Finder and type in "taxes 20" it can immediately return a list of found files matching your search "taxes 2021, taxes 2022, taxes 2023", etc. The part of the program you work with, the "front end", is liable to use loopback networking to connect to the "back end" system that slowly indexes your files in the background, so it can ask about files containing "taxes 20" and get a response, which the front-end program you're using can then display to you

      Also you definitely need medication.

      Getting hacked is normal especially with 0 day
      Apple greek squad response typical

    • 2 months ago
      Lucretia simp

      >makes a blogpost
      >doesn't post a tldr

      [...]

      Don't fking dare tell people to "stay on topic" IQfy isn't your personal IT you shit. Post this on /wsr/ if that's how you're gonna act you inbreed frick otherwise don't get mad for "none helpful post".
      itoddlers I swear

  2. 2 months ago
    Anonymous

    none of this had happened

    • 2 months ago
      Anonymous

      I use my gmail all day every day so I knew right away when it didn't look right.

      On my iPhone, and my girl's iPhone, our LTE signal keeps getting downgraded to 3G then to 1x, then it will turn off completely then go back to LTE. I can't shut off the location sharing on my iPad either. (AGAIN, ALL DEVICES HAVE BEEN WIPED OVER AND OVER!!!) I still get redirects and malicious website data/cookies keep appearing in the background on my Safari web data on my iPhone and computer... If the DNS settings aren't causing this, then it seems to me that I am literally logged into a server somewhere at all times and my phone/ computer is being mirrored. When I run a netstat -ab command, I see a lot of established connections even when the Wifi is turned off!!!

  3. 2 months ago
    Anonymous

    Lol pwned moron

  4. 2 months ago
    Anonymous

    Its your router/modem moron

    • 2 months ago
      Anonymous

      so i have internet coming through the cables lines, the coax cable. i guess that is called moca?
      i'm trying to figure out if i can just buy an adapter where i connect the coax to it and just plug my ethernet cable coming from my pc straight into that adapter. will that connect me to the internet?
      i was looking at a single adapter on Amazon and it warned that it was just a "add on kit" and that you needed to buy the starter 2 pack first for it to work. why can't i just buy one adapter and go coax coming out of wall into adapter and plug ethernet into the other side?

  5. 2 months ago
    Anonymous

    Why is the trackpad so big?

    • 2 months ago
      Anonymous

      >Why is the trackpad so big?
      Probably for the finger acrobatics needed for gestures.

    • 2 months ago
      Anonymous

      >laptop with a notch
      why?

      It's for people that think higher price = better product and don't know anything about a computer.

      • 2 months ago
        Anonymous

        >this computer costs less, does it have a trackpad with some fatal design flaw or horrible software that makes it painful to use for more than five minutes?
        >ha ha, it's a good computer sir
        >get home and unbox
        >it's a fatally flawed trackpad

    • 2 months ago
      Anonymous

      It's because the top is actually clickable, which means you can do things with one hand, in one motion—including large motions

      Additionally, there's not reason for it NOT to be as big as possible.

      Finally, while apple cheaps out on the weirdest things, they frequently don't cheap out on some of the most essential things. Every laptop maker would use a massive trackpad like this and make it glass and clickable at the top if they didn't cut corners to reduce costs.

  6. 2 months ago
    Anonymous

    >laptop with a notch
    why?

    • 2 months ago
      Anonymous

      there's a camera up there

      • 2 months ago
        Anonymous

        Why do you need a notch for that?

  7. 2 months ago
    Anonymous

    Unplug your router/access points moron

    • 2 months ago
      Anonymous

      I just did a netstat on my Mac And this came out, is this right?

