Suddenly a website popped up on chrome tried to close it & there was a pop-up closed it again; then my firefox browser was refreshed & a NEW “hibro.txt” file was created on the desktop. Opened the txt file and they were addressing me & talking about how good of a gamer I am…
SO can you please explain HOW WAS the .txt file created by the hacker & HOW THE HELL did they know I’m a player of xyz game?? COULD THEY HAVE ACCESS of my files, folders and family pictures too? PLEASE HELP and KINDLY CLARIFY MY DOUBTS!
Which OS did you use? Linux or MacOS?
One of the reasons why you want to keep a live-bootable operating system within one of your flashdrives or optical discs.
You probably need another device to securely boot up a live OS to recover your data. Don’t use Windows, because it might still be vulnerable to autoplay scripts when mounting your infected OS partition and I assume your infected OS is Windows, so the malwares are going to be compatible and unless you know what you’re doing, you probably don’t want to take that chance.
Sounds like malware games to me. Probably a windows user, probably disabled Defender.
Shut down the computer and disconnect it from the internet, if you haven’t already done so.
With another computer (or your phone) download Spybot (i think it’s still considered one of the best free tools out there) and move it to your pc, let it run its scan, and check the results.
Oh, and like @Fazoo@lemmy.ml stated, this isn’t foolproof, so if you want to be really sure, then follow their advice instead.
Can’t say how this “hacker” got you with the provided information, but if he can put a file on your desktop, then he can likely see your files too. It wouldn’t happen to be one of your friends pulling a fast one on you?
Real answer? Shut your PC down, pull the hard drive, and use a dock to pull your personal data to another PC. Only files you are 100% certain are clean. No apps or scripts.
Then wipe the machine without using an internet connection. Change all your passwords and reconfigure your home network. Then reflect on what you did in regards to risky online behavior and be more proactive in protecting your privacy and data.
If real, how they did it is irrelevant if you don’t have forensic know-how. You need to now be proactive in preventing any further interference. If they can create a file on your desktop, they have access to the system and what is on it.