Print this page | Go back to previous topic
Forum nameThe Computer Forum
Topic subjectAfter Hack Procedure
Topic URLhttp://www.pcqanda.com/dc/dcboard.php?az=show_topic&forum=2&topic_id=567208
567208, After Hack Procedure
Posted by wings515, Sat Mar-26-22 02:48 PM
Hello Again,
It has been a while since I have had a PC on the bench. A neighbor called last night and said he had been hacked. The screen showed a message from MS with an 866 number to call. He did and the "agent" had him do some things in DOS I assume since he said the screen went Black.

Some history, the wife went onto either a Facebook or YouTube site with a bunch of numbers to play some kind of game, he could not define exactly what it was.

I am getting this Win 10 tower tomorrow. I plan on booting in Safe mode and running CCleaner, Malwarebytes and Privatizer. Three apps to 'clean' the disk that I am familiar with. I have also downloaded the latest Win 10 ISO from MS just incase I have to reload the OS.

First question, is the 866 number really MS? Second, your opinions on any other process I should run to make sure the hack is removed before a total reload of the OS.

Regards,
Dan Kahn
567209, RE: After Hack Procedure
Posted by lenjack, Sat Mar-26-22 04:44 PM
I'm not an expert, but I don't believe MS, sends messages like this. In fact, I'm positive they don't.
567210, RE: After Hack Procedure
Posted by wings515, Sat Mar-26-22 04:46 PM
I was under that impression also but I just wanted to verify the 866 number was a scam. If the owner has the full number I think I'll do a search to see if anything pops up.
Thanks,
Dan
567211, RE: After Hack Procedure
Posted by Ttech, Sat Mar-26-22 10:01 PM
If it boots to a screen requiring a password, please take a picture and post it here, I may be able to help.
567214, RE: After Hack Procedure
Posted by wings515, Tue Mar-29-22 01:56 PM
I got the PC yesterday and it did turn ON but it took a long time to boot. This is an HP Pavilion 6. It has a second partition with a WIN10 OS. Luckily I did not have to reload the OS.
There was a DOS tab on the Start Menu. Opening it showed an ALARM with Trojan and a note for a bank.
The owner has already changed his password for all personal web sites.
Prior to this hack the owner, on my suggestion, purchased Webroot. That was running in the background along with MS Defender.

I updated and ran CCleaner. I also installed the free version of MalwareBytes. It found 10 PUP's. Also installed and ran Privazer, this found a lot of "stuff".
There were some drivers that needed updating and I took care of that.
I informed the owner that it might be a good idea to purchase MalwareBytes soon as a precaution. I will leave that up to him.
I am also suggesting he activate OneDrive as a backup.

I am confused that Defender and Webroot did not flag this virus.

Any suggestions that I might do before returning this PC to him?

Regards,
Dan Kahn
567216, RE: After Hack Procedure
Posted by Ttech, Tue Mar-29-22 11:07 PM
Quote:
I am confused that Defender and Webroot did not flag this virus.

What virus? Did your scans catch any viruses? Probably not, because this type of attack is known as a browser hijack. It exploits features built into the browsers.

2 things to do:

Disable notifications from all browsers. Start - Settings - System - Notifications & actions, scroll down and turn off notifications from all web browsers that are listed there.

Install the free Malwarebytes Browser Guard if it's available for the browsers in use.
567215, RE: After Hack Procedure
Posted by therube, Tue Mar-29-22 04:09 PM
Not knowing just what was done by the user...
Not knowing just what was done by "MS"...


My thought would be to nuke everything & start over again.


Reinstall Windows.
Reinstall your programs.

And take it from there.
567219, RE: After Hack Procedure
Posted by wings515, Sat Apr-02-22 03:10 PM
Well I did all the scans and installed Malware Bytes. All seem good until we tried to log onto his email. Seems the mail server password was corrupted. Not a big deal, just called the isp and had them reset the pw.

I suggested that owner purchase the full Malware Bytes for a Just In Case since the scans did not find anything substantial.

Thanks for all the replies.
Regards,
Dan Kahn