Real answer? Shut your PC down, pull the hard drive, and use a dock to pull your personal data to another PC. Only files you are 100% certain are clean. No apps or scripts.
Then wipe the machine without using an internet connection. Change all your passwords and reconfigure your home network. Then reflect on what you did in regards to risky online behavior and be more proactive in protecting your privacy and data.
If real, how they did it is irrelevant if you don’t have forensic know-how. You need to now be proactive in preventing any further interference. If they can create a file on your desktop, they have access to the system and what is on it.
deleted by creator
Change your passwords AFTER reseting your PC. Otherwise the hacker could gain access to your new passwords.
How is not important at this stage, you need to deal with the threat, its possible they have access to your whole PC, files, network, everything (they may have made copies too)
Either you clicked on something or installed something spurious. Or they are on your network and they have access to your PCs directory. - the weakest link in any network are the users, think about what happened, what could have caused it and that’s your solution for it to not happen again (what did you install, what did you click on? etc…)
Change all WiFi passwords (disable that shitty easy connect WPS thing). disconnect your PC from any network, back up important files format all drives, reinstall OS.
Tbh the advice provided is already pretty accurate, as to how; there’s a non zero chance that a friend may have sent you a RAT (remote admin tool/remote access Trojan), these are basically the best back door to someone’s computer you can have, normally you want to have physical access to someone’s computer to install them or have a user run it with elevated privileges, (there are other ways as well, such as spoofing a jpg, other methods of remote code execution). These tools will allow you to access there computer, files, keylog, steal passwords, send popups, open and close the disk tray plus basically anything else you could do with access to the computer.
Basically follow other people’s advice in regards to undoing this.
Was going to say, this sounds more like a prank from a friend who had access to the machine, than an actual hack. A malicious hacker isn’t going to drop a “hibro.txt” on your desktop to mess with you. They aren’t going to be interactively watching your session at all. They’re going to silently keylog you for financial or identity details, or they’re going to install ransomware.
True, but better safe than sorry.
Definitely! I wouldn’t mess around with it either.
Shut down the computer and disconnect it from the internet, if you haven’t already done so.
With another computer (or your phone) download Spybot (i think it’s still considered one of the best free tools out there) and move it to your pc, let it run its scan, and check the results.
Oh, and like @Fazoo@lemmy.ml stated, this isn’t foolproof, so if you want to be really sure, then follow their advice instead.
Can’t say how this “hacker” got you with the provided information, but if he can put a file on your desktop, then he can likely see your files too. It wouldn’t happen to be one of your friends pulling a fast one on you?
Sounds like malware games to me. Probably a windows user, probably disabled Defender.
One of the reasons why you want to keep a live-bootable operating system within one of your flashdrives or optical discs.
You probably need another device to securely boot up a live OS to recover your data. Don’t use Windows, because it might still be vulnerable to autoplay scripts when mounting your infected OS partition and I assume your infected OS is Windows, so the malwares are going to be compatible and unless you know what you’re doing, you probably don’t want to take that chance.
As to how, did you have your Chrome up to date?
Which OS did you use? Linux or MacOS?
Good one.
Not you
TempleOS
Nice one, a hacker hacked TempleOS