Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Concerned about advanced cyber intrusion Possibly linked to stripchat…. Need expert insight.
- Hey everyone,
- I’m seeking help and expert insight regarding a complex cybersecurity issue I’ve been facing. Over the past few months, I’ve experienced unusual and persistent intrusion attempts across my entire home network, phones, IoT devices, and computers.
- It started when I noticed suspiciously high outbound traffic from my PC while browsing Stripchat. Upon further investigation with VPN logs and network tools, I observed irregular activity that suggested the possibility of spyware, loggers, or even more industrial-grade surveillance tools being used.
- What deeply concerns me is that once I began documenting this activity (including recording network anomalies and gathering logs), the intrusions became more aggressive. It felt targeted…as if the attackers realized I was collecting evidence.
- Some disturbing things have happened: • Strange activity across multiple devices, even after clean OS installs. • Persistent exploitation attempts through Bluetooth and Wi-Fi. • Suspected piggybacking off IoT devices. • Multiple requests for Bitcoin from individuals who appeared to be part of agency-like entities or model managers on the platform. • Network persistence that seems beyond typical malware—possibly indicating use of advanced tools not common in consumer-level cybercrime.
- I want to be clear: I did nothing illegal. I was simply browsing a public site, and I believe what’s happening now is an effort to silence or intimidate me after they assumed I had Bitcoin stored locally (which I don’t).
- I’ve been working hard to lock everything down and gather digital proof without exposing myself further. I haven’t posted all my evidence yet, as some files are still infected and unsafe to share.
- I’d really appreciate any feedback or guidance on what I might be dealing with here. Have others experienced similar situations? What’s the best way to share infected logs safely if I decide to escalate?
- Thanks for reading, and stay safe.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement