Related
Well lets assume your android device has been stolen! Good lord !! . Not to worry, this guide should hopefully help you recover it. Even if its a thief.
PS: This contents of this read may bear resemblance to the reddit thread i created
A about two weeks ago (17th April to be exact) one of my friend lost his Samsung GT-I9003 from his dorm room at 0200hrs. Today when i was scanning my latitude, i saw him position a few hundred meters from me. Problem is, we are on a university campus. 500+ students, staff, kitchen, cleaning - basically lot of people. I suggested we check Google Latitiude's location history and sure enough for the past 15 days, the phone's location is spread all over the campus.
Premise of the crime
The phone is ON and is connecting to the Wi-Fi.
The phone is still tied to the primary gmail account and is thus reporting location.
The SIM has been removed or changed since the original number is now switched off
The person does not have good knowledge of using a smart phone (maybe helping staff)
Steps we have taken
Since we assume it is in the possession of either a student or helping staff we don't want to startle him.
Tried Plan-B on my phone. However the location it was reporting was the same as Google Latitude.
The phone does have Where is my Droid installed but the web interface says invalid email ID. So that option is ruled out unless you have pre configured Where is my Droid previously.
How we found the phone
After Where is my Droid failed us, we started looking for other applications. We found this application called Android Lost. Unfortunately we hit a dead end when we realised that it needs to be activated by sending an SMS. Since we dont know the phone number, or that there is even any SIM card in the phone, that application also seemed useless.But turns out the developer of Android Lost has also made a nifty app called AndroidLost Jumpstart which is can trigger Android Lost without the need of an SMS.
According to the description
This app will wake up the registration process on the androidlost app when ever a phone call is made, an SMS received, battery is low, a package is added, removed or changed.
Click to expand...
Click to collapse
So we got android lost installed. Trust me, its a life saver. We got calls logs, sms, pictures, voice recordings. We tracked the person with the help of this.
Hope this helps anyone in the future!
maverick340 said:
Well lets assume your android device has been stolen! Good lord !! . Not to worry, this guide should hopefully help you recover it. Even if its a thief.
PS: This contents of this read may bear resemblance to the reddit thread i created
A about two weeks ago (17th April to be exact) one of my friend lost his Samsung GT-I9003 from his dorm room at 0200hrs. Today when i was scanning my latitude, i saw him position a few hundred meters from me. Problem is, we are on a university campus. 500+ students, staff, kitchen, cleaning - basically lot of people. I suggested we check Google Latitiude's location history and sure enough for the past 15 days, the phone's location is spread all over the campus.
Premise of the crime
The phone is ON and is connecting to the Wi-Fi.
The phone is still tied to the primary gmail account and is thus reporting location.
The SIM has been removed or changed since the original number is now switched off
The person does not have good knowledge of using a smart phone (maybe helping staff)
Steps we have taken
Since we assume it is in the possession of either a student or helping staff we don't want to startle him.
Tried Plan-B on my phone. However the location it was reporting was the same as Google Latitude.
The phone does have Where is my Droid installed but the web interface says invalid email ID. So that option is ruled out unless you have pre configured Where is my Droid previously.
How we found the phone
After Where is my Droid failed us, we started looking for other applications. We found this application called Android Lost. Unfortunately we hit a dead end when we realised that it needs to be activated by sending an SMS. Since we dont know the phone number, or that there is even any SIM card in the phone, that application also seemed useless.But turns out the developer of Android Lost has also made a nifty app called AndroidLost Jumpstart which is can trigger Android Lost without the need of an SMS.
According to the description
So we got android lost installed. Trust me, its a life saver. We got calls logs, sms, pictures, voice recordings. We tracked the person with the help of this.
Hope this helps anyone in the future!
Click to expand...
Click to collapse
Or install Avast anti theft before your phone gets stolen ;D never the less, very useful, thank you.
Sent from my GT-I9100 using XDA
okmijnlp said:
Or install Avast anti theft before your phone gets stolen ;D never the less, very useful, thank you.
Sent from my GT-I9100 using XDA
Click to expand...
Click to collapse
yep always good to be safe before hand. After this incident lot of my friends have installed or gotten some security app.
Although, aren't security suite like Avast, McAfee and overkill for finding lost phones?
And who was the thief?
Sent from my LG Optimus 2x with xda premium app
another possibility is to instal Cerberus App
Hi everyone. I have recently been the victim of theft for my nexus 7. I had the device locked with the pattern so there is no way that the thief could get into it unless they do a software reset from the recovery mode. The thing is, either way there is no way i would be able to recover it because if in fact they do a factory reset my lookout security would be uninstalled and my nexus would be lost forever, also if they can't get through the pattern and find a way to connect to Wi-Fi, it will still be lost forever. I have read about installing lookout in the system/app folder of a rooted device so its not easily uninstalled by normal means or factory reset. But do you think it is possible to have android lost and lookout pre-configured and installed in the system/app folder so that even if the device is factory reset, the credentials will remain?
is it factory-reset proof?
Just a quick little question: How did you get the phone to register on Android Lost? I can't get a friend's phone to be recognized in the web app, after installing the Jumpstart and another app...
Thank you
Very good contribution, gratz! i will follow your steps in case my android get stolen!
How did it fail?
