Monday, December 17, 2012

TrueCrypt HID Device Hack with Knoppix

I was hacked by the TRlADS while living in Asia and have went through 20 computers (half Windows, half Mac ) and 5 phones ( 3 iPhone's, 2 Galaxy S3’s ) (8 cable modems) and 10 Routers ) in the past 2 years trying to figure out how they got me. I have the hack under control now but still want to know everything.  In Addition to installing DD-WRT on my Routers until I got wise to that, I know they were using my iPhone as a wifi beacon command center in addition to many other mash-ups but I think they spread the hack via HID devices on a USB Drive that they customized a TrueCrypt travel disk installer to accomplish.  I would break their hack from time to time and see clues like 2TB VFAT drives on a small 4GB USB Flash Drive etc so I know they are disguising the Hard Drive and hiding behind Virtual Drives that say they are for example 500GB but since they grow dynamically, they don’t need all of that space right away so these losers have plenty of space outside of this bubble to operate on my hard drive and I can’t even see them. The hack survives low level reformatting and Apple Genius Bar told me I know more than them after several failed visits. I now use TrueCrypt to re-encrypt and reformat my hard drives which I think is working until they restore the volume header with an HID device or a cron job ( I'm not sure )

While I lived in Asia they really controlled my iPhone, read about that nightmare here 


I realized my phone was a command center when I had a hunch and powered off my iPhone4S as my Ubuntu Live CD Boot was hanging as it tried to connect to the Internet.  The second I powered off my iPhone 4S ( never jailbroken nor even plugged into a computer ), my Ubuntu Screen said “Disconnected from Network”.  I recreated it 4 times in a row.  The scary part is that I was using a Cat5 connection directly into the Cable Modem and wifi was shut off ( so it seemed.  They served me fake screens that masked the real settings on my phones and computers ).  Even though I booted using a Ubuntu Live CD, their hack was still controlling my machine.  It was a MacBook Pro15 that I used to boot Ubuntu from and I didn’t even mount a hard drive, it was all LIVE CD.  After researching I found that Knoppix has the ability to create a persistent file system that takes precedence over a subsequently booted Live CD ( in my case, Ubuntu 12.04 )  See Knoppix at http://www.knopper.net/knoppix/index-en.html I am good at computers but not a programmer so that's where my ability to solve this ends.  I can’t list everything they did because I would need to type forever but here are a few subject areas I think they exposed to control my machines, upon which I will elaborate on the TrueCrypt set-up after the bullet points.

-  They hacked my Power Supply by implanting a trasp device in My Bose Speakers and possibly my high end water machine that sent malware farts through my electrical grid and tunneled into my system that way.  I always had a Fire-wire connection open out of nowhere on my Macs and my Window’s computers always had new HID Devices connecting out of nowhere ( A FUCKING GHOST!!!  LOL )  I think they use a lot of tools from www.nirsoft.com ( cool site ) like USBDVIEW etc...

-  They Used MIDI notes sent via TCP that was communicating with a Braille keyboard interface on my phones.  They also used Netboot Images served via a Media server somewhere in Cyberspace.  None of this came up on Virus Scans and they would mimic Google Updates to get the traffic through.  One day I watched Chrome update 6 times with a 15MB update each time.  They spoof IP addresses all of the time and do Man in the Middle attacks on my network constantly.