      Proto Recv-Q Send-Q Local Address Foreign Address (state)
      tcp4 0 0 192.168.1.22.51130 192.168.1.3.http-alt ESTABLISHED
      tcp4 0 0 192.168.1.22.51128 server-54-230-16.https ESTABLISHED
      tcp4 0 0 192.168.1.22.51126 a173-222-177-219.https ESTABLISHED
      tcp4 0 0 192.168.1.22.51125 mia07s49-in-f14..https ESTABLISHED
      tcp4 0 0 192.168.1.22.51123 mia07s49-in-f3.1.https ESTABLISHED
      tcp4 0 0 192.168.1.22.51122 mia07s24-in-f10..https ESTABLISHED
      tcp4 0 0 192.168.1.22.51121 151.101.130.15.https ESTABLISHED
      tcp4 0 0 192.168.1.22.51120 mia07s26-in-f131.https ESTABLISHED
      tcp4 0 0 192.168.1.22.51116 mia07s26-in-f10..https ESTABLISHED
      tcp4 0 0 192.168.1.22.51114 mia07s48-in-f4.1.https ESTABLISHED
      tcp4 0 0 192.168.1.22.51111 17.188.133.61.5223 ESTABLISHED
      tcp4 0 0 192.168.1.22.51109 17.174.1.5.https FIN_WAIT_1
      tcp4 0 0 192.168.1.22.51108 192.168.1.3.8009 ESTABLISHED
      tcp4 0 0 192.168.1.22.51082 17.249.140.9.5223 ESTABLISHED

      • 2 months ago
        Anonymous

        Persistance was established through other local devices. You want my professional advice? Dban everything and start fresh. Completely fresh. Use a password manager and go into every online account you have, change each one to a randomly generated alpha numeric string.

        Handling this piecemeal is (no offense) beyond your skill level and would be very expensive to pay someone else to do.

      • 2 months ago
        Anonymous

        That definitely looks like code exploiting apples systems. It seems that most of that would not be happening on a normal device. Please explain every single suspicious looking input in the log file... anything that could be interpreted as suspicious. If you can do that, then maybe you'll have some sort of credit. But if you cant, you don't know enough information to be telling anyone that something malicious isn't happening. Because you do not know... you think... but you do not know. I don't see you trying to explain these things, you are just saying we are crazy. Try actually backing yourself up a bit, maybe?

  8. 2 months ago
    Anonymous

    >website hacked cause moron
    >calls apple for help
    h

    • 2 months ago
      Anonymous

      I don't know what your background is my friend, but, firmware is NOT hardware. It is the code written (flashed) onto hardware. There are many kinds of ROM. One being an EPROM. 30 years ago, I was rewriting them with ultraviolet light. You should probably google Thunderstrike exploit. Do your homework before insulting people, bro!

  9. 2 months ago
    Anonymous

    burn your house

  10. 2 months ago
    Anonymous

    There's only one thing you can do now. Collect all of your Apple products (and I mean ALL of them) and smash them to pieces with a hammer. Saturate the broken remains with boiling water to ensure that no further data transfer can take place. You must then make a solemn vow never to own or use Apple products for as long as you live. Good luck and God speed.

  11. 2 months ago
    Anonymous

    Trust me here OP
    It's someone you know doing this.

  12. 2 months ago
    Anonymous

    >every computer I own including my iPhone, and iMac got infected
    macs dont get viruses. either you're lying or you're holding it wrong and the specific wrong way you held it caused virus to be transmissed into it (user error).
    should've bought applecare+ protection plan.

  13. 2 months ago
    Anonymous
  14. 2 months ago
    Anonymous

    [...]

    >???
    macs dont get viruses.
    if you think you got a virus, you must be using a windows computer, because macs can't get viruses. only windows gets viruses.

  15. 2 months ago
    Anonymous

    holy moron, blogpost elsewhere

    • 2 months ago
      Anonymous

      its not a blogpost its GPT

  16. 2 months ago
    Anonymous

    I remember a guy at university who was 100% sure that he was being gang stalked by the government. He had all kinds of evidence of things that were blatantly impossible. It turned out he was just insane. Probably the same goes for you.

  17. 2 months ago
    Anonymous

    Subversion Hack. This shit's been going on since the late 1990s. I would always advocate finding, and shooting, your gang stalkers if you have them. Nobody's immune to bullets.

