Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Compromised account


  • Please log in to reply
3 replies to this topic

#1 DMB8

DMB8

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Uganda
  • Local time:10:51 PM

Posted 30 May 2014 - 05:13 AM

I got msg that my email account has bn compromised. This was after I received a msg thru Facebook from a one orphan from Nigeria whose deceased father had left her some money in a bank &wanted my help to claim it. She asked me to reply her using my email,which I did. She wrote back sending me her pictures & more info. After this,I got awarning from my antivirus that my account has bn compromised. What I don't understand is HOW I HAVE BN COMPROMISED & what I shd do. Can someone help? I wl appreciate heavily. I'm DMB8


Edited by hamluis, 30 May 2014 - 08:58 AM.
Moved from Introductions to Am I Infected - Hamluis.


BC AdBot (Login to Remove)

 


#2 kunalthechamp

kunalthechamp

  • Members
  • 194 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:01:21 AM

Posted 30 May 2014 - 06:00 AM

Not sure if this is a joke, but I will be treating this as a serious breach.

Unfortunately both the messages were sent by a hacker running a scam, they were both phishing messages aimed at extorting money from you. Such kind of messages are very common on email and now they are spreading on social networks such as Facebook and Twitter as well. You can read about them here: http://www.scamwatch.gov.au/content/index.phtml/tag/moneytransferrequests

The pictures and email reply that you received could easily have malware and viruses which took over your email account and possibly the computer you used to access it.

 

The first thing you need to do is disconnect the computer in question from the internet. Then you need to access your compromised email from another computer. Change the password of this email account and then ALL the personal information including your security questions, DOB etc. The intruder already has had access to all this information and if you don't take action soon you will be locked out of your email. Make sure you do not keep any similar information that you had before. Then you need to review your emails to check if you had any sensitive information such as banking details, SSNs, etc. Take all steps that you need to, to make sure you remove any such sensitive info from the email account and change/inform the banks in question. Then you will need to delete all the contacts on the email address, otherwise your contacts will start receiving these emails as well, if possible send them all a mass email informing them of this situation and ask them not to open any such emails from your email ID for the time being and any such solicitations in the future.

 

Download Malware Bytes from: https://www.malwarebytes.org/ and run a complete scan of the computer in question. Remove any infections that it finds.

 

You will also possibly need to stop using the email account and/or facebook account.
 

 

EDIT: I used email account above, but make sure you take all the above steps for your facebook account as well, since that may have been compromised too. Remove all your personal pictures and info and delete any unknown friends!


Edited by kunalthechamp, 30 May 2014 - 06:01 AM.

If I am helping you with a problem and I have not responded within 48 hours please send me a PM.

 

Follow BleepingComputer on: Facebook | Twitter | Google+


#3 Will5200

Will5200

  • Members
  • 141 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:United States
  • Local time:03:51 PM

Posted 30 May 2014 - 07:12 AM

Are you posting from the computer in question? If so, maybe this issue should be moved to:

Am I infected? What do I do?

 

Just a thought.



#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,530 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:51 PM

Posted 30 May 2014 - 09:02 AM

Hello, I moved this to the Am I Infected forum.
That is an Email scam..

Lets look at the system.

As suggested run Malware bytes and post that log.

Next run these....
Please download MiniToolBox, save it to your desktop and run it.
Checkmark the following checkboxes:
  • Flush DNS
  • Report IE Proxy Settings
  • Reset IE Proxy Settings
  • Report FF Proxy Settings
  • Reset FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Users, Partitions and Memory size.
  • Click Go and post the result (Result.txt). A copy of Result.txt will be saved in the same directory the tool is run.
    Note: When using "Reset FF Proxy Settings" option Firefox should be closed.



    Download TDSSKiller and save it to your desktop.
  • Extract (unzip) its contents to your desktop.
  • Open the TDSSKiller folder and doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory (usually C:\ folder) in the form of TDSSKiller_xxxx_log.txt. Please copy and paste the contents of that file here.
  • .
    .
    .
    ADW Cleaner

    Please download AdwCleaner by Xplode and save to your Desktop.
  • Double-click on AdwCleaner.exe to run the tool.
    Vista/Windows 7/8 users right-click and select Run As Administrator.
  • Click on the Scan button.
  • AdwCleaner will begin...be patient as the scan may take some time to complete.
  • After the scan has finished, click on the Report button...a logfile (AdwCleaner[R0].txt) will open in Notepad for review.
  • After reviewing the log, click on the Clean button.
  • Press OK when asked to close all programs and follow the onscreen prompts.
  • Press OK again to allow AdwCleaner to restart the computer and complete the removal process.
  • After rebooting, a logfile report (AdwCleaner[S0].txt) will open automatically.
  • Copy and paste the contents of that logfile in your next reply.
  • A copy of all logfiles are saved in the C:\AdwCleaner folder which was created when running the tool.
  • -- Note: The contents of the AdwCleaner log file may be confusing. Unless you see a program name that you recognize and know should not be removed, don't worry about it. If you see an entry you want to keep, return to AdwCleaner before cleaning...all detected items will be listed (and checked) in each tab. Click on each one and uncheck any items you want to keep (except you cannot uncheck Chrome and Firefox preferences lines).


    .

    thisisujrt.gif Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.
  • .
    .
    .
    .
  • Last run ESET.
  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the esetonlinebtn.png button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
  • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
  • Double click on the esetsmartinstaller_enu.png icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:
  • Scan potentially unwanted applications
  • Scan for potentially unsafe applications
  • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.
  • NOTE:Sometimes if ESET finds no infections it will not create a log.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users