element14 Community
element14 Community
    Register Log In
  • Site
  • Search
  • Log In Register
  • Community Hub
    Community Hub
    • What's New on element14
    • Feedback and Support
    • Benefits of Membership
    • Personal Blogs
    • Members Area
    • Achievement Levels
  • Learn
    Learn
    • Ask an Expert
    • eBooks
    • element14 presents
    • Learning Center
    • Tech Spotlight
    • STEM Academy
    • Webinars, Training and Events
    • Learning Groups
  • Technologies
    Technologies
    • 3D Printing
    • FPGA
    • Industrial Automation
    • Internet of Things
    • Power & Energy
    • Sensors
    • Technology Groups
  • Challenges & Projects
    Challenges & Projects
    • Design Challenges
    • element14 presents Projects
    • Project14
    • Arduino Projects
    • Raspberry Pi Projects
    • Project Groups
  • Products
    Products
    • Arduino
    • Avnet & Tria Boards Community
    • Dev Tools
    • Manufacturers
    • Multicomp Pro
    • Product Groups
    • Raspberry Pi
    • RoadTests & Reviews
  • About Us
    About the element14 Community
  • Store
    Store
    • Visit Your Store
    • Choose another store...
      • Europe
      •  Austria (German)
      •  Belgium (Dutch, French)
      •  Bulgaria (Bulgarian)
      •  Czech Republic (Czech)
      •  Denmark (Danish)
      •  Estonia (Estonian)
      •  Finland (Finnish)
      •  France (French)
      •  Germany (German)
      •  Hungary (Hungarian)
      •  Ireland
      •  Israel
      •  Italy (Italian)
      •  Latvia (Latvian)
      •  
      •  Lithuania (Lithuanian)
      •  Netherlands (Dutch)
      •  Norway (Norwegian)
      •  Poland (Polish)
      •  Portugal (Portuguese)
      •  Romania (Romanian)
      •  Russia (Russian)
      •  Slovakia (Slovak)
      •  Slovenia (Slovenian)
      •  Spain (Spanish)
      •  Sweden (Swedish)
      •  Switzerland(German, French)
      •  Turkey (Turkish)
      •  United Kingdom
      • Asia Pacific
      •  Australia
      •  China
      •  Hong Kong
      •  India
      •  Japan
      •  Korea (Korean)
      •  Malaysia
      •  New Zealand
      •  Philippines
      •  Singapore
      •  Taiwan
      •  Thailand (Thai)
      •  Vietnam
      • Americas
      •  Brazil (Portuguese)
      •  Canada
      •  Mexico (Spanish)
      •  United States
      Can't find the country/region you're looking for? Visit our export site or find a local distributor.
  • Translate
  • Profile
  • Settings
Community Hub
Community Hub
Member's Forum Frustrated
  • Blog
  • Forum
  • Documents
  • Quiz
  • Events
  • Leaderboard
  • Polls
  • Files
  • Members
  • Mentions
  • Sub-Groups
  • Tags
  • More
  • Cancel
  • New
Join Community Hub to participate - click to join for free!
Actions
  • Share
  • More
  • Cancel
Forum Thread Details
  • State Suggested Answer
  • Replies 15 replies
  • Answers 3 answers
  • Subscribers 596 subscribers
  • Views 2709 views
  • Users 0 members are here
Related

Frustrated

stumpedandfrustrated
stumpedandfrustrated over 4 years ago

Ok so, I am a newbie to the tech world by about 10 years. Self taught and have a ton of learning left to go. My question is...

I have been hacked, took a long time to figure out how it kept happening again and again, with new devices accounts passwords new home networks etc etc.. HOW do I locate the hacker?? The person in question is someone I know, has taken administrative control of all my devices, has remote root access and uses multiple accounts on their visited sites, which normally sends me to a redirect when I get to close. I have now gotten passed the sherad, and know who it is. I just want to catch this person. Please someone guide me in the right direction.

  • Sign in to reply
  • Cancel
  • Jan Cumps
    0 Jan Cumps over 4 years ago

    This community is focusing on designing and making.

    For help with a computing system and network under active attack, I would expect you 'd get more skilled help on a forum for administrators (OS / Network).

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Reject Answer
    • Cancel
  • stumpedandfrustrated
    0 stumpedandfrustrated over 4 years ago in reply to Jan Cumps

    Ty, I completely understand your thought on that. However the hacker in question, is using many of these items listed here on this site to manipulate my system, which is why I chose here to set my request help.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
  • Andrew J
    0 Andrew J over 4 years ago

    If you know who it is, the police should be your first port of call.  Second should be an IT expert who can help you protect your network at its border and recover control of your devices.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Reject Answer
    • Cancel
  • stumpedandfrustrated
    0 stumpedandfrustrated over 4 years ago in reply to Andrew J