You say that "after Where's my Droid failed us"...what do you mean by that...how did it "fail"? I would like to know before installing it. What exactly happened that it "failed" you?
Thanks
Losing a phone is irritating
I lost my phone sometime back. I didn't have the time to do research and maybe these apps weren't available at the time of theft. I got the SIM de-activated and tried to track my phone via IMEI number.
So, a few questions
1. Have they changed its IMEI number ?
2. Have they removed my Google account ?
This pretty much messes it up. If you can't track it via IMEI nor can you use any network then its as good as history. These were the only remaining identification tags that could have got your phone back and the thief would know of it. The moment I called on my own number he switched it off. He logged into my account and posted crap(not that I knew any of it had it not been for my friend who reported some strange FB and Twitter status) as if it wasn't enough that he had my phone.
One of the most disturbing things that they can do is play with the IMEI. Older phones were more susceptible to that kind of thing but a Nexus ? P990 ? GT19100? I thought they were much harder to hack. Not only can you NOT track your phone but also lose all other alternatives because the phone is now linked to another google account. I was searching for a post that would walk me through a process of changing the google account currently associated with the phone. In an attempt to understand if this indeed was the case. I wanted to try this app so badly but now I blew it off, my only chance.
Hardware based identification is the only way to go about fixing this issue. Any low level process that runs off some hard coded tag independent of software control known only to the owner of the phone. I just don't know what other options are left with person who lost it. I think there is no other way.
Time for a new phone, I guess
Edit: I guess I was right about that. They had done a hard reset but the IMEI associated with my account is intact. So there are two ways of messing it up. One, you change the IMEI(which sounds ridiculously dumb). Second, you change the primary account(more believable). How stupid of me to think of the first one
i think if a android phone is lost and a guy with a bit knowledge of flashin roms gets it then we might have to forget our phone.. if the phone has screen lock the guy can reset the phone through stock recovery and all security apps like where's my droid,avast etc get wiped off.. i personally don't install any anti-theft apps. i beleive in being EXTRA CAREFUL than installing any anti theft apps
And you are damn right bro, its good to be careful than putting all your believe in one anti-THEFT software which can easily get wiped off.
Sent from my GT-I9300 using xda premium
That's useful, thanks !
How did you get the Logs.
Hi Maverik,
My phone was robbed yesterday & the SIM card was removed,
I wanted to know how were you able to get the call logs, pics etc of your lost phone to ........
Very useful! Thanks!
we have Find My Phone
you can have a try
Find My Phone - find your misplaced phone/stolen phone/lost phone easily
https://play.google.com/store/apps/details?id=com.phonefindandlock
Thanks for share your experience with AndroidLost.
Inviato dal mio K00E utilizzando Tapatalk
AndroFind is the best
i highly recommend AndroFind to find stolen phone.
you can find it in android market :good:
Hi, but It's possible to find any kind of phone also with older Android version?
Thanks!
Hello
10 months ago I switched from iPhone 5 to Sony Xperia Z1 Compact mobile (not rooted), with Android 4.4.4.
The phone was running great, I also tested it for developing some simple android projects. I enabled USB debugging and checked "allow installation from unknown sources".
But always keeping in mind that Android is not secure. And choosing carefully what to install. But I was also trusting CM Security as a protection.
1 month ago, I turned ON wifi and I was trying to open my email app to see if there is any new mail.
After the device connected to internet, I saw someone was scrolling controlling my screen and navigating. After he found the "CM Security" app he tried to uninstall it.
Luckily I was very concentrated at what was going on, so I clicked on the side of the screen to prevent it. He tried again to do the same thing, so I run and switched off my home wifi rooter in time.
After the internet was gone the mobile was returned behaving normally. So during connected to internet the phone was taking both commands from me and the attacker.
For my fortune I always leave OFF wifi, mobile data and Bluetooth when I don't need them.
Anyway I made a hard reset. I did it without using the Safe Mode.
The problem was solved.
I hoped that it happened because I connected to many unsecure public wifi networks during my trips out of country last month!
Since the "master/hard reset" I installed only applications very very popular and I never connected anymore to any public wifi.
Also I never enabled the USB debugging and never checked "allow installation from unknown sources".
So I was using my phone normally, until yesterday. It was protected through CM Security, AVAST, and CM Cleaner.
But here it comes again!!! I connected through the 3G internet and again the phone was remote controled.
So today I did a hard reset but this time in SAFE MODE.
Please can you suggest me what other can I do?
StevenTerman said:
Hello
10 months ago I switched from iPhone 5 to Sony Xperia Z1 Compact mobile (not rooted), with Android 4.4.4.
The phone was running great, I also tested it for developing some simple android projects. I enabled USB debugging and checked "allow installation from unknown sources".
But always keeping in mind that Android is not secure. And choosing carefully what to install. But I was also trusting CM Security as a protection.
1 month ago, I turned ON wifi and I was trying to open my email app to see if there is any new mail.
After the device connected to internet, I saw someone was scrolling controlling my screen and navigating. After he found the "CM Security" app he tried to uninstall it.
Luckily I was very concentrated at what was going on, so I clicked on the side of the screen to prevent it. He tried again to do the same thing, so I run and switched off my home wifi rooter in time.
After the internet was gone the mobile was returned behaving normally. So during connected to internet the phone was taking both commands from me and the attacker.
