I went through something like this on my iPhone 5, then I bought an S7 edge, that got hacked also, then eventually my laptop.. think it was something with my internet router but I couldn't figure anything out.They took about 10K from online banking. I could see their activity looking at my browser history, etc. I could go on and on, but there’s no point.
[doublepost=1542230075][/doublepost]
This is where people roll their eyes. I disabled all network utilities..under system preferences. Everything seemed fine until console activity started back up. A Bluetooth DUN was remotely installed, allowing the hacker to access my Mac using the home phone modem.
Again, not making sense. If you sent an email at midnight, without any internet connections, the email would have had to enter your Outbox. Now you may not have noticed this and simply thought the email was sent. However, you believed you sent the email, so you needed to have an internet connection. So how did the hacker gain access to Yahoos server to remove your email, modify it, and resend it?I SENT APPLE INFORMATION FROM NETWORK UTILITY IN AN EMAIL AT AROUND MIDNIGHT. THE NEXT DAY, I CHECKED MY EMAIL AND NOTICED MY MESSAGE WAS NOT SENT UNTIL 2:00AM. I called Yahoo and was informed that the email was removed from the server and modified! They were able to recover the original message and APPLE REFUSED TO LOOK AT IT!!
[doublepost=1542230075][/doublepost]
This is where people roll their eyes. I disabled all network utilities..under system preferences. Everything seemed fine until console activity started back up. A Bluetooth DUN was remotely installed, allowing the hacker to access my Mac using the home phone modem. I have 2TB of unambiguous digitally verifiable evidence on a Lacie External HD. Apple laughed at me and told me to hire a P.I.. Sounds crazy... I would call BS, except it happened to me.
[doublepost=1542232544][/doublepost]
[doublepost=1542232819][/doublepost]
I SENT APPLE INFORMATION FROM NETWORK UTILITY IN AN EMAIL AT AROUND MIDNIGHT. THE NEXT DAY, I CHECKED MY EMAIL AND NOTICED MY MESSAGE WAS NOT SENT UNTIL 2:00AM. I called Yahoo and was informed that the email was removed from the server and modified! They were able to recover the original message and APPLE REFUSED TO LOOK AT IT!!
[doublepost=1542232883][/doublepost]
I didn’t think it was possible either..in fact I don’t blame people for not believing me. Frustrating, though, because “experts” make fun of what I know happened..I went through something like this on my iPhone 5, then I bought an S7 edge, that got hacked also, then eventually my laptop.. think it was something with my internet router but I couldn't figure anything out.
I saw my text being changed when typing, apps being moved around, websites in Safari being opened and some other junk when I looked at the history, person tried to take money from my bank account as well... And so much other headaches that I went through for 6 months+....
I didn't know this kind of hacking was possible, especially when it first happened on my iPhone.
[doublepost=1542807685][/doublepost]If you were not connected to a network what did the Bluetooth DUN connect to? How did they configure the connection? Using a hotspot?
If you were disconnected from the internet how did you plan on sending an email? As a matter of fact how are you communicating on MacRumors if your computer was compromised? Was the issue resolved?
My sympathies on your situation. If possible I would take your computer to an Apple store or someplace that can scan it for viruses or signs of a remote connection. We are talking 10K here. To me that's a lot of money and worth the effort to find out what is happening before it happens again. The part that is interesting is the alleged hacker is sitting at their computer all day and all night actively waiting to intercept your communications, so they can change it to prevent you from communicating the issue to anyone. Wild!
Turn off bluetooth. Turn off WiFi, and unplug any connections to the computer. In fact unplug the computer altogether, turn it off and take it in. I would take the external drive with your proof on it to have it checked. If you do have 10K in your account to begin with, you have the money to get your system checked out.
Can't imagine they hacked your computer, created a remote connection using bluetooth, hacked and changed text in your emails but did not hack your external drive. This has got to be the worst case I have ever heard of. Good luck and keep us posted.
[doublepost=1542808420][/doublepost]If you were not connected to a network what did the Bluetooth DUN connect to? How did they configure the connection? Using a hotspot?
If you were disconnected from the internet how did you plan on sending an email? As a matter of fact how are you communicating on MacRumors if your computer was compromised? Was the issue resolved?
My sympathies on your situation. If possible I would take your computer to an Apple store or someplace that can scan it for viruses or signs of a remote connection. We are talking 10K here. To me that's a lot of money and worth the effort to find out what is happening before it happens again. The part that is interesting is the alleged hacker is sitting at their computer all day and all night actively waiting to intercept your communications, so they can change it to prevent you from communicating the issue to anyone. Wild!
Turn off bluetooth. Turn off WiFi, and unplug any connections to the computer. In fact unplug the computer altogether, turn it off and take it in. I would take the external drive with your proof on it to have it checked. If you do have 10K in your account to begin with, you have the money to get your system checked out.
Can't imagine they hacked your computer, created a remote connection using bluetooth, hacked and changed text in your emails but did not hack your external drive. This has got to be the worst case I have ever heard of. Good luck and keep us posted.