    Thank you! To those of you who have chimes in. I have made a police report already. Unfortunately law is enforcement doesnt seem all that interested, or have the accountable knowledge, as the laws are not up to date or are fuzzy around the edges. The hacker is using a process that apparently hasn't even been developed yet. I've had my network, and cell devices gone through by numerous professionals over the course of 10 years. Most cant figure out how to permanently stop it from reentering my system. 2 techs had their system chewed up and fried in retaliation for poking around in unwanted territory. Google, Verizon,!and Spectrum cannot come up with an answer to my devices running on many different carriers at the same time. I have those answers and some of you may as well. I need someone to assist me in this matter. I have an attorney that specializes in this matter, but he needs more sufficient info that he can provide the court. I am willing to pay for the service of an individual willing to step into this with piqued curiosity, and enough knowledge to out maneuver the hacker long enough to make charges stick. This forum is for build and design of new age tech related process. Build me a safety zone. I am an average hard working tax paying citizen, who has dealt with this constant inconvenience, burden of someone using my identity, always feeling that I'm never free. I'm out of options and turning to the actual people that design by forward thinking.

     

    Thanks again for allowing me to share and responding sincerely.. I am open to any and all Ides!

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
  • BigG
    0 BigG over 4 years ago in reply to stumpedandfrustrated

    stumpedandfrustrated  wrote:

     

    Ty, I completely understand your thought on that. However the hacker in question, is using many of these items listed here on this site to manipulate my system, which is why I chose here to set my request help.

     

    Any system that cannot uniquely identify a device and then disable or block that device so as to not manipulate any element within the system has a security flaw. IMHO, fix that and you fix the hacking problem.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
  • stumpedandfrustrated
    0 stumpedandfrustrated over 4 years ago

    Again, like the other answers you are absolutely correct. The problem is the point of entry or many backdoors for entry into the network and the devices. When I get a new device " NOT using anything " tied to the previous device or network... within an hour the new device has been compromised. Once administrator owner has been hijacked, the complete OS can be made writable, so that to the common user looks as if everything is running as it should, but to follow background usage, and you see 500 different DNS running " each on a different network" " T-Mobile, Net 10, Sprint, Etc"... then you look at your Task manager, and the CPU is operating at more processing memory that your device is capable of performing. The Data is spiking to 1.5Gb in an hour and your not even touching your device. You find the data usage in your system files in an empty cache file or 100 empty cache files per process. For each process I have recorded " remote network change for each process. All system apps have been made to look and present the app as it should, but in fact is actually some 3rd party programming app that has been manipulated to function specifically to the hackers needs. I've been called paranoid, crazy, even delusional over the last 10 years. The few things that I have mentioned are just the typical everyday activity that surrounds my life. I have run new phone out of the box side by side tests to prove what I say here is fact. All security access was professionally set up and Norton 360 with life lock installed both devices. Still within a short time the device has a mind of its own. I have detailed litterateur of how this is possible and schematics to show the facts. So top security, new perfectly well running devices, and professional set up, puts the poor security theory to rest.

    All ideas thoughts feelings criticisms are welcomed.

    ty

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
  • colporteur
    0 colporteur over 4 years ago in reply to stumpedandfrustrated

    What have you done to stop the attacks?

     

    It appears there may be a number of attack vectors used to target you. Devices in your network, you phone devices, IoT devices (i.e. TV) and external resources you use. Shutting the door on one is ineffective without all the other doors closed also.

     

    If this is a targeted attack as you suspect, what attempts have you made at closing doors?

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
  • stumpedandfrustrated
    0 stumpedandfrustrated over 4 years ago in reply to colporteur

    Thank you Sean Conway

    that is precisely the question at hand.

    I just recently found a 12 year old lg touch screen that ran on a net 10 pre pay. It was a 20 dollar phone 12 years ago. It belonged to the hacker. It was in an old back pack of mine in a closet uncharged for the last 10 years. When I stumbled across it in the closet a couple of weeks ago it was up and running and has many apps loaded into it that are updated to match the Samsung galaxy s8+.. I was recently told that is impossible and not true.. yet I have it in my possession. I believe that is to hidden Backdoor. However I want it to be researched before I move forward with it.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
  • Jan Cumps
    0 Jan Cumps over 4 years ago

    I think we arrived in crazy land now.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
  • dougw
    0 dougw over 4 years ago

    It sounds like you need to fix your router or get a better one.

    https://www.tomsguide.com/us/home-router-security,news-19245.html

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
>
element14 Community

element14 is the first online community specifically for engineers. Connect with your peers and get expert answers to your questions.

  • Members
  • Learn
  • Technologies
  • Challenges & Projects
  • Products
  • Store
  • About Us
  • Feedback & Support
  • FAQs
  • Terms of Use
  • Privacy Policy
  • Legal and Copyright Notices
  • Sitemap
  • Cookies

An Avnet Company © 2026 Premier Farnell Limited. All Rights Reserved.

Premier Farnell Ltd, registered in England and Wales (no 00876412), registered office: Farnell House, Forge Lane, Leeds LS12 2NE.

ICP 备案号 10220084.

Follow element14

  • X
  • Facebook
  • linkedin
  • YouTube