Email compromised, keylogger suspected

Recommended Videos

Jux

Hmm
Sep 2, 2012
867
4
23
So, twice this year I have gotten calls from friends asking about the weird email they got from me. After the first time, I changed my password and security questions. After the second time, I changed my password and security questions, and have since only used the on screen keyboard to type in my passwords. No further weird emails, as of now, so I suspect that if I have a keylogger, it is not the screenshot-on-clicking type.

I bought malwarebytes, but the search came up clean. My virus protection is Kaspersky. I've done searches of all my running processes against a list of known malware, no dice. Any advice fellas?
 

Albino Boo

New member
Jun 14, 2010
4,666
0
0
Do you use the same password for other things? If the password gets compromised elsewhere, they will have your email and password, so its easy to log on as you.
 

OneCatch

New member
Jun 19, 2010
1,110
0
0
Yeah, above response sums it up. If you've got AV (and Kaspersky is decent) then it's unlikely it's the computer itself. Try a full scan with all detection settings at maximum just to be sure.
Have you logged in on any other computers? Because my email was compromised by using a friends computer which it turned out had a virus.

Change any passwords which are the same elsewhere (so that all your passwords are different), and try using a more complex password just in case it's being brute-forced.
If you have the 'forgotten password' thing on that email account linking to another email account, change the security on that one as well.
 

Jux

Hmm
Sep 2, 2012
867
4
23
Negative, I have unique passwords for anything I do online. I also change them up about once every 6 months as a precaution anyway. All of my PW are written down on paper to make things easy, I keep it in a water/fire proof lockbox.

edit: I have accessed personal email from work before, though I doubt it was compromised there, our network is pretty secure. And I don't have it linked to any other email accounts.
 

DoPo

"You're not cleared for that."
Jan 30, 2012
8,663
0
0
Yes, password reuse is a huge one issue with security. I'd suggest changing every password on every site and service you use. I know this sounds a bit daunting, but it doesn't need to be - you can just have variations of the same password, so if you use password123, then you can do password123esc for the Escapist or something along those lines - just have a little bit of variation. An even better idea would be to use sentences as passwords, so instead random symbols, you'll have something easy to remember


So you can have "This is where I watch Yahtzee" for the Escapist and "I send people stuff" for the email and so on (throw in puctuation and/or a number if it needs to pass the password validity check) - it would be easier to remember for sure. Well, as long as the website/service supports long passwords which, in my view, absolutely everything should, there is no excuse to limit them to 6-13 characters or whatever.

Also, it would be a good idea to secure your connection. If you're on wireless and don't have a password yet - well, put a password. Also, use HTTPS for the websites. If you're on Firefox or chrome, there is HTTPS Everywhere addon [https://www.eff.org/https-everywhere] made by a collaboration of Tor and the EFF. You know it must be secure if those are involved. Do not that I have had some issues with it. Very small and very few but I'll give you the heads-up: the first time, it occasionally loaded some pages really slow and even hang on loading them. No real pattern to when it would or wouldn't do it and a reload of the page fixed it but it was annoying. This issue went away after I updated the addon (doesn't update automatically, since it's not from the Mozilla website) - I suspect it may have been a clash with one or more of my other addons, though. The second issue I had with it was recend, in fact, two-three weeks ago - my browser wouldn't load YouTube videos (at least the ones embedded elsewhere, like on the forums, it worked on YouTube itself) but turning off HTTPS for YouTube helped.

So, I wouldn't take it for granted you know what HTTPS is, so I'll throw in an explanation but look at the URL for the page and you'll see it's http://escapist... (well, unless your browser hides that from you) same with other websites. Simply put, normally, you communicate with a website using HTTP an acronym you can look up if you need, but doesn't matter right now - it's how you exchange information. But HTTP is vulnerable to being tapped, as everything is sent over the network in plain text. Ok, maybe with the exception of passwords but overall everything else is plain text. HTTPS stands for "secure HTTP" - it encrypts all communication to and from websites, so it's a lot harder to listen in and capture information. Not all websites support it, though - the Escapist doesn't, but you can go to https://google.com for example and they do.