For my fortune I always leave OFF wifi, mobile data and Bluetooth when I don't need them.
Anyway I made a hard reset. I did it without using the Safe Mode.
The problem was solved.
I hoped that it happened because I connected to many unsecure public wifi networks during my trips out of country last month!
Since the "master/hard reset" I installed only applications very very popular and I never connected anymore to any public wifi.
Also I never enabled the USB debugging and never checked "allow installation from unknown sources".
So I was using my phone normally, until yesterday. It was protected through CM Security, AVAST, and CM Cleaner.
But here it comes again!!! I connected through the 3G internet and again the phone was remote controled.
So today I did a hard reset but this time in SAFE MODE.
Please can you suggest me what other can I do?
Click to expand...
Click to collapse
Hi, just a thought....maybe someone has your Google account, and that way has also access to your phone. I suggest you to create a new account, reset your phone, and use the newly created account for your phone (and keep it secret). Also, if and when you are going to use a public wifi, use also a vpn. Hope you'll solve the issue.
setmov said:
Hi, just a thought....maybe someone has your Google account, and that way has also access to your phone. I suggest you to create a new account, reset your phone, and use the newly created account for your phone (and keep it secret). Also, if and when you are going to use a public wifi, use also a vpn. Hope you'll solve the issue.
Click to expand...
Click to collapse
Hello and thank you for your time and help.
After it happened the first time and hard reseted the phone, I created a new gmail account.
So this second time it shouldn't have happened if the email was the reason.
setmov said:
Hi, just a thought....maybe someone has your Google account, and that way has also access to your phone. I suggest you to create a new account, reset your phone, and use the newly created account for your phone (and keep it secret). Also, if and when you are going to use a public wifi, use also a vpn. Hope you'll solve the issue.
Click to expand...
Click to collapse
I'm curious. How would anyone control the device remotely if they have access to one of the google accounts on the device?
shifter7 said:
I'm curious. How would anyone control the device remotely if they have access to one of the google accounts on the device?
Click to expand...
Click to collapse
Well, one of the "options" would be to push the installation of a "malicious" app through the "great" remote install feature in the store. The app installation would proceed without you knowing it. It's known that the Play Store is, sadly, vulnerable to malicious apps. It happened in the past and it will happen in the future. There is also ways to hack a phone through an update....some apps can gain root without even ask for it when you're updating your os. This is because the Android Package Management Service (PMS) and the way it handles the os update. It will allow a seemingly harmless malicious app to acquire significant capabilities without user consent once they upgrade to a newer version of Android. I can go on, but I suggest you to make a research by yourself. There is a lot to read on the internet and here on XDA. You can start from here: http://www.informatics.indiana.edu/xw7/papers/privilegescalationthroughandroidupdating.pdf
Try this application when you update your OS:
https://play.google.com/store/apps/details?id=com.iu.seccheck&hl=en
Do you know that installing system updates could result in your Android device being hacked? Recent investigation found six such vulnerabilities (called Pileup flaws) in Android OS. When you upgrade your device, a seemingly harmless app can exploit these vulnerabilities to get access of your voicemails, user credentials, call logs, notifications of other apps, Google Voice messages, etc. This security app scans your device to detect those malicious apps and guides you uninstall them once detected.
Generic security apps (e.g., Lookout, Avast!, Norton, etc.) cannot be easily tuned to detect Pileup threats.
I don't know if you updated recently your OS but it can be used in the future.
setmov said:
Well, one of the "options" would be to push the installation of a "malicious" app through the "great" remote install feature in the store. The app installation would proceed without you knowing it. It's known that the Play Store is, sadly, vulnerable to malicious apps. It happened in the past and it will happen in the future. There is also ways to hack a phone through an update....some apps can gain root without even ask for it when you're updating your os. This is because the Android Package Management Service (PMS) and the way it handles the os update. It will allow a seemingly harmless malicious app to acquire significant capabilities without user consent once they upgrade to a newer version of Android. I can go on, but I suggest you to make a research by yourself. There is a lot to read on the internet and here on XDA. You can start from here: http://www.informatics.indiana.edu/xw7/papers/privilegescalationthroughandroidupdating.pdf
Click to expand...
Click to collapse
Thank you for the explanation/clarification.
And that whitepaper, pretty scary stuff.
Pretty obvious too, but didn't think it could go that far.
Oh dear....
StevenTerman said:
Hello
10 months ago I switched from iPhone 5 to Sony Xperia Z1 Compact mobile (not rooted), with Android 4.4.4.
The phone was running great, I also tested it for developing some simple android projects. I enabled USB debugging and checked "allow installation from unknown sources".
But always keeping in mind that Android is not secure. And choosing carefully what to install. But I was also trusting CM Security as a protection.
1 month ago, I turned ON wifi and I was trying to open my email app to see if there is any new mail.
After the device connected to internet, I saw someone was scrolling controlling my screen and navigating. After he found the "CM Security" app he tried to uninstall it.
Luckily I was very concentrated at what was going on, so I clicked on the side of the screen to prevent it. He tried again to do the same thing, so I run and switched off my home wifi rooter in time.
After the internet was gone the mobile was returned behaving normally. So during connected to internet the phone was taking both commands from me and the attacker.
