so a new update it seams.
something tells so not much of an update, but I decided to try something.
so I work with a product called bitdefender.
I don't know why I didn't think of this earlier...
so I basically told bitdefender scamio to look at this image, which was obviously an email, that same email...
and it actually gave me this...
It's a scam
You're dealing with an extortion scam. Scammers might falsely accuse you of illegal activities or threaten to release embarrassing information. Often, they claim to have explicit photos or your passwords. Don't panic—these threats are usually baseless. They're just trying to scare you into acting without thinking.
Safety tips:
Verify sender: Check the sender's information to ensure it is from a legitimate source.
Protect personal data: Be cautious when sharing personal info online.
Use security measures: Keep computer security up to date and avoid clicking on unknown links.
so that was good...
if any of you wonna take a look, here it is!
it's a product I used for a while, and i'm surprised I didn't use it for this purpose earlier...
it's been 1 of my favorite scam detection products
adisonverlice2
Posts
-
how I caught a hacker trying to (or may have) hacked into 1 of my colleagues old accounts. -
how I caught a hacker trying to (or may have) hacked into 1 of my colleagues old accounts.so here is a new, and possibly the final update.
the situation has not worsened, and turns out that I believe he as blackmailed.
so i'm happy to report that the hack was pretty much false.
soundsl Ike this guy just wanted some clout or some money.
I have no ferther intensions of sharing his Bitcoin wallet information, if you want to see that head into the first post on this thread.
but I think we can consider this closed. -
how a hacker got stopped quickly after attempting to hack methis guy actually sounds stupid
-
how a hacker got stopped quickly after attempting to hack meI also scanned the IP for more stuff. I found he had ports opened on his server.
22/SSH, 80/HTTP, 443/HTTP, 4041/HTTP, 8301/UNKNOWN, 9113/HTTP, 9180/HTTP, 9999/HTTP, 11752/HTTP -
how a hacker got stopped quickly after attempting to hack menow I noticed that fortinet, at very least, has went on to block this IP address and has categorized it as a malicious website, if you go here and check out that on the IP by searching 185.155.184.184 on the search URL bar
-
how a hacker got stopped quickly after attempting to hack meso the IP I found out was hosting several dating sites/domains, which i'm sure are all fishing domains by every count. he's pulling them out like pulling out 100 cups of water, and he has hundreds of these sites lieiing around on the same IP
-
how I caught a hacker trying to (or may have) hacked into 1 of my colleagues old accounts.apologies, wrong thread. I deleted that post I just made
-
how I caught a hacker trying to (or may have) hacked into 1 of my colleagues old accounts.braille displays cost 2much
-
how I caught a hacker trying to (or may have) hacked into 1 of my colleagues old accounts.@necrevistonnezr said in how I caught a hacker trying to (or may have) hacked into 1 of my colleagues old accounts.:
@adisonverlice2 said in how I caught a hacker trying to (or may have) hacked into 1 of my colleagues old accounts.:
fuckin hell, they could've even just made their own OS, and taken whatever it is that they don't want in the update out. not that hard y'all...sure, the keysoft programs get updated, but the OS itself does not. i'm disappointed
Isn’t Apple pretty good in this area? https://support.apple.com/en-om/guide/iphone/iph73b8c43/ios
they're ok at it, but not great. the braillenote has braille features. the iPhone you have to connect a braille display
-
how I caught a hacker trying to (or may have) hacked into 1 of my colleagues old accounts.fuckin hell, they could've even just made their own OS, and taken whatever it is that they don't want in the update out. not that hard y'all...sure, the keysoft programs get updated, but the OS itself does not. i'm disappointed
-
how I caught a hacker trying to (or may have) hacked into 1 of my colleagues old accounts.interestingly, even though it can be updated, humanware has decided not to update the braillenote any ferther than android8.0. I actually spoke with a technical guy about it. and while i would like to port it over to android 13 or better, i'm afraid I could lose the braille technology (such as keysoft) or lose the braille display abilities.
