So, someone got admin access to my home machine a few weeks ago. I believe they were able to do it through RDP, and somehow changed my admin password hint to display the password in plain text.
They installed a keylogging program (kidlogger) and a search program (Everything). They searched for and found some cryptocurrency wallets on my machine, but they're outdated and empty. They also were able to log my log in credentials to kraken.com AND more disturbingly, my Roboform master password.
I've logged in to all of my financial accounts from a secure machine and changed the passwords, nothing seems to be missing. I changed my roboform masterpass via my android phone on LTE last night.
Just wondering what advice anyone can provide for next steps. This is a terrifying experience.
I plan on contacting my creditors just to inform them of the intrusion. My big concern is that they may have left something on the router/modem, since that admin password was also compromised.
Currently, my system is offline at home--I pulled the boot drive and dumped the keylogger logs on a Mac. I also copied the user folders that were made by the intruders. Is there anything else I should grab off the compromised drive before I do a low-level format? I'm concerned about what they may have been doing online with my ip.
They installed a keylogging program (kidlogger) and a search program (Everything). They searched for and found some cryptocurrency wallets on my machine, but they're outdated and empty. They also were able to log my log in credentials to kraken.com AND more disturbingly, my Roboform master password.
I've logged in to all of my financial accounts from a secure machine and changed the passwords, nothing seems to be missing. I changed my roboform masterpass via my android phone on LTE last night.
Just wondering what advice anyone can provide for next steps. This is a terrifying experience.
I plan on contacting my creditors just to inform them of the intrusion. My big concern is that they may have left something on the router/modem, since that admin password was also compromised.
Currently, my system is offline at home--I pulled the boot drive and dumped the keylogger logs on a Mac. I also copied the user folders that were made by the intruders. Is there anything else I should grab off the compromised drive before I do a low-level format? I'm concerned about what they may have been doing online with my ip.