I hung up of course, since my windows was bought from g2deal and they surely don't have any phone number

It's not. They have been doing it a long time.agroot wrote: ↑Fri Feb 19, 2021 4:01 pmIs this new? Had some call that told me they're Microsoft and my computer has been hacked. The guy feels quite real and spent several minutes explaining how it happened ..
I hung up of course, since my windows was bought from g2deal and they surely don't have any phone number![]()
Thanks! Glad to know my pc isn't actually hacked
Not only that, no-one from Microsoft will be calling you even if your Windows PC was hacked.agroot wrote: ↑Fri Feb 19, 2021 4:01 pmIs this new? Had some call that told me they're Microsoft and my computer has been hacked. The guy feels quite real and spent several minutes explaining how it happened ..
I hung up of course, since my windows was bought from g2deal and they surely don't have any phone number![]()
What you're suggesting is illegal, regardless of whether it's a criminal at the other end.NukkuMatti wrote: ↑Mon Mar 08, 2021 10:20 amCheck Jim Browning on Youtube and you know all about these @ssholes. (sorry link was already here, you can also check kitboga and scammersrevolt)
If you feel adventurous, try to get your hands on a good PC with multiple monitors, multiple Virtual machines on it configured, a good remote access trojan (RAT) virus on your VM desktop disguised as banking details file, a command and control server on another VM for controlling the RAT (on the same PC) and play along, let him connect to your computer VM and lure him to copy the trojan.... after that you can do anything on his PC or even complete network...
scam the scammers!!!!
Beware VM may not be completely bulletproof as people generally think. It has control interfaces from the host which might be exploitable, and also access to uncleaned memory, shared CPU cache, etc, which could have leaks and are also subject to side-channel attack. I think those things are only in research phase but who knows if you piss off hackers and get their special attention..NukkuMatti wrote: ↑Mon Mar 08, 2021 10:20 amIf you feel adventurous, try to get your hands on a good PC with multiple monitors, multiple Virtual machines on it configured, a good remote access trojan (RAT) virus on your VM desktop disguised as banking details file, a command and control server on another VM for controlling the RAT (on the same PC) and play along, let him connect to your computer VM and lure him to copy the trojan.... after that you can do anything on his PC or even complete network...
Can you point out for me what exactly the illegal part is?FinnGuyHelsinki wrote: ↑Mon Mar 08, 2021 12:03 pmWhat you're suggesting is illegal, regardless of whether it's a criminal at the other end.
Yeah but that is the point, these guys doing the scams are no real hackers, they are a bunch of amateurs that try to fool old people without knowledge of computers and software / OS.agroot wrote: ↑Mon Mar 08, 2021 12:43 pmBeware VM may not be completely bulletproof as people generally think. It has control interfaces from the host which might be exploitable, and also access to uncleaned memory, shared CPU cache, etc, which could have leaks and are also subject to side-channel attack. I think those things are only in research phase but who knows if you piss off hackers and get their special attention..
No, it is illegal to access someone's computer without their permission, period. How one manages to do that and why doesn't change that. Instigating a crime is also illegal.NukkuMatti wrote: ↑Mon Mar 08, 2021 10:25 pmCan you point out for me what exactly the illegal part is?FinnGuyHelsinki wrote: ↑Mon Mar 08, 2021 12:03 pmWhat you're suggesting is illegal, regardless of whether it's a criminal at the other end.
I do not force the other party to download a file named banking history from my VM desktop, which contains my personally crafted and controlled RAT that points to my own C&C.
He does that himself, I do not give him permission to take the file, he takes it without asking/permission and gives me that way remote access to his network, the same way he steals other ones money.
So again... the scammer basically grants me (gives me permission to) access to his network himself by taking this illegal action of his...
Whether the police will investigate, the prosecutor will press charges or the scammer will report it are beside the point, still it is illegal.NukkuMatti wrote: ↑Mon Mar 08, 2021 10:25 pmAs long as I don't steal his money or access his bank account... If I delete all his files which he uses to steal money from old people with, I sincerely doubt any police officer will consider it a crime, in this case is only a crime if the scammer tells me to get out of his network and I refuse and then reports me to the authorities as if I did something illegal, I personally do not think that he will be doing that given the fact he himself is caught up in a very lucrative scamming operation.
He was not sued. It doesn't mean what he did was legal.NukkuMatti wrote: ↑Wed Mar 17, 2021 10:01 pmWell in that case I do not have any problem at all with Jim Browning being a criminal (your words) and working together with BBC and the police to roll up a scam factory AFTER he gained according to you illegal access to their network. It has been on national TV in GB... so I guess there is a difference in laws regarding this between Finland and GB.
Jim browning still does it and posts it on Youtube... same as the others.. who live in the US...