-
how I caught a hacker trying to (or may have) hacked into 1 of my colleagues old accounts.my colleague thinks i'm "parinoid" because I have 2factor authentication for everything, and require my admins to use 2FA.
i've tryed to tell him the danger of using week and or the same password and he always just called me out. I don't wonna say, laughed me out, I don't think that's the case.
eitherway, my security setup is particularly advanced. for example, I have a different email alias for every account (EG cloudron@blindsoft.net) which you can email right now.
but I won't receive it because the email address was dropped.
unfortunately, I have an old android device from a while back.
I have the braillenote touch plus which i've had to lock down.
even though it was purchased by my educational organizations, for whatever reason they refuse to manage it. -
how I caught a hacker trying to (or may have) hacked into 1 of my colleagues old accounts.also I should really put the Google version of my blindsoft.net account on the Google advanced protection program, just in case. they do a good job of locking down accounts. my personal account is on there.
-
how I caught a hacker trying to (or may have) hacked into 1 of my colleagues old accounts.thank you.
I just added my domain to their domain search dashboard. -
how I caught a hacker trying to (or may have) hacked into 1 of my colleagues old accounts.@umnz said in how I caught a hacker trying to (or may have) hacked into 1 of my colleagues old accounts.:
@adisonverlice2 the email that was sent to your colleague is extremely common, and is one of the more successful extortion schemes. The extortionist purchased a list of email addresses and passwords from dark web data breaches and simply sent an email to everyone in the breach. The breached password is included in the email to (rightfully) scare the end user into believing the story that follows afterward. The scheme is particularly successful with people who reuse their passwords and super obvious to those who use password managers. You can easily find out if the password or email you use has already appeared in a data breach by directing people to the website: https://haveibeenpwned.com and more importantly, registering your company domain and/or email addresses with their breach notification system.
I assure you, the only lesson anyone learns from these emails is to stop reusing their passwords. Your colleague has done nothing wrong.of course. weirdly, though, they only sent it to Alex. though they should contact me, if they want a good scare. also I didn't even know that was possible to register domains and stuff. let me see...
-
how I caught a hacker trying to (or may have) hacked into 1 of my colleagues old accounts.previously, a year ago, it was breached around 100 to 200 times. now it's 500 times.
massive upgrade from last year... -
how I caught a hacker trying to (or may have) hacked into 1 of my colleagues old accounts.so another update, that password count, which btw was a family password (don't ever use the password for your family) was upgraded to breached 592 times! gotta love that...
-
how I caught a hacker trying to (or may have) hacked into 1 of my colleagues old accounts.so uh,quick update...
alex's password, unfortunately, is still working.
if that is the case, I hope he still has 2FA on at least some of his account.
also, I decided to check haveibeenpwned and believe it or not, a password he had used was breached!!!!!!
i'm fucking upset that he will not change that password at all, even after confirming that it has been breached, almost 200 times btw.
something tells me that he either sent his password over an email address with that password, or that he sent it over an insecure page.
it makes me question weather he should have access to our stuff or not, i'm planning on revoking it.
if he's going to be that fuckin dumb about his security posture, I will not have someone like that on our team.
in fact, the passwords he uses, I find, are not secure, and even if not breached, can still be cracked just by talking to Alex, like a social engineering attack.
actually, I could get his password just by striking up a conversation with him about his favorite YouTuber, or favorite charactr, then generated a password list based off that alone.
at that point, SE is not even needed, because it's easy to do.
he's very opened about his favorite YouTuber, DaveMadson, who is apart of the logo bloopers community.this is why, as mentioned in FIDO2 support I think passkeys are the way to go. they would require actual stupidity or physical access to the device to get in, and they're more secure.
o and not to mention, if we still hado ur windows server, alex's enemies would've been able to get a hold of easily, even with all the security put in place.
now I don't think his security posture is good, and I don't wonna kick him off my team because he's the CFO and primary domain admin, but if it comes down to it, I may have to.
I hate doing something like this because we've worked together for several years. -
fido2supportalso, if any of you have tested this, let me know.
I wonna know how you tested and how it was.
i've also PM'd @3246 to see if he could test it while I'm still trying to find a server.
and I think I might have to open port636 but maybe not, because duo connects to your actual server, not tryed to authenticate there, it wants a connection to your actual real life server. i'm curious to see how this will actually work, or if cloudron has a docker container i'd put it in.