this post was submitted on 22 Jul 2023
78 points (95.3% liked)

Technology

59243 readers
3422 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

My wife and I keep getting our debit cards stolen online. We notice the charges and are able to dispute them and cancel our cards, but it sure is annoying.

We don't put our card information on suspicious websites. They're on well known websites like amazon and Facebook.

We ran out emails through a data breach checker and it found nothing.

I don't think there's any malware on our devices.

Any idea what could be happening and how to prevent it?

you are viewing a single comment's thread
view the rest of the comments
[–] nous@programming.dev 5 points 1 year ago (2 children)

Once you suspect a device is infected the only good option is the nuclear option. Anything else will not be guaranteed to 100% remove it, or really, anywhere near close to that, or even detect everything wrong in the first place or after attempted removal. And with a month long period between attacks that is a long time to wait and see to see if any other option might work.

[–] RagingNerdoholic@lemmy.ca 0 points 1 year ago* (last edited 1 year ago)

True, but I would confirm a device is compromised before nuking the OS, not just do it willy-nilly because maybe it could be. A better way to phrase what OP is asking is: what are some ways to troubleshoot this without making a ton of potentially unnecessary work for myself?

...to which I would say, run a netstat on any systems that you can, check those IP's against WHOIS and/or traceroute. Anything that traces to Eastern Europe, Russia, China, most of SEA is a red flag. Dig a little deeper with Wireshark or Glasswire to inspect some actual packets for suspicious content. I think there's a network logger that can trace the process using a given connection, but the name eludes me).

Find your smoking gun, then torch the OS.