-  The Most clever of all is when they knew I was on Match.com so they had a Chinese Girl contact me and I was amazed at how quickly she wanted to come to my house, it was too easy actually but right after she came I noticed the hacking got 10 times worse. I now realize she came to get my cable modem Mac address so they could clone my cable modem. Did you know that if you clone a Comcast Customer's Mac address on their modem and plug it in at your house, you will instantly have the same cable service as them for Internet. I was shocked that Comcast doesn't run cron jobs looking for duplicates since it allows people to get free internet but they can see if they check though, they just don't check I guess because not many people are bad-ass enough to clone a cable modem's Mac ID. Anyways, they cloned my Mac Address from my Cable Modem to an older Motorola Model and they were sitting in between my house and Comcast intercepting all of my traffic until I figured it out and called Comcast.  The Guy at Comcast almost shit himself in amazement as we had him send a refresh signal to me but there was a 10 second delay as the Hackers Cloned Modem received it first, and rebooted and upon sending a second one right away, the second refresh signal hit my modem since theirs was rebooting.  Comcast cut them off and just to be safe I went and bought another new modem.  The guy said he never saw or even heard of such a thing and this guy was in the abuse department Tier 2 support.  Yes, these fuckers are clever.

I could tell you five more but want to stay focused on the main part of their hack.

Here is what I also think they did to keep control of my machines.

See http://www.Truecrypt.org, they are using that in conjunction with Knoppix as 90% of their operation ( I Think.... )  If you are familiar with TrueCrypt, Read on......
I suspect that they used a hidden volume as the keyfile for the outer volume in order to prevent the outer volume from mounting at all if I removed their hacked OS hidden on my system.  This would assure that the system always booted with their backdoor fuse file system which I discovered through pure luck when I was creating hidden and outer truecrypt volumes on a hacked machine.  Their hack made a mistake and assumed that the hidden volume I created was part of their set-up so they proceeded to copy over a 666MB .iso file that had the same name a linux Dragonfly Live DVD except that Dragonfly is 900MB, not 666MB like this one.  I am guessing at saying it is a remastered Live CD of Knoppix because Knoppix can actually embed the file system to stay persistent across reboots but i’m not techie enough to go much further on that subject.  I zipped the .iso file and uploaded it to http://bit.ly/666hack if you want to check it out.  Let me know what it does.....  I also made a video of me extracting it from the .iso file where it kept saying certain files already exist during the extract even though I extracted it to an empty folder.  Must be due to duplicate files with two dots in front and it moved it up a directory ( just guessing but I would love to know what this .iso file does.  This is their bread and butter for their hack.  The .iso file wouldn’t open on my Mac, it said cannot open, being used by OSX.  I couldn’t even copy it or burn it using disk utility either.  I had to burn it using TOAST to get it off the machine.  This file is possessed. http://bit.ly/666hack2


I think all of the VFAT 2TB files that I saw were actually dynamic Truecrypt volumes ( see below from TrueCrypt which is why I think that way ).  They were hidden on all of my Flash Drives and the only thing that would expose them and mangle them off the flash drive was HP TOOL


 I was able to get the hacked read-only flash drive to format 75% of the time by quickly changing between NTFS and FAT formatting within that program and would get a read-only error a few times until an attempt would break through and format the damn thing.That would be the Truecrypt Read-Only aspect I assume.




The feature below allows them to have a 1 size fits all hack since the USB device they use to infect your system will create a dynamic volume equal to the host’s hard drive’s maximum size which works well if the person they are hacking has a 300GB hard drive or 1TB hard drive, it expands to the maximum possible size and is easier for them to hide by making you think it is your main hard drive except they have all of their hacked hidden operating systems outside of the dynamic volume and you can’t see it.  If you save a Truecrypt volume as a favorite, you can set the options to have the volume mount either after logon or when the drive first gets power ( Thats even before the damn Bios!!!!! Regarding this, I outsmarted them while still living in Asia when I used an external keyboard to change my bios password because the #4 on the numpad for some reason effected a backspace, not a #4 and even though I typed 88884444 as the password, I used the 4 up top for the first two and the numpad 4 for the second two which backspaced the first two fours out and made the password 8888 but my hackers assumed it was 88884444 so I entered that into the bios on the next boot ( using all numbers from the top row) and the screen said “password correct” then quickly bluescreened and never booted again.  Thats when I knew they had me before the bios, now I can see how with the ability of Truecrypt.)  FYI, The Windows Version of TrueCrypt has the most features compared to Mac or Linux for TrueCrypt, but these guys were using the Sourcecode and hiding everything from the visible eye.






