Hi
I have a friend of a friend (really its not me) that's been hoaxed into allowing someone remote into there machine been taken to a website and basically forced by blackmail to enter their details in on a website; no doubt that would included their CC number.
I'm sure this has been posted loads of times before, I'm more interested in the tech that they used, as they are worried that the person will take over they machine again. As I have never had it done to myself, what system do they use to remote in to the end user? For example; RDP, Terminal Services, Team Viewer. Do they add any spyware on to the machine for future access? Or create any remote login accounts?
I'm not interested in blackmailing anyone myself, I just want to tell them how to check their machine so that the other person can't remote in again, so far since the info is 3rd hand, I just said backup data and format/reinstall.
Thanks in advance.
I have a friend of a friend (really its not me) that's been hoaxed into allowing someone remote into there machine been taken to a website and basically forced by blackmail to enter their details in on a website; no doubt that would included their CC number.
I'm sure this has been posted loads of times before, I'm more interested in the tech that they used, as they are worried that the person will take over they machine again. As I have never had it done to myself, what system do they use to remote in to the end user? For example; RDP, Terminal Services, Team Viewer. Do they add any spyware on to the machine for future access? Or create any remote login accounts?
I'm not interested in blackmailing anyone myself, I just want to tell them how to check their machine so that the other person can't remote in again, so far since the info is 3rd hand, I just said backup data and format/reinstall.
Thanks in advance.