Table of Content:

Table of Contents

 

 

Social media is a place where hacks can take root. We share our lives there and any attentive person with malicious intent can use that information to piece together enough material to turn our lives upside down.

Problem - SOCIAL MEDIA GOT HACKED

One of our clients had a tragic event that had started on Facebook. She was badly harassed and humiliated with her private information. She wasn’t sure why someone would do this to her. She had always been proper and kind to everyone around her. Even to the people who were strangers. Her social life, online or offline, both had been great, with many friends and well-wishers. Being pretty, she was quite famous to guys, many of whom wanted a piece of her. But she maintained her personality and carried herself in a way that simply put some of them off in the wrong way. The problem started there.

 

 

At first, all of her social media got hacked: Facebook, Instagram, and WhatsApp. And they or someone did it in a way that she noticed nothing suspicious. But the criminals were watching and recording her every message of her chats, posts, private photos, and videos. They also got access to her browser history.

Her folks came to us distraught and not knowing how to deal with this new-age problem.

Solution

We knew the severity of the problem at hand and swiftly tried to figure out how the hackers got access to her social media. They used a keylogger and spyware to do their dirty work. It was a felony. 

First, we secured her emails, social media accounts, and devices. Along with that, we gathered enough evidence to file formal complaints and bring charges to the perpetrators.

Result

With permission from the client, we handed over the evidence to the law enforcement agency.

TechForing has always put the client first and built lasting relationships wherever possible. Learn more about our personal cybersecurity services here.

RELATED POST
...
WHAT IS CRYPTOJACKING AND HOW…

Cryptojacking refers to the unauthorized use of a person’s or group’s processin…

...
DATA THEFT & ONLINE SCAM- COM…

Our victim here is MR, who had checked his emails one night before going to bed…

...
CASE STUDY ON PENETRATION TES…

This case study on Penetration Testing is about one of our clients who had an a…

...
PRIVACY COMPROMISED- SOCIAL M…

Where you socialize, that’s where they hit hard. We secure your social media an…

Get Updates

Sign up to receive the latest news