  18. 2 months ago
    Anonymous

    JUST INSTALL LINUX LUUULLL

  19. 2 months ago
    Anonymous

    Pinging foreign Mac addresses in CMD =/= you having a virus on all of your devices OP

  20. 2 months ago
    Anonymous

    Is it possible you’ve been posting or hosting spicy content and this is the Feds

  21. 2 months ago
    Anonymous

    Witness the power of "signing up" to use your proprietary crapware

  22. 2 months ago
    Anonymous

    you are seeing things that aren't real. you are having informational hallucinations. you see some information, like a process list or a network connection list, and you are hallucinating extra meaning behind the entries there that connect to some nefarious, all-connected plot of some kind. you need a break from tech and probably also need some medication.
    nobody gives that much of a shit about you. which might be the problem, i suppose, you're so uncared about that you're inventing reasons why someone cares about you enough to go to these lengths. it's sad.

    • 2 months ago
      Anonymous

      I know you're inside my fricking wires right now. I can sense the electromagnetic differential of a trojangay fricking around inside my wires. Get the frick out of my wires, trojangay. I just got into an electromagnetic fight against your Black person virus friends at local ram and I won. Motherfricking Black folk are frolicking and celebrating their digital invasion but they're powerless against the force of the almighty lord of hacking aka ME. I will deploy my deadliest antivirus if you don't and you will get metaphysically obliterated. You've been warned, trojangay.

      • 2 months ago
        Anonymous

        >you will get metaphysically obliterated
        oooh yes daddy. do you promise?

  23. 2 months ago
    Anonymous

    Schizo thread

  24. 2 months ago
    Anonymous

    Oh its some gay larping with some post from 2016

  25. 2 months ago
    Anonymous

    skill issue

  26. 2 months ago
    Anonymous

    How bored are you, OP?

    • 2 months ago
      Anonymous

      just chilling after VR sesh about to make some eggs Meta Quest 3 really is a peak Android device compared to the Apple one

      • 2 months ago
        Anonymous

        ?campaign=4ch

  27. 2 months ago
    Anonymous

    >my saved passwords that I had in Chrome and Safari
    lmao this homie saves his passwords

  28. 2 months ago
    Anonymous

    iTODDLERS BTFO

  29. 2 months ago
    Anonymous

    https://discussions.apple.com/thread/7686789?sortBy=best&page=1

  30. 2 months ago
    Anonymous

    apple devices don't get virus moron

  31. 2 months ago
    Anonymous

    Your post sounds very schizo.
    If you want to get to the bottom of it, take your laptop, open it, remove the wifi chip/hardware.

    Get a usb network adapter/ethernet, and run that through a cheap handmade linux router (e.g. raspberry pi). use the router to monitor all traffic going in and out.

    Boot up the machine, connect to internet ***Don't use any web browser which is probably giving you false positives*** and let it run.

    You will probably see some connections from apple cloud shit and whatever software updates, so take it with a grain of salt.

    I sometimes get an inkling and check for spyware though usually it's something else.

  32. 2 months ago
    Anonymous

    I have reviewed your posts here and your posts on the apple forum, in which you post many screenshots or pastes of netstat still returning entries despite having your network adapters disconnected.

    You need to be aware that even with your network adapters disabled, dozens of programs use "loopback networking" to communicate with other processes also on your computer. A program can listen on a port for connections, and other programs on the same computer can then connect to those listening programs and communicate.

    This is a normal and common programming practice when there are systems on your computer that have a "backend" and a "frontend". Consider file search indexers - a program that looks through all your files to generate a memo of filenames and file types and stuff, so when you open Finder and type in "taxes 20" it can immediately return a list of found files matching your search "taxes 2021, taxes 2022, taxes 2023", etc. The part of the program you work with, the "front end", is liable to use loopback networking to connect to the "back end" system that slowly indexes your files in the background, so it can ask about files containing "taxes 20" and get a response, which the front-end program you're using can then display to you

    Also you definitely need medication.

  33. 2 months ago
    Anonymous

    watch urself op

  34. 2 months ago
    Anonymous

    kys homosexual

  35. 2 months ago
    Anonymous

    time to transition to Linux, moron
    iToddler status BTFO'ed

Your email address will not be published. Required fields are marked *