They use the non-admin feature below to create a volume they can access without admin privileges.  Even if you install a new operating system and lock it down, they can still access it because the system is basically built on a wide open file system.  To make things even worse, any files shared by the hidden OS and your OS will be mounted as read only and not even throw errors most of the time so anything you change on your computer will be trumped by their already intact fuse file system.






By utilizing TrueCrypt SourceCode, I assume that they have a clone of their hack OS that is protected as a hidden volume when they mount their outer dynamic volume so that way they have a back-up if you are somehow lucky enough to delete the one they mount during the early boot process but the first one they mount is mounted read-only so you can’t delete it anyways.  This shows you how many options Truecrypt can give a hacker.







Please let me know what they are doing and how they are accomplishing it.  I have tons of other stuff too but don’t want to overwhelm anybody and take their eye off what I think is the main part of their system.  These guys are good.

Edward
Email Me HERE




7 comments:

  1. My life was falling apart, I was being cheated and abused, I had to know the truth and needed proof. i saw a recommendation about a private investigator worldcyberhackers@gmail.com by a friend. i contacted them and they took care of my needs. they hacked his iphone and gave me all information in his facebook,instagram, Whatsapp, twitter and email account. I got all I wanted as proof . I am glad i had a proven truth he was cheating . Contact them if you need help.


    ReplyDelete
    Replies
    1. ythjdr thrdt hrth
      real hacker my icq: 659915666
      email: hacktorich@gmail

      spy on cell phone, computer,want to hack email,Upgrade Your WAEC Result,take root privilege of any server
      Cpanel + SMTP + scam page + shell + RDP + roots + mailer + email Extractor + fresh lead, + exploits + doc-pdf exploits for .exe converting + any kind of spyware keylogger + sql advance tools for shop admins

      http://hacktoladen.blogspot.com/
      site

      icq: 659915666
      email: hacktorich@gmail

      >>> Randome Tools <<<
      simple ip smtp: 12 $
      domain smtp : 15 $
      cPanel : 12 $
      WHM : 35 $
      Rdp : 25 $
      Root : 40 $
      Ftps : 10$
      scame page : 25 $
      telnet host : 15 $
      Shells : 5 $
      Leads : 10$ 10k
      Latter : 3 $
      PhP Mailer : 8 $

      icq: 659915666
      email: hacktorich@gmail

      real hacker my icq: 659915666
      email: hacktorich@gmail

      spy on cell phone, computer,want to hack email,Upgrade Your WAEC Result,take root privilege of any server
      Cpanel + SMTP + scam page + shell + RDP + roots + mailer + email Extractor + fresh lead, + exploits + doc-pdf exploits for .exe converting + any kind of spyware keylogger + sql advance tools for shop admins

      http://hacktoladen.blogspot.com/
      site
      icq: 659915666
      email: hacktorich@gmail

      >>> Randome Tools <<<
      simple ip smtp: 12 $
      domain smtp : 15 $
      cPanel : 12 $
      WHM : 35 $
      Rdp : 25 $
      Root : 40 $
      Ftps : 10$
      scame page : 25 $
      telnet host : 15 $
      Shells : 5 $
      Leads : 10$ 10k
      Latter : 3 $
      PhP Mailer : 8 $

      icq: 659915666
      email: hacktorich@gmail
      real hacker my icq: 659915666
      email: hacktorich@gmail

      spy on cell phone, computer,want to hack email,Upgrade Your WAEC Result,take root privilege of any server
      Cpanel + SMTP + scam page + shell + RDP + roots + mailer + email Extractor + fresh lead, + exploits + doc-pdf exploits for .exe converting + any kind of spyware keylogger + sql advance tools for shop admins

      http://hacktoladen.blogspot.com/
      site
      rs rth fhg yh

      Delete
    2. ARE YOU A VICTIM OF FALSE HACKERS & BANK LOAN SCAM⁉️

      We have been having recent complains from individuals about how they lost money 💵 to SPAMMERS who call themselves HACKERS or BANK LOAN OFFERS. They are all over the internet sharing false testimonies. Please do not fall for their lies for this is just a way to LURE you to them.

