Experienced a breach via the infamous “Test my game” scam—what steps should I take next?


Dealing with a Hacking Incident: A Personal Experience and What to Do Next

In the digital age, threats to our online security are more prevalent than ever. Recently, I experienced a hacking incident that stemmed from a common scam known as the “Test my game” approach. I wanted to share my experience and the steps I took to address the issue, both as a cautionary tale and as a guide for anyone who might find themselves in a similar situation.

The Incident

It all started when I received messages from two long-standing Discord accounts, which I have known for years. Despite my instincts telling me something was off, I foolishly downloaded a file labeled as a game for testing purposes. The result was swift and alarming: shortly afterward, a third account contacted me with a screenshot that showed my Google account logged in on their device.

Immediate Actions Taken

Realizing the severity of what had occurred, I took immediate action to contain the situation. Here’s a summary of the steps I followed:

  1. Isolation of Devices: I disconnected my main PC from the network and logged out of all other devices linked to my Google and Discord accounts.

  2. Password Resets: I promptly began resetting my passwords across various platforms. Since my saved passwords were stored in Google, I prioritized securing those accounts.

  3. Two-Factor Authentication: To bolster my account security, I enabled two-factor authentication (2FA) wherever it was available.

  4. Operating System Reinstallation: After isolating my PC, I performed a clean installation of Windows 11. While this action wiped the primary drive where the OS was housed, I knew it might not be sufficient if malware resided on other drives.

  5. Malware Scanning: I ran a comprehensive scan using Windows Defender and planned to install additional antivirus software, such as Avast and Malwarebytes, to ensure my system was thoroughly checked for potential threats.

  6. Network Security: As a precaution, I kept my PC offline while I sought further assistance in analyzing the malware I encountered.

Seeking Further Assistance

For those curious about the potential malware involved, it’s reportedly hosted on oblivora dot com. If anyone has expertise in safely investigating malware, your insights would be incredibly valuable.

Additional Precautions and Considerations

While I have successfully taken several steps to secure my systems, I am contemplating whether a complete wipe of all drives is necessary. If so, I am seeking recommendations for effective tools

Share this content:

One Comment

  1. Hi, thank you for sharing your detailed experience. In situations like this, it’s crucial to take comprehensive steps to ensure your system’s security. Besides the actions you’ve already taken, here are some additional recommendations:

    • Backup Important Data: Before performing drastic measures like wiping all drives, ensure you have backed up essential files to a secure external storage or cloud service, preferably after scanning for malware.
    • Full Disk Encryption: Once your system is clean, consider enabling full disk encryption to protect your data from future unauthorized access.
    • Use a Firewall and Network Monitoring Tools: Implement network monitoring to detect suspicious activity and configure your firewall to restrict unauthorized inbound/outbound traffic.
    • Update and Patch Systems: Ensure your operating system and all software are up-to-date with the latest security patches.
    • Secure Your Accounts: Change passwords for all sensitive accounts, enable multi-factor authentication, and review account activity logs regularly.
    • Consider a Professional Security Audit: If you’re unsure about malware persistence or system integrity, engaging a cybersecurity professional to perform a thorough audit can provide peace of mind.

    Regarding tools for a full wipe, options like Clonezilla for disk imaging or dedicated

Leave a Reply

Your email address will not be published. Required fields are marked *