For my fortune I always leave OFF wifi, mobile data and Bluetooth when I don't need them.
Anyway I made a hard reset. I did it without using the Safe Mode.
The problem was solved.
I hoped that it happened because I connected to many unsecure public wifi networks during my trips out of country last month!
Since the "master/hard reset" I installed only applications very very popular and I never connected anymore to any public wifi.
Also I never enabled the USB debugging and never checked "allow installation from unknown sources".
So I was using my phone normally, until yesterday. It was protected through CM Security, AVAST, and CM Cleaner.
But here it comes again!!! I connected through the 3G internet and again the phone was remote controled.
So today I did a hard reset but this time in SAFE MODE.
Please can you suggest me what other can I do?
Click to expand...
Click to collapse
Oh no! Did you create a BackUp before you did this?
I think the good members of this forum fell victims to an Apple troll. The key to his unscientific fiction is this: 10 months ago I switched from Iphone to Xperia and I knew android was insecure. He also claims he is a developer, but his phone is not rooted. 10 months ago Xperia z1c did not have kitkat on newly released units and the announcement for kitkat update was made on March 19 of last year. If he bought his phone 10 months ago, he couldn't have kitkat. Most likely the troll googled the date of the announcement and this is how it became a part of this fairytale. Also note that when he says he noticed his phone was taken over, he ran to shut off his wifi router. Why not shut off wifi on the phone, especially that he says the phone was accepting his commands? Now, suppose it is true that the phone was taken over through his e-mail account, then what's the probability of this happening again with a new account? Well, the underlying message is: people, don't switch from iphones to android, android is not secure, it is only good if you don't connect to the internet.
Mr. Cook, next time hire someone with higher IQ, so that your pitch sticks...
Tell you what, optimumpro, the bold letters gave it away for me. We're tech-Support here - so, why bold letters? Just advertisers are in the habit of using bold letters all over the place.
no further questions
optimumpro said:
I think the good members of this forum fell victims to an Apple troll. The key to his unscientific fiction is this: 10 months ago I switched from Iphone to Xperia and I knew android was insecure. He also claims he is a developer, but his phone is not rooted. 10 months ago Xperia z1c did not have kitkat on newly released units and the announcement for kitkat update was made on March 19 of last year. If he bought his phone 10 months ago, he couldn't have kitkat. Most likely the troll googled the date of the announcement and this is how it became a part of this fairytale. Also note that when he says he noticed his phone was taken over, he ran to shut off his wifi router. Why not shut off wifi on the phone, especially that he says the phone was accepting his commands? Now, suppose it is true that the phone was taken over through his e-mail account, then what's the probability of this happening again with a new account? Well, the underlying message is: people, don't switch from iphones to android, android is not secure, it is only good if you don't connect to the internet.
Mr. Cook, next time hire someone with higher IQ, so that your pitch sticks...
Click to expand...
Click to collapse
Hahaha, I love your way optimum....I am the first that fells, if your theory is right, but, even if I am the first, I am not going to buy this ****ty apple phone....and will keep my android....hmmm who knows...maybe blackberry?
I have unknown activity on my phone.
Along with numerous "unknown" outgoing calls with no number shown on my device (and 2 other M9 phones on the same plan) or any number registering on my carrier's system (when I called R, they said their system did show connected calls lasting various amounts of time, the could not determine what number the calls were going to), there's also a call in the log going to "(unknown)" "***,144***"
Anybody have any clue what's going on? R gave the bs answer that all 3 of us were calling our VM, even while we were sleeping. However, the times we did check our VM, the number did register on the phones and with the carrier's system.
Thanks!
Im adding a question. My M9 was unlocked without my knowledge. I'm guessing that ***,144*** might be the secret unlock code. IS there a way I can determine if it's been rooted as well?
--
squidstings said:
I have unknown activity on my phone.
Along with numerous "unknown" outgoing calls with no number shown on my device (and 2 other M9 phones on the same plan) or any number registering on my carrier's system (when I called R, they said their system did show connected calls lasting various amounts of time, the could not determine what number the calls were going to), there's also a call in the log going to "(unknown)" "***,144***"
Anybody have any clue what's going on? R gave the bs answer that all 3 of us were calling our VM, even while we were sleeping. However, the times we did check our VM, the number did register on the phones and with the carrier's system.
Thanks!
Click to expand...
Click to collapse
Interesting issue. I am not sure about the rooting. You are probably going to need to ask experts around here. Hopefully, they can help you with that. As for security, you could try checking if you have any suspicious apps running in the background or installed (You might be using same GPS or another app for example). It could be that one of the malicious apps had access to your calls which lead to them outputting calls to somewhere. You could try disconnecting your internet for a day and see if the calls persist (That is probably not an option for you, but it is an idea). Additionally, you could try a factory reset on one of the phones and see if the problem is still there.
squidstings said:
Im adding a question. My M9 was unlocked without my knowledge. I'm guessing that ***,144*** might be the secret unlock code. IS there a way I can determine if it's been rooted as well?
Click to expand...
Click to collapse
just saw this,
https://www.xda-developers.com/htc-says-the-ads-in-its-keyboard-are-a-mistake-fix-icoming/
which reminded me of your issue, though I don't suppose it's linked, but it does make you wonder WTF HTC are up to!
