ChromeOSThis forum is for the discussion of ChromeOS.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Hi all, I may be way off I’m using this form for this question. I’m a newbie. My Mac and my iPhone has been hacked and the hacker is currently installing chrome OS on my phone. You’re able to control just about everything on both devices and most of my content has been removed from my Mac. I hope that I can stop the The damage from continuing on my iPhone. I noticed today that when I have my iPhone on the cellular activated and my Mac on the able to connect to my Mac somehow. I’ve thought that the activity I see might be fooling me and it’s actually bots so I’ve been scouring files to find out. Any thoughts on removing Chrome or any other advice. I’ve submitted the paperwork to the feds cybercrime agency but I can’t find any in person technical support around me. They’re all busy setting up home offices.
Thank you
Hi all, I may be way off I’m using this form for this question. I’m a newbie. My Mac and my iPhone has been hacked and the hacker is currently installing chrome OS on my phone. You’re able to control just about everything on both devices and most of my content has been removed from my Mac. I hope that I can stop the The damage from continuing on my iPhone. I noticed today that when I have my iPhone on the cellular activated and my Mac on the able to connect to my Mac somehow. I’ve thought that the activity I see might be fooling me and it’s actually bots so I’ve been scouring files to find out. Any thoughts on removing Chrome or any other advice. I’ve submitted the paperwork to the feds cybercrime agency but I can’t find any in person technical support around me. They’re all busy setting up home offices.
Thank you
Seems to be a trend; another 'newbie' with supposed evidence of cybercrimes, dealing with a 'hacker'.
How about posting whatever actual PROOF you have that someone is doing something, and maybe someone can help you. Otherwise, call Apple, since you have an iPhone and a Mac.
If the post was in fact true, it begs the biggest question of all: why have you not powered off your devices and disconnected from the net at the first sign of attack?
If the post was in fact true, it begs the biggest question of all: why have you not powered off your devices and disconnected from the net at the first sign of attack?
Exactly, power off or disconnect any internet connection. A hacker may have a difficult time without any connectivity, even if they have installed some software. But yeah, don't just leave them doing it (if they really are).
I did not expect to get an ass whooping like that. I’m just asking for some advice. If you don’t believe me then lets pretend it’s a hypothetical question. I’m curious about the requests for por proof. Can you suggest what I can use as proof. If sure the folks at. ic3.gov may want something up front. My calls to the authorities started with a police report from the staties then I was referred to the FBI state office who then asked me to submit the form at that site. As for my reaction in keeping my Mac online... I completely overestimated my ability to find the hacker and remove their ability to get on mac. I did turn off my iPhone immediately and bought androids as well as completely disconnecting my router and and devices with cellular.
I made one mistake. The chrome files I saw were on my Android, not my iPhone.
I’ve read through dozens and dozens of files files so if anyone sees anything they recognize I can verify what I’ve seen. One thing that I noticed was that the sometimes used the word “Janus” as a pseudonym for the victim, as well as “client”. I recently read an article while doing research and saw that Janus is also the name of a hacking “program” seen on 2019. I don’t know if that helps. Lastly, when I accessed the root user I saw two files on the desktop, “changes” which contained hundreds of files that corresponded with any file I saw with a “last modified date” in recent days. I also have a copy of Synack’s guide to Malware which looked a bit like a guide for hacker’s but appears to be written for IT security. I have a ton more information if anyone is willing to entertain my request for help.
I may have been completely teamed and dismissed but I can’t let that stop me from asking.
Please help if you can.
Your best bet in this case, then, is probably going to be contacting Apple and your cell service provider. You may find some help at a Mac forum such as Mac Power Users.
Honestly, a Linux forum won't be very helpful in your case. Macs are based on BSD rather than Linux. Maybe the macOS sub-forum at unix.com?
This reads exactly like another member’s posts of exactly the same situation. It’s is utter fallacy. No self respecting hacker does this to an individual; they do it to governments, businesses, etc. OP, this scenario is highly unlikely and is probably indicative of technical issues with your PC and/or phone. Unless you have millions in bitcoin or are the CEO of a corporation and have value to an attacker, your PC and phone are of no consequence and not worth the effort.
Last edited by sevendogsbsd; 04-16-2020 at 07:20 AM.
This reads exactly like another member’s posts of exactly the same situation. It’s is utter fallacy. No self respecting hacker does this to an individual; they do it to governments, businesses, etc. OP, seek professional help.
Yeah, seems pretty unlikely. Not sure what the point is, in that case. What do they hope to gain? (The OP, not the alleged hacker.)
