Remote access technology used for hacking

Tags:
Hacking
Remote access
Security
I have 4 Laptops and every one has been hacked by Remote Access Technology. I reformatted my HD at least 60 times b4 I found out the technique that was being used. I did a Google search on: "How to hack a PC that is not connected to the Internet" I found out that the hackers were using the RAT method which requires that the hackers be w/in an 8 mile radius of the targetd PC. The PC can be hacked w/o being connected to the Internet either WIFI or by Ethernet. Now how they know who they were hacking and how they found me has me guessing that the hackers which are all gang related and are seeking vengence on me and actually have 4 contacts out on me used this technique to not only get into my PC, but were able to then hack every program that is installed on myPC. I am assuming that they have someone who is gang related or at least cooperative w/ this particular gang that they gave them my IP Address therefore pining me and the begin hacking me in September 2014. To this very instant, they continue to hack me. There are no PC experts living in my town of Tyler, Texas who knows how to stop the attacker from gaing access to my PC. I was told by a PC Forensic expert who has a background in law enforcement that he could put a 72 hour wiretap on my PC and w/in 72 hours, he could trace the hackers using forensic tools and then write a technical report that is admissable in court. He would provide the method of access, the ISP of the hackers and then track down who the hackers are from their ISP. However, the problem is that he charges $2500 to find these hackers, but the money would be well worth it b/c I could sue them for damages that are above $15,000 of lost income as well as all the money I spent going to a PC repaor shop to have my PC so-called repaired when in fact it was never repaired. I almost have all the money I need to start the wire tap and I'll be happy to see these criminals in a court of law and then go to the Federal Penitentiary for they damaged a PC that was purchased for me by the State of Texas so I could go to school nfor Web Design. I have confirmation from my vocational counselor at DAR's which is tehe Texas Department of Assistive Rehabilitative Services. DAR's helps people who are either low income to go to college or a technical school so they can graduate and then become self supportive and a contributing member of society once again. In my case, I am on Social Security Disability and I desparately want to get off of SSD so I can go to work and not just collect a check from the u,S, treasury every month. Before I was on SSD, I was a nurse for 11 years and enjoyed making a decent living. Moreover, I did not just have a JOB, I had a career in nursing. These thugs want one of several things to happen: either commit suicide, kidnap me and then torture me and then kill me or see me unemployed and reduced to living on SSD for the rest of my life. I have a website called Kids IQ Test Center and they hacked "Roboform" which was my PW manager for years. They somehow hacked it and retrieved the PW for my website and then placed malicious software on it back in January of 2015. Every since then, Google has demoted my website in the SERPs and I've lost thousands of dollars in revenue since then. I was averaging around $700 per month which allowed me to afford personal expences like having a phone and a credit card, but by hacking my website took away all of my personal income except for about $200 per month which is not enough to supplement my SSD. My question is, how do I stop these thugs from using RAT to hack me? I know that they can hack any windows sytem w. no problem, but when it comes to hacking me when I'm using Linux, they just cannot do the same things that they can do w/ W7. Every time I set up a fresh install of W7, I get hacked. I go through all the steps to harden my system but since they only rely on radiowaves to penetrate my system, they hack me as soon as I begin the installation. I believe that they have some type of device notifier that lets them know anytime that I power up any of my 4 PC's and once W7 is installed, they begin to send small packets in through a back door. However, I cannot figure out what type of backdoor they are using so I can block them out of my PC. B.c they bypass all AV software and second party firewalls. I can be setting up FW rules and as I am setting them up, they change the rules in "real time" They also gain access to Windows Services to stop all my programs which provides protection and then control the services that enable them to send packets into my system. They seem to prefer anything that has to do w/ Windows Media Player, or TV Services or anything that has audio involved. I know that they use the audio to capture everything that I say but I have one PC where the audio is damaged therefore, audio does nothing for them on that PC. They alos like to enable my webcam but I simply apply a strip of paper over the camera lens and that prevents them from viewing my activities. Moreover, it does not matter what time of day I access my PC to try to harden it. I could wait until 4AM and w.in 5 minutes, they are logged on to my PC and modifying and making changes as they damn well please. It is very frustrating b/c I do not have a friend with high speed Internet access so I can use his PC to kake the upgrade changes to my website that would at least bump up some of my income. Neither can I create new websites because they use keyloggers and would capture keystrokes and screw that up as well. Until I can save up a few more hundred dollars, I am stuck trying to figure out on my own how to stop them from gaining access. I have used every AV software out there and they bypass all of them and then gain control over them so that I cannot detect any activity on their end. If it is Trojan related, I cannot find a Trojan Killer to stop this madness. The best that I can do is to use a software that will repartion my HD and then I'll run Commodo Rescue Disk and find every single time malware in the MBR. However, comodo does not specify what type of malware that is on my MBR. So does anyone out there have any ideas or experience with this type of revenge hacking? If you do, you could save me $2500 and I would be a happy man. But if I could just secure one PC and then let the others run W7, I'll still be able to identify these guys b/c I still intend to pay the forensic investigator $2500 to wiretap my PC so I could send these guys to the Federal penal System because they have commited Federal crimes determined by the FCC. When that happens, I would expect to see a decline in being followed and harrassed by these guys who are proxy stalking me. I cannot go anywhere where at least one gang member will not show up to try to intimidate me. If I go to the library, they will follow me there and they are asy to ID even though they are not wearing gang colors. They are the guys who follow me in and I could be there for hours and all they do is get on there cellphones to either play with it, make calls or to report to other gang members what I'm doing. On several occassions, I went to Wal mart and was there for 45 minutes and two guys followed me everywhere I went in Wal Mart and the reason I knew that they were following me is b/c neither one had a shopping cart nor a basket and wherever I went, they would follow me around which is nothing but a waste of time b/c I don't know what they get out of it. If they think that they are intimidating me, they are wrong. I live in Texas and have a concealed hand gun permit so if one of them wants to pull a gun on me or wants to try and fight me, he is one dead dude. So any help would be great. Now, are there any suggestions for anyone who has some I.T. experience b/c I sure would appreciate it. I appreciate anyone who has taken the time to read this message. May God Bless You All!


Software/Hardware used:
Windows 7 Home Premium
0

Answer Wiki

Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

Discuss This Question: 4  Replies

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.
  • TheRealRaven
    I thought about this since it first showed up and can't make sense out of it. Maybe the biggest piece that confuses everything (and makes it all too implausible to take seriously):

    "...the hackers which are all gang related and are seeking vengence [sic] on me and actually have 4 contacts [sic?] out on me..."

    "Contacts"? Only word that seems would make sense is "contracts". But seriously, who in the world would ever be able to find out that four gang 'contracts' were put out on them? How does one ever learn about such things without being strongly 'connected'? And who can possibly survive with four 'contracts' over their head?

    Of course, if it really is "contacts"...? Ummm... so? What's that got to do with the problem? Was someone added in Skype and it's not clear how that could possibly happen? There are much more likely explanations than "hacking".

    There just isn't anything that seems believable in this.
    33,220 pointsBadges:
    report
  • ToddN2000
    If your hacked system is not connected to the internet, how did they get your IP? Way to much info. IF you have an issue, provide some short details and the hardware and OS systems being used. Any fire walls or anti-virus protection being used?
    128,395 pointsBadges:
    report
  • TheRealRaven
    Numerous RAT methods can give access to systems that are never internet connected. It only requires exploiting vulnerabilities in an active wireless adapter, regardless of any network connection.
    33,220 pointsBadges:
    report
  • agoussec
    Kali Linux is also use for hacking.
    1,025 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following

Share this item with your network: