Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


What Happened?

  • Please log in to reply
3 replies to this topic

#1 nonamepl


  • Members
  • 2 posts
  • Local time:05:56 AM

Posted 01 April 2007 - 12:33 PM

Hello guys!

I have a question and I hope someone will be able to help with an answer.

Here is my situation:

Yesterday I sent an email-question to a person. 12 hours later I recieved a strange reply from that person. So I sent another email asking for clarification. This morning I received an email from that person saying:
"believe it or not, most of that messaging was done by someone other than me"


I checked up the IPs of all messages from her and they were all the same... She said she is the only one who uses her computer (so do I)

Any idea what could happened? Someone highjaked my or her computer??? Is it the problem on the on my side or hers? What should we do? PLEASE help!


BC AdBot (Login to Remove)


#2 fozzie


    aut viam inveniam aut faciam

  • Members
  • 3,516 posts
  • Gender:Male
  • Location:Ossendrecht/The Netherlands
  • Local time:10:56 AM

Posted 02 April 2007 - 07:21 AM

Most likely her email has been hijacked. Tell her to join up here and to see whether there are some baddies on her system. There is one simple trick to be alarmed if somebody is using your adress book :

make an email adress as following :

0@0.com. if you than get an email with delivery errors for that email adress you know your email is compromised

Here are the steps to be undertaken. It wouldn't hurt to have your computer checked as well

please read and follow all instructions in the pinned topic titled "Preparation Guide For Use Before Posting A Hijackthis Log". You may have performed some of these steps already. About half way down are instructions for downloading HijackThis and creating a log.

When you have done that, post a log in the HijackThis Logs and Analysis Forum, NOT here, for assistance by the HJT Team Experts. A member of the Team will walk you through, step by step, on how to clean your computer. If you post your log back in this thread, the response from the HJT Team will be delayed because your post will have to be moved. This means it will fall in line behind any others posted that same day.

Start a new topic, give it a relevant title and post your log along with a brief description of your problem, a summary of any anti-malware tools you have used and a summary of any steps that you have performed on your own. Please include the top portion of the HijackThis log that lists version information. An expert will analyze your log and reply with instructions advising you what to fix.

Please be patient. It may take a while to get a response because the HJT Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.

If after 5 days you still have received no response, then post a link to your HJT log here.

After posting a log you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc.) unless advised by a HJT Team member. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make may cause confusion for the member assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

#3 jgweed


  • Members
  • 28,473 posts
  • Gender:Male
  • Location:Chicago, Il.
  • Local time:04:56 AM

Posted 02 April 2007 - 08:41 AM

It is highly unlikely that your computer is infected. To be certain, update your Anti-virus application and have it do a thorough scan of your hard drive. It would be wise to have your friend do the same with her computer.
You may be able to make some determination by comparing the complete E-mail header of a message from her known to be genuine and another E-mail header from a suspect message.
Whereof one cannot speak, thereof one should be silent.

#4 nonamepl

  • Topic Starter

  • Members
  • 2 posts
  • Local time:05:56 AM

Posted 05 April 2007 - 11:45 PM

THANK YOU SO MUCH fozzie and jgweed for your time and advice!
You are very helpful and generous with your time. MUCH appreciated!
Hugs and smiles

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users