Anyhow with your issue I wasn't going to answer as I don't know the answer but my thoughts may help in some small way. I don't thank the 144 is a phone developers code to "root" or turn of security in some way as that would not show on your provides call logs as they stay internal to the phone (mostly). Also I don't think it's adware callng a premium number as your phone company says it does not register properly, so nobody will be paid.
That only leaves a more malicious form of hacking, I would say. So maybe that code does enable your data to be sent but untrckable over a network. That suggests to me it's possibly your actual network (who are R? What country, is it?) or maybe even your government if you are an activist or something? Though more likely is a criminal or business competitor, assuming the other people affected are business colleagues. So could be your boss trying to snoop on you all, if not HTC or the Chinese Communist Party aparatus!
What to do? As Ross says disconnecting is probably not practicable. If you have malicious activity they probably are using data as well as calls. So I would install a firewall to block most apps and log attempted connections (normally have to pay for this) then check IP addresses tell see if they are legit. However this may not show anything as data may go via root. So setting up a proxy to route traffic to your PC and use a sniffing program to see traffic or at least I P addresses.
You can download root checking apps from play store. Also check your security settings any app with admin rights? Also use a good antivirus you might get lucky, but even if negative you may still be infected.
Only way to really clean your system is to reinstall your OS, though a factory reset will fix often. But first you need to know how you were all compromised and fix that else it will just return, I would think it's most likely your local work network, (but could be your provider R or even something else you connect to in sore way eg Bluetooth, or an app you all have (you can boot into safe mode to disable 3rd party apps, but with HTC system apps possibly containing apps that use the Baidu apk etc that still has a possible backdoor unpatched (as far as I know) safe mode will not help white those!)
You might have to look into freezing/uninstalling all HTC installed apps.
IronRoo said:
just saw this,
https://www.xda-developers.com/htc-says-the-ads-in-its-keyboard-are-a-mistake-fix-icoming/
which reminded me of your issue, though I don't suppose it's linked, but it does make you wonder WTF HTC are up to!
Anyhow with your issue I wasn't going to answer as I don't know the answer but my thoughts may help in some small way. I don't thank the 144 is a phone developers code to "root" or turn of security in some way as that would not show on your provides call logs as they stay internal to the phone (mostly). Also I don't think it's adware callng a premium number as your phone company says it does not register properly, so nobody will be paid.
That only leaves a more malicious form of hacking, I would say. So maybe that code does enable your data to be sent but untrckable over a network. That suggests to me it's possibly your actual network (who are R? What country, is it?) or maybe even your government if you are an activist or something? Though more likely is a criminal or business competitor, assuming the other people affected are business colleagues. So could be your boss trying to snoop on you all, if not HTC or the Chinese Communist Party aparatus!
You might have to look into freezing/uninstalling all HTC installed apps.
Click to expand...
Click to collapse
Thank you!
Rogers, Canada. But I've switched carriers within the last few days.
I've actually done the FR 5 times now. Disabeling the pre-installed "Gmail" (I think it's more Google thn HTC related seems to have stopped the calls. I've disabled as much as I could.
so here's the kicker. I'm literally nobody! On disability, no exciting employment history and those In my family who have, aren't in contact, nor do I have contact info. And it was my wife and daughter who had the other phones, but mine was central i think. daughters phone was locked. So nothing so exciting. Which is why I even bothered asking lol
squidstings said:
Thank you!
Rogers, Canada. But I've switched carriers within the last few days.
I've actually done the FR 5 times now. Disabeling the pre-installed "Gmail" (I think it's more Google thn HTC related seems to have stopped the calls. I've disabled as much as I could.
Click to expand...
Click to collapse
Ah! Rogers Canada should be a well controlled and trustworthy provider, so probably not them, though a rogue employee or having their network compromised can't be ruled out.
Also if official Gmail app it should be safe though it does have some quite intrusive permissions like full network access, view confidential info etc, but all are legit if you want the full functionality of Gmail. But it shouldn't have access to place phone calls, so should not be able to create the behaviour you describe.
That leaves a rouge app, but you would all need to have it I suppose, HTC app (or system behavior) or local hack ie via your router or via your PC. A good anti virus should find rogue app on phone and similarly on PC. HTC system apps hard to spot without doing the firewall etc etc. So I would also be double checking your local router for firmware update and resetting it with a new strong password, to prevent possible return, so to any Bluetooth devices.
Hope it doesn't return! All the best
been a while but, just how does one get a "," in the phone keyboard? long press * for P, but no ",".
Now that time has passed and more people might be awake and less likely to make excuses, I'm wondering if this issue can be solved, or at lest thought about intelligently. Maybe someone who knows how it CAN happen, instead of trying to find ways I'm mistaken. this was on THREE SEPARATE PHONES in 2 separate cities.
squidstings said:
been a while but, just how does one get a "," in the phone keyboard? long press * for P, but no ",".
Now that time has passed and more people might be awake and less likely to make excuses, I'm wondering if this issue can be solved, or at lest thought about intelligently. Maybe someone who knows how it CAN happen, instead of trying to find ways I'm mistaken. this was on THREE SEPARATE PHONES in 2 separate cities.
Click to expand...