What HTTPS Everywhere does is...pretty simple when you get down to it, it basically replaces all http://whatever.com with https://whatever.com, not only for the URL you visit but also all resources that website loads, like JavaScript, CSS, images, etc. That's pretty much it. Well, or attempts to replace them, as I said, not all websites support HTTPS so, more or less, if that fails, it would fall back to the default. Occasionally you may hit issues, as I described or you may have some websites loading a bit slower as it first tries to load resources over HTTPS, fails and tries the default option, too. But I've had only two issues over the last 3 years I've used it, and the loading time isn't that slow - it would be a couple of extra seconds or so at most.

With that said, you say you've tried MBAM but I'd suggest you try out other tools, and MBAM again, and do it through Safe Mode, to be sure. When you boot up the machine, press F8 when the option comes up (it would be some time before the Windows logo appears) and choose "Safe Mode with networking" from the list. Then install the software and run the scans. Also try Absolute Keylogger Removal Tool [http://download.cnet.com/Absolute-Key-Logger-Removal-Tool/3000-8022_4-75447038.html] (free version is scan only but give it a go, you can just use something else to remove the malware if needed) and Spybot: Search & Destroy [http://www.safer-networking.org/]. Alongside with MBAM.

Out of interest, what emails did your friends receive? It may help track down if it is likely to be a keylogger or not. Also, are you sure they got the emails from your account? Because it may have just been a forged email. If they keep the emails, you can try looking at the headers for anything weird or, if you're OK with it, post them here.
 

OneCatch

New member
Jun 19, 2010
1,110
0
0
Jux said:
Negative, I have unique passwords for anything I do online. I also change them up about once every 6 months as a precaution anyway. All of my PW are written down on paper to make things easy, I keep it in a water/fire proof lockbox.

edit: I have accessed personal email from work before, though I doubt it was compromised there, our network is pretty secure. And I don't have it linked to any other email accounts.
And given how you're obviously security conscientious, I assume they're reasonably complex alphanumerics...
In that case it is weird that it keeps happening.

Try the virus scan just to be sure, but if nothing shows it might be worth contacting the email provider and see if they have any recommendations. I can't really think of much else.
 

Vegosiux

New member
May 18, 2011
4,378
0
0
OneCatch said:
Jux said:
Negative, I have unique passwords for anything I do online. I also change them up about once every 6 months as a precaution anyway. All of my PW are written down on paper to make things easy, I keep it in a water/fire proof lockbox.

edit: I have accessed personal email from work before, though I doubt it was compromised there, our network is pretty secure. And I don't have it linked to any other email accounts.
And given how you're obviously security conscientious, I assume they're reasonably complex alphanumerics...
In that case it is weird that it keeps happening.

Try the virus scan just to be sure, but if nothing shows it might be worth contacting the email provider and see if they have any recommendations. I can't really think of much else.
Spoofing, maybe? I mean, I've got weird mails at a time from myself and checking the account activity, no logins were suspicious at all. And computer was clean, and passwords are decently strong...
 

Jux

Hmm
Sep 2, 2012
867
4
23
OneCatch said:
Aye, alphanumerics with no actual words, and random capitalization. I'm pretty paranoid about identity theft.


Vegosiux said:
Spoofing, maybe? I mean, I've got weird mails at a time from myself and checking the account activity, no logins were suspicious at all. And computer was clean, and passwords are decently strong...
I considered this too, but I haven't gotten any calls since my last security measures regarding emails sent by me. It could be coincidence. In any case, not really sure what I would do if they were spoofing.
 

Albino Boo

New member
Jun 14, 2010
4,666
0
0
I suspect its one of two things.

1. Someone got into your account once and is using your contacts list for a phishing attack by spoofing your address

2. One your friends is spoofing your email just to wind you up.

If you can get the emails and check the headers, its the only way forward at this point.
 

