PlzHelpANewbie / MacAttack-

0 stars 0 forks source link

Please help this newbie! #1

Open PlzHelpANewbie opened 6 months ago

PlzHelpANewbie commented 6 months ago

Hello! I became to love coding, cyber security and want to change careers.. looking for schools and have bought every book out there. The reason my love has grown is because 5 months ago, my 2017 Mac was completely taken over. I put up a good fight but I lost in the end after they ended up taking over my admin, files, apps then finally adding a firmware passcode and preventing me to go into recovery mode. It was actually pretty draining and traumatic. So I got a new Mac, a brand new MacBook Air m2 chip. This person got into this Mac in 2 weeks. I knew what to look for and noticed it right away. They are remotely getting in through my router. Which will be replaced by the latest router att has with WiFi 6 and better security. They are also in my iPhone, took over my yahoo mail, my Amazon, ca t get on the internet through safari but am able to use DuckDuckGo. I have called Apple and showed them the extent of it all and they told me it was so bad for me to call the cyber department of the fbi but I know I can get through this and I need y’all’s help. This has become something I am passsionate about and refuse to back down. So here it is, I have erased my SSD GUID partition 3 times so far. Which is supposed to delete the McIntosh and data and other containers also. Every time I start over m, the partitions disks and containers all are in the same place, named the same as before (Apple SSD, container disk 3, Macintosh HD Volumes, Macintosh HD then Macintosh Hd screenshot and Macintosh HD data. All but the Apple SSD of course all have the same errors which allows this person to just start over. I will include pictures. These new messages in the first aid history were never there until they got ahold of this Mac. Does anyone know how I can completely wipe this thing out without destroying the Apple SSD and finally get it back to brand new settings with no stranger tormenting me? There are Pegasus files, hundreds of different plug ins, web chunks, they change my photos, even send me screen shots of their laptop but it looks just like mine, same screen saver and all. It’s crazy and creepy! Files of fake icons they made, all my call logs, messages, just everything. Please help! They all say the same as this first aid run. Thank you for listening and helping in advance!

image image image image

PlzHelpANewbie commented 6 months ago

image

PlzHelpANewbie commented 6 months ago

image image image image