Click to collapse
Check with a root app to see if your device is rooted
check permissions also you can take back permissions with a app on fdroid
unknown app check with virus total or
IF someone has root on your phone they can do what they want and when they want
a app that has call access they can transfer information over a phone connection which can be anything
The troubling thing here is that your phone was unlocked w/o you which implies root access
IF you bought your phone new you might not be anybody but to be put in perspective amazon lets you steal $500 if you use another id and they say it is not you so you do not lose out
but if it is used this can be from the previous user.
The best thing to do if it does not stop is to upgrade the software on the phone if you have already done that then use a Root firewall or change to a rom here on xda (you can all change making the transition easier).
Applied Protocol said:
Check with a root app to see if your device is rooted
check permissions also you can take back permissions with a app on fdroid
unknown app check with virus total or
IF someone has root on your phone they can do what they want and when they want
a app that has call access they can transfer information over a phone connection which can be anything
The troubling thing here is that your phone was unlocked w/o you which implies root access
IF you bought your phone new you might not be anybody but to be put in perspective amazon lets you steal $500 if you use another id and they say it is not you so you do not lose out
but if it is used this can be from the previous user.
The best thing to do if it does not stop is to upgrade the software on the phone if you have already done that then use a Root firewall or change to a rom here on xda (you can all change making the transition easier).
Click to expand...
Click to collapse
Thank you for taking the issue seriously and not trying to force kool aid down my throat (if carrier was "trust"worthy, THEY would have solved it).
It didn't show root. 2 of 3 m9s were mysteriously unlocked. the 3rd did prompt for a code, but did also show those "unknown #" calls. However, I'm still stuck on the code. I can't even enter a ",". Didn't check the other units for it, but it's still the only unanswered issue that could explain the unlock (aside from your suggestion). No one's even heard of it, but programmers are known for adding backdoors. If anyone's got a new, s-on unit and feels like trying it, that's about the only way to get an answer.
It's dead now anyways. Battery won't charge unless powered off and went from 24+hours regular standby to about 3 hours with extreme powersave on, overnight and doesn't extend with usb power. usb data comm isn't even recognized. All 3 have failed actually (different ways) so I'm going back to my m7 which still works great. Except, it says s-on but works with different carriers and I can't even enter the code I paid for (no prompt. is there another way?)
So, here's the tinfoil hat part. Although I'm nobody, This all started around the time of the '16 election. when I was arguing with a youtube account named (not looking to attract attention so no name, but you know it) for the person who came 2nd.
Thank you for your help. It's a shame it's pooched before solving the issue. But hopefully, the code will be solved.
But any help entering my sim unlock code a different way would be appreciated. But if other carrier sims work, should root be doable while showing s-on?
Thanks a TON!!
squidstings said:
Thank you for taking the issue seriously and not trying to force kool aid down my throat (if carrier was "trust"worthy, THEY would have solved it).
No one's even heard of it, but programmers are known for adding backdoors. If anyone's got a new, s-on unit and feels like trying it, that's about the only way to get an answer.
Click to expand...
Click to collapse
It would seem in your case that it is a setting change that was made and not comparable to other phones. Probably what we are talking about is a connection to a command server. S-on is a protection so that one cannot change the state of certain partitions namely the recovery boot and system however their are ways to get around this. You would need to get a root app to do that.
As a general rule you need to prove something is going on and funny numbers are a indication but nobody in the security community would touch it because it is very open. What you need to do however is
Get a copy of the calls use pcap and
check your firmware with the standard HTC firmware
this will show you what the phone call is doing and will help the android community overall (improved security)
Also programmers do not try to add backdoors they try to have a good product it is the hacking/security teams of _________ that do that. This being a programmer myself.
Hi!
During the last 6 months I've had a real problem with my online security. Bought a MacBook Pro which turned out to have had a root virus installed, infecting my Wi-Fi and thus all units who connected to it.
Took me a while to figure out...
First I had a brand new, out of the box Xiaomi MI 9 that got rooted OTA and I lost admin privliges etc.
From my experiences with that and from what I could gather I think it might have had something to do with this cloak and dagger virus thing, overlay and ****ing permissions hidden and yeah I really dont know, anyway.
Today I still worry about what happened. I know much is irrationell since I no longer have any Wi-Fi, instead I use unlimited data and got my self a new Oneplus 7T.
Not even enabled developer options nor touched the bootloader or usb debugging.
When I first bought it, (I had not been able to browse the internet nor search the info before bc of above) I ofc asked the store if they had any type of deal or knew of for a reliable VPN.
Unfortunatley, due to my lack of research, being locked out of my mail acc etc I ended up with a second license of Mcafee Internet security vpn, proxy.. (Probably have around 10-15 of those, containg True key and virus protection)..
This is where my fear comes in again.
Been trying to find an answer to this but I can't find enough to have piece of mind, or my 6 months "rehab" from the internet and technology made me a noob at googling.
Bear in mind, I also have and had Malwarebytes Premium, now I also use ExpressVPN instead of Mcafee. (Though I think I'll take advantage of this life time deal on Ivacy VPN today.).
Back to my first fear.
- Mcafee Internet security + Malwarebytes.
As mentioned I lost my mail accounts. Lost or lost, I reclaimed them and eventually locked them with a Yubico key.
Trying to retrive the Gmail on my new device I could swear my menu altered and Android all of a sudden allowed other users, ("All users get their own space, acc, etc").