DoPo

"You're not cleared for that."
Jan 30, 2012
8,663
0
0
Jux said:
OneCatch said:
Aye, alphanumerics with no actual words, and random capitalization. I'm pretty paranoid about identity theft.
I should mention that in reality, this kind of password is no better than "Banana ice cram eating proves sufficient." In fact, it's more insecure in many ways. If you're trying to protect yourself from a person guessing a random word you like, that's not a real issue. Unless you use your pet's name, or something, of course - "marmalade" is not real different from "m4Rm/-\lD3" they are both pretty difficult to guess. The difference is that the latter is a lot harder to remember and type, too. At the same time, a sentence is easy to remember, and really hard to guess. Pretty much impossible if you just throw in very little logic (externally, to you it may make more sense). If you're protecting yourself from a dictionary attack, then a sentence is pretty impossible to crack. Well, the same with a random collection of symbols...unless it happens to be a word in a different language[footnote]my university password policy is EXTREME in that regard, I managed to hit several words that were in other languages without even knowing...and the passwords were rejected... took me 20 minutes to find a suitable password that's not in (apparently) French, Czech, Welsh or who know what else.[/footnote] but the sentence still wins in being easy to remember, you don't even need to further expose your password to risk by writing it down. Or you could but you can just include some memorable information "What do I do in the summer?" or "Biceps" for an acronym. And if you're protecting yourself from brute force attacks, then a sentence is millennia away from being cracked as opposed to any shorter password. Literally millennia away, as it could seriously take 1000 years or more (in theory) of computation to crack it[footnote]Although if talking theory, it might be faster for a potential cracker to exploit Moor's Law, so if, assuming, the task would take 1000 years to finish, they can just wait 500, then get the new and better hardware available, and run it for only 250. Although, I think we can both agree, hackers rarely have so much free time. Also worth noting that they are more likely to get to a hash collision than just bruteforce a sentence. Though a hash collision is still pretty fucking hard to achieve.[/footnote]. If you're protecting yourself from a random person peeking over your shoulder, then just cover the keyboard with...anything. Anything really - your coat, your body, a box - whatever, anything would be better than increasing password complexity.

Thing is - if somebody is going to steal your password it wouldn't really matter for them if you had it as "2hL9qCPqryXFprg" or not. Well, unless they watch you type it, guess it, or use a dictionary attack/bruteforce, then they'll actually need the password. Option one is to snatch it on transmission by tapping your connection in some way, though passwords tend to be send over securely, so "2hL9qCPqryXFprg" and "acknowledgement" (both are 15 characters, for the record) would look the same - jumbled and encrypted. Option two is to impersonate something, so you give them the password (mostly easy to avoid, though). And the final way to get the password is to steal it from wherever it's stored. The last one is the one you should beware, and even then, password strength shouldn't matter one bit if the password storage is compromised. Worst case scenario is whoever kept your password was stupid and kept it in plain text. Do yourself a favour and if you know a website or service would send you back your original password if you use "forgotten password" (as opposed to offering to reset it to something else) absolutely do not trust the password you give them, make sure it's unique and never reuse it ever. If they can return the original password, it's either in plain text or otherwise not really secured. Competent services encrypt your password using a hashing function[footnote]for the record, that's a one-way encryption algorithm, so if text is hashed it can never be recovered. Hence one-way. In short, "password" the word, hashes to "5E884898DA28047151D0E56F8DC6292773603D0D6AABBDD62A11EF721D1542D8" (using SHA-256) and if you input "password" again next time you log in, it would hash to the same value. The service can then just keep the hash and not your actual password[/footnote] and include salt[footnote]it's just a random other info added to your password to make it unique. So if your user ID is 20 and you add that to the password "password", you get "password20" which hashes to "7535D8F2D8C35D958995610F971287288AB5E8C82A3C4FDC2B6FB5D757A5B9F8" while if a user with user ID 57 has uses the same word for a password, their has would be "5436508FB28E193DA4A51C675D96E1D412D5E2AB3E128E509A27EFCCFF2A9240", so you get two different entries thus even at a glance a potential cracker wouldn't know which passwords are the same or not.[/footnote].

Thus your actual password strength plays no actual role in your security. Long passwords sentences are just as secure as "2hL9qCPqryXFprg" but easier to remember, easier to type and are just plain cooler overall.