Hacker threatening problem. Did i do the right thing?

Tags:
#hacker #problem #help #asap #IPaddress
So 2 days ago a person from a chatting app (amino) sent me a link and found out my Ip address, location and my phone model. Yesterday that person threatened me, saying he will find my personal info and link it to a stolen credit card from the dark web. He also said other horrible things. after saying this he said he will cut off my WiFi but i connected to the mobile data so i can keep chatting with him. which it worked. at first the messages were loading with a delay but still sending. we was still texting me on amino when i started to delete my amino accounts, and then i started to delete all my existing accounts. as much as i could do. i deleted even my emails. and then i unplugged my router from the source of power. i also made a fabric data reset on my phone and removed and turned it off. now i am using another phone but with the same number. Later today i logged back in to delete what was left and to do a security scan with my Norton to see if my laptop is safe. Also i had the same password to most of my accounts (stupid, i know. but who would have ever thought). And my emails were key controlled by my phone with my phone number. Last night i deleted my yahoo account, but i have discovered today that it was still existing and connected to my laptop. Now it is gone. But last night, while i was deleting everything i got a notification from yahoo that someone from another device was trying to connect to my account. i reported it. Can someone tell me if i did the right thing? Am I relatively safe now? what should i do next? Can that person do a lot of harm to me? That person also has some selfies of mine. It is nothing inappropriate, just my face. How can that person use all this information against me? One of my emails together with my phone number was connected to my credit card and paypal account. i dont have much money on it. But that person said they want to ruin me... please, please give me some advice asap. is it possible he can access my google photos now that i deleted my google account?
1

Answer Wiki

Thanks. We'll let you know when a new response is added.

First off, never open a link from someone you do not know. That is how you get infected. But anything is possible… That is one reason to use strong passwords and never use the same one twice. It may be possible that you got a key logger and he captured your log in credentials. Have you asked for him to prove he has your selfies? He may just be trying to scare you. The Yahoo message is just letting you know another device tried to connect. It may be your phone, computer or any other device that does not normally connect. It’s highly unlikely he can cut off your wi-fi and what would he gain linking your name to a stolen credit card? It won’t match the companies records. 

Thank you for your answer. I know for sure he has my photos. And it was not my devices trying to connect  to my yahoo, because the location didnt match. Also, i angered that person by something i said. and he is not a mentally stable person. He is obsessed with revenge… He might have said all those terrible things to scare me. but i can never be sure. That is why i want to know if he can actually do something horrifying to me or not… 

Discuss This Question: 4  Replies

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.
  • goingforshoppingname123
    Thank you for your answer. I know for sure he has my photos. And it was not my devices trying to connect  to my yahoo, because the location didnt match. Also, i angered that person by something i said. and he is not a mentally stable person. He is obsessed with revenge... He might have said all those terrible things to scare me. but i can never be sure. That is why i want to know if he can actually do something horrifying to me or not... 
    40 pointsBadges:
    report
  • TheRealRaven
    Deleting accounts is a good start at making inaccessible whatever was held by those accounts. But unless you're posting things such as SSNs and credit card numbers plus name, address, birthdate, etc., then "hacking" your phone won't gain much by itself. In general, it's the accounts that are more valuable.

    For accounts, that would usually mean financial and commercial accounts rather than Yahoo and similar. For serious "value", though, deleting such accounts won't help much. They won't be deleted, but rather deactivated at best. The organizations are generally required to keep all of the info. The truly serious "hacking" is of those organizations; not your phone. Going after a practically anonymous user through an Internet chat service (while declaring the intention) practically screams "Hoax!" It tends more to what used to be called "script kiddie".

    Finding info such as a remote phone number for a chat isn't always particularly difficult. Doing anything significant with it is another level, though. And if you changed passwords (to be good ones and not repeated), you're probably good.
    36,095 pointsBadges:
    report
  • goingforshoppingname123
    thank you so much for your help. I will be able to sleep better tonight. I will pay more attention starting from now on!  
    40 pointsBadges:
    report
  • Subhendu Sen

    The first & foremost change all your passwords including your email(s) with complex ones and never repeated the same when you will go change for next time. Also if possible, stop using social media/ emails for few days and observe what happens. Or schedule your time to access all of those your social media accounts/ emails.

    Also be cautious, when you transact with monetary transactions, specially fund transfer etc.

    140,850 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following

Share this item with your network: