Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works


  • Please log in to reply

clueless rabbit

clueless rabbit

    New Member

  • Member
  • Pip
  • 1 posts
Hi everyone. I am new here, and you can safely assume I am completely clueless. I am so clueless that I am not even sure if it is the right place to post my problem.

1) We are NGO in Hong Kong. And recently being targeting (email attack). The sender purported to be one of our teammate ( it's easily done), the subject header in the email is also tailor made, i.e. 'financial report' was sent to the financial teammate; 'legal matter' was sent to the legal teammate. I am sure you all know how it works. And our antivirus software detect the abovementioned trojan in the attachment. It's block, and we are safe, presumably. What we cannot find out is what this particular trojan is planned to do. The internet only gives general description.

Please kindly help by teaching us what this particular trojan is?

2) Next thing is, one of our teamate's MAC cannot connect to the internet. And we ask tech people to help but all in vain. Finally we call the service provider and find out something was installed at the switch board to hack the email from one of our heads. The service provider tech person says the things that had been installed cos the Mac problem (obviously, the bad guy didnt know one of us use Mac) . That's how we find out the hacking. My question is, what's next? what should be do after finding this out?

Thank you very much. Your help is deeply appreciated, as a NGO we do not have funding to pay for expert help everytime( our money needs to be spent on the needed).
  • 0


Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP