Hacking ... Any help or suggestions

hi

hi I have been going through a nightmare experience with my ex husband and he has been hacking my computer for 1 1/2 years. I have all the ip addresses from the comcast legal department and tried to take him to court but because the ips were not authenticated and he had hacked back into my computer and deleted vital evidence ( his attorney delayed the hearing to obtain "information" for the case). I have gone to the DA and Tennessee does not understand thier laws on computer hacking. Apple , and local mac stores have told me to sell all of my apple products and I have except my MacBook air because I cannot afford to replace the computer at this time. The secret service wants me to fax all of my evidence but we are talking about about a Terabyte of proof. I have become pretty familiar with terminal commands and the console and I have completely wiped my computer over 7 times( as if it was new) without adding anything back. Even when I wipe the software and make myself the admin with root user privileges he still has the " super" root control. When I try to use certain commands that require a root password i am not allowed to log in and the password appears to be 1 character. I also do not have access to certain folders even when I add my privileges and make myself the owner of the folder

I am trying to figure out what I can send to the secret service to start the investigation besides the ip addresses. I still do not know how he is still able to access computer after clean installs and changing Internet providers. I now only use it when I absolutely have to because of certain limitations of my iPad . MacAuthority offered to purchase the computer but I dont want to loose any evidence even though I have all the backups on a external hard drive. Has anyone had to go through something like this? Any help and suggestions would be great. The authorities are making prosecution extremely hard and I cannot afford a attorney

Any any suggestions or advice would be appreciated

MacBook Air, OS X Yosemite (10.10.4)

Posted on Aug 15, 2015 7:23 PM

Reply
19 replies

Sep 7, 2015 12:57 PM in response to Drew Reece

Hi Drew,


Thanks very much for your reply. I'm really happy to hear those messages are normal.


There have been many other things also so today i've wiped my Samsung Galaxy S6 Edge, My iPhone 6 and tried to wipe my Macbook Pro however, after I had copied any important documents over to a disk, i then went to disk utility and the option was greyed out. Also when i clicked on my hard drive folder named "Lilly" and tried to remove the options for "staff" and "everyone" able to read this file, it came up with error messages. Very strange on a 2 week old laptop that's hardly been used.

I then found a seemingly empty folder called com.ubntek.uMobileCamCamera created on my computer at 6pm yesterday evening - certainly not by me. When i try to search for what this is on the net, safari refuses to let me visit any of the pages listed by google.


Could you advise me where I go from here? I'm totally fed up.


Many thanks again for your time, Bella


User uploaded file


User uploaded file


User uploaded file


User uploaded file

Sep 7, 2015 1:22 PM in response to >BellaBella<

The permissions on the home folder are normal, modifying them will throw up errors, 'Staff' is part of the system - it does need to read your home folder. 'Everyone' means other users on the system, read access for them is also normal. Everyone cannot read all the folders within your home directory (Documents, Pictures, Movies etc), there are layers of permissions to protect files on OS X.


The folder appears to be related to the software…

http://www.ubntek.com/umobile/

http://www.ubntek.com/umobilecamera/

From their site

This app is an audio and video surveillance solution for your mobile devices(iOS & Android). This app enables you to turn camera-enabled OS X Lion computers into network cameras with audio and motion detection capabilities. It allows you to remotely monitor multiple live audio and video feeds from your mobile devices over Wi-Fi and cellular networks.


Have you installed a baby monitor application or anything else yesterday? Check your downloads folder to jog your memory, it could be bundled with other applications.

Personally I think you need to stop using these devices & hand them to law enforcement. Your actions may remove evidence. If they are compromised you cannot use them to erase any other devices - they may attempt to infect or alter those devices too. A forensic examination is the safest way to examine these devices.


Sorry, unless you can think of a reason for the software or the folder appearing it may be a sign that someone else has access to the machine.


Safari pages may be being blocked by your router (if it is compromised) or being blocked inside the Mac. To be honest I think you need to isolate anything that seems to be compromised for investigation by a professional.

Sep 7, 2015 1:50 PM in response to Drew Reece

Hi Drew,


No I definitely haven't installed any kind of baby monitor or video surveillance software on my computer, yesterday or any other day which is very concerning.


Hopefully now i've wiped the android and iPhone they will be ok for now? Or maybe not if i continue connecting to the public wifi in the remote hotel i'm staying in on a remote island that he's already had access to now?!?! Sooo frustrating...


A cyber security firm quoted me £1,000 a day for this job saying they had never even heard of the type of hack this guy is doing on me. He was using (amongst other things) something called Rednet (originated from Computer Craft to link gamers from all over the world) the system was then manipulated by hackers. Rednet were taking £65 a month out my bank for 5 months, but then it was returned strangely enough. My bank don't know what to make of it. However when talking about it to a friend, her 11 year old son overheard us talking who piped up saying it was a hacking company, once i investigated i found it was a telecommunications hack... Very Very clever.


Another Cyber Security guy has said the hacker has also simply created a cell tower, a middle man attack, very easy to do apparently as cell towers haven’t been changed since the 80’s. I know about penetration testing and my previous androids were routed but i'll never make that mistake again.

Really at a loss where to go and what to do as professional companies are £1,000 a day which i don't have...

Thanks Anyway Drew, have a great evening...

Bella

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Hacking ... Any help or suggestions

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.