How does /g/ deal with hacking? - /g/ (#105588622) [Archived: 1027 hours ago]

Anonymous
6/14/2025, 7:03:20 AM No.105588622
5456345
5456345
md5: d9a8f1067197ebc8c5951c7ee78d8e3d🔍
My bro is dealing with being hacked

>I had used my computer for about 3 years before ever taking it outside my own network and ran the latest Windows updates every week, updated graphics driver through several iterations and the display options remained whole and normal, not these fractional illegitimate refresh rates altered by malware. This is irrefutable proof that there is nasty firmware rootkits going around in the outside world, that seems to be surprisingly common after reading several forums of people experiencing the same issues I "randomly" started having after I took my computer outside my secure network to a foreign network.
(cont.)
Replies: >>105588685
Anonymous
6/14/2025, 7:08:05 AM No.105588654
1735251618042282
1735251618042282
md5: 49efa863fef8db2536f67448ab8ad4f4🔍
I'm the one who hacks.
Anonymous
6/14/2025, 7:09:42 AM No.105588666
>windows
lol
Replies: >>105588858 >>105588879
Anonymous
6/14/2025, 7:12:44 AM No.105588685
>>105588622 (OP)
DLink routers are insecure garbage, they were actually banned from sale in the US because criminals figured out they were easy to take control of. There are probably other modem/router brands with all their login details published on the internet, since they are mass produced they tend to use the same password internally, I don't mean for the ssids, or control pages, but for their root behavior. They can be used for sniffing traffic man in the middle style.
Anonymous
6/14/2025, 7:20:25 AM No.105588720
>It's hard to remove because the infected firmware cannot be reflashed by software even if you were able to get the legitimate firmware and a User Mode application that interacts with the driver which communicates with the firmware on the hardware device (ex. Realtek Ethernet Controller card on MoBo) as the firmware is not publicly available and the infected firmware is modified to remove the code that handles reading (maybe) and writing (certain) firmware. Leaving the only option, really, to wire up an SPI Programmer directly with the chip, sometimes desoldering the chips to slot into an adapter the SPI programmer can then read pins correctly and sometimes even identify the chip just by reading some data in a special location on the chip. Some of these firmware chips are not as easy to flash as the SOIC-8 package where you can just clamp to it with an IC Test Clip without having to remove it from the motherboard. The firmware chips vary in form factor, which is also very annoying, sometimes they are even System-on-Chip which obviously is even harder, almost impossible to reflash. The only thing I can think of that boots early before anything else (ultimate persistence) is Intel Management Engine and AMD's variant, Platform Security Processor, which has full access to CPU registers, memory (locked and unlocked) even assists in the booting procedure of OSes, which makes it a prime candidate for defeating all boot and hardware security measures because of Ring -3 privileges and even allows it to halt the CPU and bypass all security measures, like Intel Boot Guard, Intel Hardware Shield, Total Memory Encryption, etc. and infect every OS it boots into, which then downloads the rest of the rootkit (OS Level) as soon as the fresh OS install connects to the internet.
Anonymous
6/14/2025, 7:21:47 AM No.105588722
Imagine resetting a router, changing the ssid, and password, but a short time later it reverts to the previous settings you believe made it unsafe to use in the first place. The remote management functionality made it so that anyone could send and apply configurations with old passwords/ssids. They were a security risk because they announced themselves (remote management services) as open port anyone in the world could access, unlike commercial routers which you can restrict access to management with to only a certain LAN port.
Replies: >>105588774
Anonymous
6/14/2025, 7:31:11 AM No.105588774
CGJB_cFUoAI5vki
CGJB_cFUoAI5vki
md5: d047e785c79496c29d447cee85ae9385🔍
>>105588722
so what do I do to help him?
Anonymous
6/14/2025, 7:39:05 AM No.105588822
653298528328
653298528328
md5: 3ee9b465f05cf99c4826f5a78e8beee6🔍
>RTX 5080 Artifacting

>I am not sure what to do to fix this issue but it is an extreme nuisance.

>If people are hacking me, it wouldn’t be a problem as long as the spyware doesn’t interfere with performance or use and my private information is not used by a bad actor.

>Apparently I am being hacked because I supposedly know how Advanced Persistent Threats work.

>Clearly this is an interference and makes my computer and graphics card pretty much useless.

>It artifacts even before the BIOS boots and persists through Windows Install and sometimes the screen goes black for a few seconds then comes back on randomly.

>I spent a lot of money on a PSU upgrade and GPU upgrade and I put a lot of time and money into my computer. Any help or someone who can fix it would be greatly appreciated

>Video describing my the issue:

https://youtu.be/u4taHj_Tnz4?si=R4HtWRGW2yfYNuC-

https://youtu.be/t_5P2ewiEJQ?si=Pz1h3Tg71DZVrC-T

https://youtu.be/Xc27LVoVJgM?si=iUoDA2rftvNmxqtq
Anonymous
6/14/2025, 7:45:36 AM No.105588858
>>105588666
Linux is satanic
Anonymous
6/14/2025, 7:50:34 AM No.105588879
>>105588666
Mac is satanic
Anonymous
6/14/2025, 11:05:19 AM No.105589844
actual schizo thread
Replies: >>105589926
Anonymous
6/14/2025, 11:19:40 AM No.105589905
Smash the computer because there’s no way you will believe that installing a fresh OS airgapped then connecting to a secure network and updating everything will ever work
Buy a new system and never allow it to use the network ever and just watch framerate specs and wonder how they are using satellites to root your firmware again and why the rates aren’t as good as they used to be
Anonymous
6/14/2025, 11:23:39 AM No.105589926
>>105589844
Goyim...just stop thinking
https://youtu.be/WeoTDxMjEmU?si=0pD8LMvwqVffFTst