Hi graceful,
Be sure to come back once you get a clean bill of health from BleepingComputer so we can help you get your Norton product working properly.
Best wishes.
Allen
Hi graceful,
Be sure to come back once you get a clean bill of health from BleepingComputer so we can help you get your Norton product working properly.
Best wishes.
Allen
Did you ever open an email attachment from this person?
I'm sorry I missed this one. No. Although several of us have discussed the possibility of her infecting youtube music links.
Hi graceful,
Be sure to come back once you get a clean bill of health from BleepingComputer so we can help you get your Norton product working properly.
Best wishes.
Allen
I will AllenM.
Thank you for your help.
With gratitude,
Graceful
AllenM I could not use edit to remove the dangerous IP addresses.
Would you make sure a moderator removes them so everyone will be safe?
Thank you everyone,
Graceful
Hello graceful
Bleepingcomputers will be very busy. There are some other free maleware removal sites out there which are also good.
Please go to one of these free Forums for help in removing your bad malware or rootkits.
http://www.geekstogo.com/forum/
http://www.cybertechhelp.com/forums/
http://forums.whatthetech.com/
(Thanks to Delph for providing the list of sites)
It is also possible that since you went to the police and FBI, I would consult with them and see if they perhaps want to take your computer as evidence before you go trying to clean it up.. If all these things happened as a result of your computer being compromised or was compromised by this person, your computer may be evidence, so please consult with them first and also with your lawyer. I assume you have a lawyer and follow their instructions first. Thanks.
Thank you for the additional websites, Floplot. I have an appointment with my attorney. Two FBI agents advised me about gathering information needed for the IC3 complaint. The inbound attacks are ongoing making it difficult to gather information online but I am nearly done.
At one point, my computer was crippled so I needed to use the recovery disk. It seems the problem was stored in my system recovery. I have been saving firewall logs of the attacks. I appreciate your assessment and will consult with law enforcement to determine if it would be preferable for them to have my computer in the damaged state or whether a log of the damage and its removal will suffice. One agent advised me they could trace inbound and outbound activity on my computer to which I promptly agreed. A forensic investigator may be able to garner more information from her servers.
I have spoken with people who encountered similar problems with her computer intrusions including theft and distribution of data. The individual responsible likes to gloat about what she has done. Apparently this began sometime in 2005. One compromised individual is receiving incoming fax messages with the words “sheriownsyou” every time she appears on one web site. Others have had their names, home addresses, email and unlisted phone numbers posted online. If you search the name “sickitten” (with the misspelling) you will see these events have transpired on female first (ongoing), dlisted (where real names and emails were deleted), tmz (where my family has been threatened), x17 (where she has threatened everyone) and her two web sites - the first I mentioned then deleted and the second one, bannedb*tches (one word no asterisk) a wordpress site where she published private email.
This is a deeply disturbed individual.
Swapnilrustagi,
I followed your instructions and am about to reboot.
Thank you again.
@ALLEN M
Curious But was his system infected before NAV installation or after cause reading details make me feel bit uncomfortable
A rookit undetected ???
Hmm
their are some signs of a Rookit right like page redirects
Popups a few extra processes
winlogon file modified
userinit.exe file modified??
Can it be possible that their are no signs and traces at all for the infection.
My Post isn`t of help but I just wanna know some details.
As to where the infection started
Will running a firewall would be some help???????????????
I mean well if the rookit did log keystrokes then it must stored them .dat or something and send it to the user
so wouldn`t the firewall block this connection or well NIS firewall sometimes alerts users of keylogger activity So,
Would their be any sort of change or damage prevented with the presence of a firewall
Hi graceful,
I sure hope this person will get her just rewards and spend the rest of her life in federal prison! Animals like that make me absolutely cringe with rage at what they do to people. I can only imagine what you are going through.
I think I can speak for everyone here when I say "I wish you the best of luck in dealing with this matter and seeing justice served".
Best of wishes to you.
Allen
I posted this in response to BanMidou's questions about what I noticed and when. I want to clarify my Windows XT is properly updated and the system was infected before using Norton's 2011. It has blocked multiple high threat attacks every time.
Both IE and Firefox are sluggish and sometimes jumpy. Periodically my monitor flashed (using browsers, MS word and other apps so I disabled the camera). I have not experienced spontaneous browser windows opening or pop-ups (I use a blocker). No unusual crashes to report either. I block LSO's (flash cookies) unless necessary and remove tracking cookies.
I know this will sound vague. I noticed my computer was sluggish in the winter of 2009. My computer is not cluttered with many large apps. iTunes was the largest prior to system recovery. Now it has nothing on it. Sometimes (I know this may sound odd) the sensation from the mouse and scroll bar, feels as if someone is firmly grabbing my hand then suddenly letting go. From barely moving to a swift slide. My CPU often starts racing when this occurs.
I disabled my camera after using photoshop because she immediately posted a message on a blog I was reading (and I quote) "I cropped it the same way". I know she has taken an interest in my online shopping habits. After looking at winter boots she said, (and I quote) "You need new shoes". After purchasing blu-ray discs she mentioned them. In the simplest terms it feels as if someone is waging a tug-of war with me on my computer. Her interest in my life is very scary.
I hope I feel more at ease when the IC3 complaint is submitted.
Goodnight everyone,
Graceful
Hi graceful,
I sure hope this person will get her just rewards and spend the rest of her life in federal prison! Animals like that make me absolutely cringe with rage at what they do to people. I can only imagine what you are going through.
I think I can speak for everyone here when I say "I wish you the best of luck in dealing with this matter and seeing justice served".
Best of wishes to you.
Allen
Hi Allen,
I hope so too. I’m a calm woman but when I saw my late niece’s name appear online I was cursing a blue streak. I had to go outside for a long walk in the rain to calm myself. Her prior victims contacted local law enforcement but did not pursue prosecution with the proper agency. These matters must be investigated by the FBI's IC3. Several of us have been sharing information online (and being verbally attacked by her in the process). Although we are strangers to one another, we have made a commitment to swear depositions on each others behalf. None of her current victims want to see this happen to someone else. Thank you so much for your help.
With gratitude,
Graceful
hi i know it is really not a time to ask questions.
I understand your going through an extremely tough time but I just cant help remove one thing from my mind
this so called hacker how did u come to know her or well how did she break into the system.
I`m not a professional myself but well Can someone break into someone else PC by just knowing their IP adress.
If so how do you think you were targeted,
I mean I have read forums regarding people who can obtain IP adress by lets say using the call comp. feature present in messenger.
Was any of your bank account password also stolen.
@ all Experts /gurus out their just curious but can someone explain how someone could enter into someone else computer or upload things whilst chatting on messenger.Is this possible by using sniffers or tools like Cain and abel????
Does a firewall such as one by norton prevent such access.i`m guessing its possible to break into system with firwall too??
Netbus is a trojan its available for people to configure it has lots of functions like controlling other people`s computer etc
So,
too make a long story short what i`m asking iswas it threat that gave the "She" access to comp. or well just obtaining IP adress caused the prob
I`m sorry for asking you this
But do u use chat rooms or chat to unknown people.
Sorry again.
for asking
i understand you are going through a hardtime
But getting some info can help me avoid from getting into such a problem