I wish I had the creativity to make this up. This took place over the course of a year. The house modem processed internet, cable, and phone. I marked inactive ALL internet utilities on my Mac Air inactive.I stumbled upon an unbelievable hacking operation utilizing a gmail account that I didn’t use for 12 years. I to this day have about 3 TB of unambiguous, verifiable data in a bank vault!If you were not connected to a network what did the Bluetooth DUN connect to? How did they configure the connection? Using a hotspot?
If you were disconnected from the internet how did you plan on sending an email? As a matter of fact how are you communicating on MacRumors if your computer was compromised? Was the issue resolved?
My sympathies on your situation. If possible I would take your computer to an Apple store or someplace that can scan it for viruses or signs of a remote connection. We are talking 10K here. To me that's a lot of money and worth the effort to find out what is happening before it happens again. The part that is interesting is the alleged hacker is sitting at their computer all day and all night actively waiting to intercept your communications, so they can change it to prevent you from communicating the issue to anyone. Wild!
Turn off bluetooth. Turn off WiFi, and unplug any connections to the computer. In fact unplug the computer altogether, turn it off and take it in. I would take the external drive with your proof on it to have it checked. If you do have 10K in your account to begin with, you have the money to get your system checked out.
Can't imagine they hacked your computer, created a remote connection using bluetooth, hacked and changed text in your emails but did not hack your external drive. This has got to be the worst case I have ever heard of. Good luck and keep us posted.
These hackers were amazing and would do anything to protect their operation! I can explain ALL!I didn’t think it was possible either..in fact I don’t blame people for not believing me. Frustrating, though, because “experts” make fun of what I know happened..
[doublepost=1542807614][/doublepost]
[doublepost=1542807685][/doublepost]
[doublepost=1542808420][/doublepost]
I wish I had the creativity to make this up. This took place over the course of a year. The house modem processed internet, cable, and phone. I marked inactive ALL internet utilities on my Mac Air inactive.I stumbled upon an unbelievable hacking operation utilizing a gmail account that I didn’t use for 12 years. I to this day have about 3 TB of unambiguous, verifiable data in a bank vault!
I didn’t think it was possible either..in fact I don’t blame people for not believing me. Frustrating, though, because “experts” make fun of what I know happened..
[doublepost=1542807614][/doublepost]
[doublepost=1542807685][/doublepost]
[doublepost=1542808420][/doublepost]
I wish I had the creativity to make this up. This took place over the course of a year. The house modem processed internet, cable, and phone. I marked inactive ALL internet utilities on my Mac Air inactive.I stumbled upon an unbelievable hacking operation utilizing a gmail account that I didn’t use for 12 years. I to this day have about 3 TB of unambiguous, verifiable data in a bank vault!
[doublepost=1542808598][/doublepost]
These hackers were amazing and would do anything to protect their operation! I can explain ALL!
Fair enough...I am sorry this happened to you and really don't understand the circumstances as to what happened to you or why, but I still have to wonder why you didn't take your computer in for service, how they could use an old email to infiltrate your system, and why you let this go on for a year.
I am not even going to ask what you know about this unbelievable and amazing hacking operation, or why you are storing an external drive with data in a bank vault. Good luck to you.
None of this makes sense. A DUN connection is initiated from the computer, not the modem, so how would the hacker initiate the connection if you had cut the computer off from all network connections? Also, the only BT modems that come up on google are 56K dialup ones that aren't sold any more, not cable boxes. What model modem was it?A Bluetooth DUN was remotely installed, allowing the hacker to access my Mac using the home phone modem.
I bet you can. Sounds like tinfoil hattery at its finest...These hackers were amazing and would do anything to protect their operation! I can explain ALL!
[doublepost=1542880326][/doublepost]Google Arris routers used for ATT Uverse..This does not make any sense. If you removed your network connections, how could a hacker gain access? A Bluetooth DUN wirelessly tethers your cell phone or tablet to the PC for internet access. The connection uses your phones data plan to deliver internet. The phone needs to be in range for the DUN to operate. Where was this hacker? And What is a home phone modem? Does it have Bluetooth?
Again, not making sense. If you sent an email at midnight, without any internet connections, the email would have had to enter your Outbox. Now you may not have noticed this and simply thought the email was sent. However, you believed you sent the email, so you needed to have an internet connection. So how did the hacker gain access to Yahoos server to remove your email, modify it, and resend it?
Interesting my phone has same diagnostics which it never has before & coincidentally thousands of dollars from bank account stolen online. Bank has reimbursed however no more online at all while the jerk off doing via the dark web is being investigated.They took about 10K from online banking. I could see their activity looking at my browser history, etc. I could go on and on, but there’s no point.
OP is suspended, and now this post in broken English suggesting the same type of “hack” seems awfully suspicious.Interesting my phone has same diagnostics which it never has before & coincidentally thousands of dollars from bank account stolen online. Bank has reimbursed however no more online at all while the jerk off doing via the dark web is being investigated.
These are still awesome threads. I know I've been hacked, right after a sent a boatload of money to an African Prince.OP is suspended, and now this post in broken English suggesting the same type of “hack” seems awfully suspicious.