I did not expect to get an ass whooping like that. I’m just asking for some advice. If you don’t believe me then lets pretend it’s a hypothetical question.
You're right...we DON'T believe you, so trying to go the 'hypothetical' route isn't going to help.
Quote:
I’m curious about the requests for por proof. Can you suggest what I can use as proof. If sure the folks at. ic3.gov may want something up front. My calls to the authorities started with a police report from the staties then I was referred to the FBI state office who then asked me to submit the form at that site.
Sorry, what??? You STARTED this thread by stating the FACT that you had been hacked, and that you've already put the paperwork in to the 'cybercrimes unit'. Now you're asking what you should do to submit the form??? Which is it?
Quote:
As for my reaction in keeping my Mac online... I completely overestimated my ability to find the hacker and remove their ability to get on mac. I did turn off my iPhone immediately and bought androids as well as completely disconnecting my router and and devices with cellular.
...yet posted that they 'installed' ChromeOS on your iPhone, and 'forgot' the fact that you bought MULTIPLE Android phones??? And yet these magic hackers are able to 'hack' you even when you're disconnected??
Quote:
I made one mistake. The chrome files I saw were on my Android, not my iPhone. I’ve read through dozens and dozens of files files so if anyone sees anything they recognize I can verify what I’ve seen. One thing that I noticed was that the sometimes used the word “Janus” as a pseudonym for the victim, as well as “client”. I recently read an article while doing research and saw that Janus is also the name of a hacking “program” seen on 2019. I don’t know if that helps. Lastly, when I accessed the root user I saw two files on the desktop, “changes” which contained hundreds of files that corresponded with any file I saw with a “last modified date” in recent days. I also have a copy of Synack’s guide to Malware which looked a bit like a guide for hacker’s but appears to be written for IT security. I have a ton more information if anyone is willing to entertain my request for help.
Right...the 'hackers' are going to choose a vaguely sinister nickname for you, and (not only that), are going to LEAVE TRACES that someone can find and track back. Funny, for a 'newbie', you seem to know an awful lot about low level software and hacking. And weren't you asking at the beginning of this rant that you didn't know what could be used as proof?? Now you say you have 'a ton more information'??
And how about telling us why these evil hackers have targeted you? Any ideas??
Quote:
I may have been completely teamed and dismissed but I can’t let that stop me from asking. Please help if you can.
The kind of help you need will not come from a technical forum.
Got a Mac/iPhone? Call Apple with this. Got an Android phone? Call your cell-phone provider. They get paid to have their time wasted.
JWJones, I appreciate your first reply. You made a good point in the next. What in the hell would I gain from posting this?
TBOne, Despite your ramblings you seem very interested in my story. That’s an amazingly long response to something you’re apparently very angry about. Maybe you should check that anger out with the professionals sometime.
- Before this all happened I was only vaguely familiar with using Terminal and finding hidden folders. I’ve since read a lot and learned more than I ever wanted to so thank you for the compliment.
- Why did they target me? The only guess I have is that1) I was an easy target after downloading malware and 2) the malware instruction file I mentioned was my first clue that this is someone practicing on me. At first I would, for example, run a History in the terminal and see a lot of repeating commands while altering something small, as if getting it wrong and trying again. The fact that they left the commands for me to see is a clue that they needed to learn more. Further along the commands got too sophisticated for me to understand.
- I began getting blocked from altering settings. For example, in the directory utility I would remove root access to my usernames that didn’t have it before. That ability was removed. Recently I was unable to open many apps or start any advanced startup mode like recovery. Recovery seems to be the answer to a few things but all of the startup functions are bypassed and the Mac is started normally.
- The “ton more information I have is verbal at this point since I’m unable to get files out of the Mac. That’s what I meant about that. I can take photos of open files or greyes out settings. My question was meant to find out what file or text or visual would help anyone to understand.
- I did submit a form to ic3. I was asking to see what Proof A couple FORUM users asked for.
- The magic way in which they connected after WiFi was removed: From what I’ve read it sounds possible to Telnet or SSH in without WiFi. It’s then hypothetically possible to use Bluetooth to get into nearby devices. This is what I think could’ve happened to our cheap Galaxy phones. they got into something with cellular. Before you shout that our devices were it should’ve been off we didn’t think to turn off a few devices such as our watches and iPad.
DC901, - Apple was called. And Google and AT&T. The message was about the same. They suggested I go into a store (Not open) and call the police (done).
Thanks for the Mac forum suggestion. I’m a bit gunshot now but I’ll check it out.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.