      They say lies in the likes of such-:
      ▪️Bitcoin Auctioning ▪️Western Union Hack
      ▪️Blank Credit Card ▪️Clearing Criminal Records
      ▪️Loan Offers. ▪️Bank Account Loading
      ▪️Changing University Grades & so on.
      These are all lies and you shouldn’t fall for them.

      🏵GLOBAL PLUGGERS🏵 is here to help you Recover all your Money 💵 that you have been Ripped of.
      WHO ARE GLOBAL PLUGGERS⁉️
      We are a group of Computer💻 Experts who are memebers of the “HACKERONE” Forum. We have dedicated ourselves to help Victims of these SCAM(s) recover all the Money that has been taken falsely from them.

      If you have been a victim of thes Thieves, then you need to contact us as soon as possible so you can get your money back.
      Email-: globalpluggers@gmail.com
      No. +1 (808) 600 0773 ( Number also available on WhatsApp)

      Note:
      Please know that we do not charge you for Fund Recovery Service, Our Funds Recovery Service is to help and so it’s Free.

      We also provide Legit Hacking Services such as-:
      🔸Phone Hacking/Cloning
      🔸Email Hacking & Password Recovery
      🔸Social Media Hacking & Passowrd Recovery
      🔸Deleted Files Recovery 🔸Mobil Tracking
      🔸Virus detection & Elimination.

      Contact-:
      Email globalpluggers@gmail.com
      No. +1 (808) 600 0773 (number also available on WhatsApp)








      Delete
  2. ★COMPOSITE HACKS★

    🔍🔍Are you Seeking for the Best Legit Professional Hackers online??❓💻💻💻
    Congratulations Your search ends right here with us. 🔍🔍🔍🔍

    🏅COMPOSITE HACKS is a vibrant squad of dedicated online hackers maintaining the highest standards and unparalleled professionalism in every aspect.
    We Are One Of The Leading Hack Teams in The United States🇺🇸🇺🇸 With So many Accolades From The IT Companies🏆🏅🥇. In this online world there is no Electronic Device we cannot hack. Having years of experience in serving Clients with Professional Hacking services, we have mastered them all. You might get scammed for wrong hacking services or by fake hackers on the Internet. Don't get fooled by scamers that are advertising false professional hacking services via False Testimonies, and sort of Fake Write Ups.❌❌❌❌

    * COMPOSITE HACKS is the Answers to your prayers. We Can help you to recover the password of your email, Facebook or any other accounts, Facebook Hack, Phone Hack (Which enables you to monitor your kids/wife/husband/boyfriend/girlfriend, by gaining access to everything they are doing on their phone without their notice), You Wanna Hack A Website or Database? You wanna Clear your Criminal Records?? Our Team accepts all types of hacking orders and delivers assured results to alleviate your agonies and anxieties. Our main areas of expertise include but is never confined to:

    ✅Website hacking 💻,✅Facebook and social media hacking📲, ✅Database hacking, Email hacking⌨️, ✅Phone and Gadget Hacking📲💻,✅Clearing Of Criminal Records❌ ✅Location Tracking✅ Credit Card Loading✅ and many More✅

    🏅We have a trained team of seasoned professionals under various skillsets when it comes to online hacking services. Our company in fact houses a separate group of specialists who are productively focussed and established authorities in different platforms. They hail from a proven track record and have cracked even the toughest of barriers to intrude and capture or recapture all relevant data needed by our Clients. 📲💻