Still having PTSD (how I refer to it) after this spring I wiped it all, didn't use it for a week, wiped it some more, hahah, and I begin to use it again.
I changed pass, added Yubico key, log out of all devices nor do have anything worth stealing. I wonder If there is anything I'd might have missed?
Ex, might be of topic.
When I try to restore my messenger password. I get the mail, enter the code and proceed to change pass when the code no longer is valid, permission #200 something. This ofc gets me thinking that my mail somehow might be forwarding my mail, syncing them? Gdrive have previously been set to auto sync and then I've unknowingly loaded malware in previously used phones.
I'll to summarize my question.
I guess I wonder if it could be dangerous in somehow or possible to install something on my new device through Gmail if I decide to log in again? Just saw my fb acc is schuduled for delete tommorrow, which is why I'm posting here, could use some advice.
While I'm at it I also am curious if there are any good info regarding Android security. Because I would like to flash a new rom without all bloatware, Google stuff etc and keep reading about safetynet and Selinux.
Also, good tip if there any on how to disable ssh, sftp, stf and all that? During this that happened I also found Samsungs Knox good, probably bc it wont work with overlay? Are there anything similar to Knox for a Oneplus? Many questions in one but I also wonder; I know that I once used my NFC security key one the Xiaomi, when it was infected. Could the key somehow been copied? Might be a bit over cautios,
0
So far he has deleted all the bookmarks that I saved from this site. The phone RCS doesn't work anymore. They can listen to phone call and terminate them and spoof incoming calls. I sent one phone to Samsung to be reviewed. At the end of 3 week review they sent me a check for the phone and I bought another one from ATT and I still have this problem. So I would appreciate it if someone could give me some direction for this Flip 3. I like the phone. I am a engineer and designed a few devices using ESP32's. So I know how to flash. I just need to lock this phone down and I will deal with the computer problem later...
Infections across multiple platforms is almost unheard of... what did Samsung find?
It isn't an infection. They are exploiting both devices. I run Norton 360 on both systems. It only slowed them down. And they are 24/7 on me like ex NSA. They haven't stolen anything but they are malicious. Samsung never said. The only thing that said is to buy a different phone. ATT has a open fraud case open because they saw the Tag phone and I changed the phone number several times like some drug dealer with different sim cards.
I feel like I am in the movie Enemy of the State except I am Will Smith and Gene Hackman rolled up into one.
cjdee1 said:
It isn't an infection. They are exploiting both devices. I run Norton 360 on both systems. It only slowed them down. And they are 24/7 on me like ex NSA. They haven't stolen anything but they are malicious. Samsung never said. The only thing that said is to buy a different phone. ATT has a open fraud case open because they saw the Tag phone and I changed the phone number several times like some drug dealer with different sim cards.
Click to expand...
Click to collapse
AT&T has an open fraud case on you... or "them"?
Did malicious things? Losing bookmarks is pretty common and usually has nothing to do with being hacked.
Change Google account and password.
Reset all other accounts the same way on a clean Android. Allow no one physical access to the device and most importantly be careful what you install and download.
Most users don't need a hacker to stalk them; they do it themselves by careless installs and downloads. I'll remind you that XDA is a site filled with hackers... mostly peaceful.
I'm sorry for your troubles, most days hacking isn't needed. Really to get into someone's account these days you need personal information which is freely givin on social media and whatnot. You should get with Google and do a massive security checkup. Change password turn on 2FA...the whole swizzle. If all else fails, create a new account completely separate from the affected account/device and start fresh
I opened the Fraud case. They provided the documentation. This has been going on since last year. There was a white paper that came out in November how the media player was being use to hack in. I deal with this problem every day. One would think they would give up. I have another 20 computers in my office that I am replacing once I get my end under control.
Hmm... maybe move all your info to a new account (make the account on a different IP address so like have a friend make it maybe) cuz from my understanding- the hacker finds you on even a new phone? delete the accounts that are being hacked and uh- idk what else really
delete the apps that are being infected
Purge everything from everywhere and start fresh. Honestly Norton and other programs for virus protection aren't really helpful anymore. I do not see a point in using them when Microsoft does a great job just on their own. It's possible that it could be the cause most of the time anti-virus programs that aren't part of the main OS are the problem
Also another note, anything with a Snapdragon and made for the US is locked down. Means no flashing no anything. Best bet for a device us find a good old phone that has a lot of support and flash anything on it
Dr.Lost said:
Also another note, anything with a Snapdragon and made for the US is locked down. Means no flashing no anything. Best bet for a device us find a good old phone that has a lot of support and flash anything on it
Click to expand...
Click to collapse
If you go below Android 9 you will introduce a slew of high risk vulnerabilities including some the worst rootkits. If you're really concerned use the latest version of 12 with fully active scoped storage and the mess that it is...
In general don't use wifi on Androids.
Keep bluetooth off if not using.
Install only vetted apps. Scan with online Virustotal.
Keep all downloads in the download folder until vetted. Scripted malware jpegs, pngs are real and may evaded conventional detection. If they get into a database they will raise hell until deleted; open all jpegs in download folder before transferring them and check for changes in that folder
Keep all email in the cloud, avoid downloading any attachments unless absolutely necessary.
If malware is suspected, delete it or factory reset within 2 hours. Reset passwords.