    🏅 COMPOSITE HACKS understands your requirements to hire a professional hacker and can perceive what actually threatens you and risk your business⚔️, relationships or even life👌🏽. We are 100% trusted professional hacking Organization and keep your deal entirely confidential💯. We are aware of the hazards involved. Our team under no circumstances disclose information to any third party❌❌. The core values adhered by our firm is based on trust and faith. Our expert hacking online Organization supports you on time and reply to any query related to the unique services we offer. 💯

    🏅COMPOSITE HACKS is available for customer care 24/7, all day and night. We understand that your request might be urgent, so we have a separate team of allocated hackers who interact with our Clients round the clock⏰. You are with the right people so just get started.💯✅

    ✅CONTACT US TODAY VIA:✅
    📲 compositehacks@gmail.com 📲

    ReplyDelete
  3. DO YOU WANNA RECOVER YOUR HARD EARNED MONEY ON BINARY OPTIONS???

    ✅ Binary options may be used in theoretical asset pricing, they are prone to fraud in their applications and hence banned by regulators in many jurisdictions as a form of gambling. Many binary option outlets have been exposed as fraudulent. The U.S. FBI is investigating binary option scams throughout the world, and the Israeli police have tied the industry to criminal syndicates. The European Union is publishing regulations that will ban binary options trading. ASIC considers binary options as a “high-risk” and “unpredictable” investment option.

    ✅ Most people have lost their hard earned money through this binary options shit, yet they would go to meet scammers unknowingly to help them recover their money and they would end up losing more money in the process. You can easily identify these scammers with their Fake Testimonies, the thing is some of all these testimonies ya’ll are reading on these forums are fake, scammers are just trying to lure you into their Arms to get you ruined more.

    ✅ The Only People who are capable of helping you to recover your money are HACKERS, most of this Binary option companies are scam so therefore they have weak Database security, and their vulnerabilities can be exploited easily with the Help of our Special HackTools, Root HackTools And Technical Hacking Strategies. All we do is to hack into the Company’s Database, Extract your files and documents, Decrypt your Transaction Details and some Technical Hacking Procedures follows then you have your money recovered in Bitcoins.

    ✅We have a trained team of seasoned professionals under various skillsets when it comes to Hacking. Our company in fact houses a separate group of Hackers who are productively focussed and established authorities in different platforms. They hail from a proven track record Called “HackerOne” and have cracked even the toughest of barriers to intrude and capture or recapture all relevant data needed by our Clients. Some Of These Hackers Includes PETER YAWORSKI, FRANS ROSEN, JACK CABLE, JOBERT ABMA, ARNE SWINNEN And More

    ✅COMPOSITE HACKS is available for customer care 24/7, And You Can Also Contact us for other Technical Hacking Services you desire Such as:
    * WEBSITE HACKING
    * PHONE HACKING (giving you Unnoticeable access to everything Happening on the Target’s Phone)
    * LOCATION TRACKING
    * SOCIAL MEDIA ACCOUNTS HACKING etc


    ✅CONTACT:
    * For Binary Options Recovery
    E-mail: Binaryoptionrecovery@gmail.com
    * For Other Hacking Services
    E-mail: compositehacks@gmail.com
    Wickr: compositehacks

    ReplyDelete

  4. Are you interested in the service of a hacker to get into a phone, facebook account, snapchat, Instagram, yahoo, Whatsapp, get verified on any social network account, increase your followers by any amount, bank wire and bank transfer. Contact him on hackintechnology@gmail.com +12132951376(WHATSAPP)

    ReplyDelete
  5. I was so anxiuos to know what my husband was always doing late outside the house so i started contacting hackers and was scamed severly until i almost gave up then i contacted this one hacker and he delivered a good job showing evidences i needed from the apps on his phone like whatsapp,facebook,instagram and others and i went ahead to file my divorce papers with the evidences i got,He also went ahead to get me back some of my lost money i sent to those other fake hackers,every dollar i spent on these jobs was worth it.Contact him so he also help you.
    mail: premiumhackservices@gmail.com
    text or call +1 4016006790

    ReplyDelete