Time stagger backups so they don't all get infected if there is an incident. Backup redundantly to 2 or more hdds that are physically and electronically isolated from each other and the PC. Use only a known clean PC to access those backups... cross platform malware jumping is rare, cross drive jumping is not.
blackhawk said:
Infections across multiple platforms is almost unheard of... what did Samsung find?
Click to expand...
Click to collapse
Unheard of? Absolutely not, rare on a cell phone, maybe? I don't know really but it is possible especially if OP pissed off the government
Good luck OP
When it comes time to switch to a new phone, ATT should be moving you to a new account with a fresh SIM. Don't transfer anything. Install anything you had fresh and set it up fresh. If they are giving you a new SIM or attaching the new phone to the same account and someone gained access to the account, they're still being fed every new number and IMEI.
As for pictures and stuff, get a USB-C compatible hard drive. Move it to that. Make sure your virus scanner on the computer is updated and either yank the LAN cable or turn off the router before connecting and scanning it. Once it's clean, connect the drive to the new phone and not the computer.
Sounds like someone cloned your ESN and SIM based on what they were doing. Synced items could be manipulated through a PC hack and one good run of the right software with your phone on the same network made it a phone issue.
Oh, and if they didn't or don't already do it, make sure ATT logs your previous devices "lost or stolen" to blacklist the IMEI. That should also make a clone useless for as long as it's a clone.
if you are suspecting a hack, then report to samsung members app > get help > error report asap for help from samsung's hacking issue team
luigi90210 said:
Unheard of? Absolutely not, rare on a cell phone, maybe? I don't know really but it is possible especially if OP pissed off the government
Good luck OP
Click to expand...
Click to collapse
If you download malware files a PC is suspectable to, yes, but generally an infection on an Android doesn't cross platform infect a PC.
It's important to nip any malware in the bud and to isolate that device immediately to limit damage. Any device with malware that I can't erraticate completely within 1 to 2 hours gets nuked, data and all, factory reset. Data is restored then via offline backups.
My PC never has internet access and that's one less huge vector for infection. Even then my backup data drives are isolated from the PC unless in use... multilayered security.
If the DOD, AEC, FBI etc are interested in you, you'll never know it unless they want you to know. When on stake out they always operate as teams. One team is high exposure to gain maximum information and maybe detected but a second picket fence approach team is already in place if the primary team is exposed. Of course they share all knowledge gleaned. The second team you will likely never detect.
Fun fact; field FBI Agents blend in, can be wearing blue jeans, orange vest, 3 piece, anything but low key and drive midrange priced cars that are slightly dirty. The way you ID them is by their behavior and at times location.
If you're not on their menu they may even have a benign friendly conversation with you. They are interesting to chat with.
There is an app on the phone com.qualcomm.atfwd Is that a valid program for this phone. I got my old CDMA phone up on t mobile I had the data turned off because it was useless to me. I came back home and I saw the 2 forks moving. The data was turned on and Norton firewall blocked entry and I had the wifi in airplane mode on the computer. Now I have skills, the average person would never know. This is why I need a phone that I can lock down.
I believe it started with the phone and then I used samsung pc software which hacked the computers that I used. I have all the 25 zip files from one phone before it got a change to load. Anybody interested in them?
The phones have 422 files installed.
cjdee1 said:
There is an app on the phone com.qualcomm.atfwd Is that a valid program for this phone. I got my old CDMA phone up on t mobile I had the data turned off because it was useless to me. I came back home and I saw the 2 forks moving. The data was turned on and Norton firewall blocked entry and I had the wifi in airplane mode on the computer. Now I have skills, the average person would never know. This is why I need a phone that I can lock down.
Click to expand...
Click to collapse
WiFi Screen mirroring.
cjdee1 said:
There is an app on the phone com.qualcomm.atfwd Is that a valid program for this phone. I got my old CDMA phone up on t mobile I had the data turned off because it was useless to me. I came back home and I saw the 2 forks moving. The data was turned on and Norton firewall blocked entry and I had the wifi in airplane mode on the computer. Now I have skills, the average person would never know. This is why I need a phone that I can lock down.
I believe it started with the phone and then I used samsung pc software which hacked the computers that I used. I have all the 25 zip files from one phone before it got a change to load. Anybody interested in them?
The phones have 422 files installed.
Click to expand...
Click to collapse
Interested in potentiality infected files?
Wanna do malware jpeg swap?
Seriously... scan them with online Virustotal.
I guess that could start over as a last resort. The funny thing is I don't do anything illegal. Who ever it is will be wasting time and costing me time. I am sure they are getting screenshots but I don't think that they do it live. On the PC I have zero'd out the drive but the bios is another way. It started when I backup the phone using different computers on my network.
cjdee1 said:
I guess that could start over as a last resort. The funny thing is I don't do anything illegal. Who ever it is will be wasting time and costing me time. I am sure they are getting screenshots but I don't think that they do it live. On the PC I have zero'd out the drive but the bios is another way. It started when I backup the phone using different computers on my network.
Click to expand...
Click to collapse
Is the router updated and secured? Lock it down even if you need help to set it up.
On the PC you should try to ID what the malware is and make sure the databases are clean of it before reloading. Protect all backup drives until the PC is known clean.
The bios can easily be reflashed.