Just interested to know the community's view on my situation.
About two weeks ago I was the victim of a cyber attack. It all started immediately after my mobile phone number was illegally SIM swapped see previous post. Within minutes of this occurring, the attacker was able to reset the passwords to several of my bank accounts (we are all vulnerable to this type of attach unfortunately). The good news is that all banks were able to thwart the loss of any funds fortunately.
But here is the rub. I was able to get all my online banking backup and operating with minimal effort. However, one bank is making it much more difficult to reinstate my internet banking. They told me that they wanted a written statement from my telco explaining, how the attack occurred, when it occurred and that my number was safely back in my hands and safe from future attacks. They also wanted screen shot scans of Malwarebytes and Trend Micro internet Security scans. Finally, that I had changed my email password. I now use BitWarden password manager on all bank related logins with 12-16 character random alphanumeric strings including symbols! So, I complied to my banks request and sent all the information that they requested.
However, it now turns out that this is insufficient for them and they want to change the goalposts again. Now they want me to take my computer to an "professional IT person" to have it scanned. I told them that I have what I think are above average computer skills since I code in Linux and have used Windows platforms for all of my professional career. I even offered to allow them to remote in to my computer, under my supervision, so that they can run their own suite of programs. They said they could not do that and insisted on an "IT professional scan". I put it to them that if they want me to do this then they reimburse me for out of pocket expenses-they said they are considering that.
Now, I know that a lot of you out there that read this forum have pretty high computer literacy skills compared to the masses (otherwise you probably wouldn't be reading this forum, right!!).
So, can you educate me as to what skills/programs/antivirus scanners etc that an "IT professional" would/could use or have access to that I could NOT do/obtain or use myself?
Some things that I'd like to share:
Having above average computer skills and coding doesn't necessarily correlate with having a good understanding of computer security and vulnerabilities. Many programmers focus on some areas, and they have no clue about other areas (e.g., security). I've seen many programmers minimising the risks, and "specialists" installing questionable antivirus software to protect computers, without understanding the kind of protection that is being offered, and the risks left behind.
Unfortunately, the same applies to "professional IT persons". Again, I've seen many of them completely neglecting security issues and doing what I mentioned above.
Having a completed scan using Malwarebytes and Trendmicro doesn't prove anything. Using questionable antivirus software and feeling safe is sometimes worse than not having anything installed and being aware that the computer is at risk.
Just to put into context, I am not an IT professional, but I have this weird hobby related to virus and antivirus, and I've "worked" with some security companies. Some are great, others are ridiculous and invest more in marketing than research.
Therefore, having your computer checked by "a professional IT" is not a solution. Your bank wants to share the responsibility, so they can justify whatever happens in the future with "we've done everything that we could, including forcing the client to have the computer checked by a professional". The IT person will only be able to provide a report saying that your computer has been scanned for virus, which doesn't mean there are no viruses there. That's very Australian… Someone just needs a statutory declaration and a signature to justify whatever they want and transfer responsibility to someone else.
Just a quick example*:
https://www.virustotal.com/gui/file/1d73c758e7f13927d4f6516b…
Things like that happen all the time. The file was not scanned by some AVs because it's "js", but many scanned and found nothing, meaning that most computer are vulnerable to this particular threat, which might be around today.
When samples (malicious codes) are sent to the security companies, some of them analyse and add the code to the database in minutes or hours. Others take days, weeks, months, or never do. Each AV maker has different policies and respond based on the risk level.
Then, the user must update the software so the code can be identified and blocked. If the AV software is misconfigured or not updated, the virus will bypass and can do whatever it's been designed to do.
Well set-up firewalls might block the virus from contacting the internet, but they also have to be configured.
And before the "use Linux" bs, replacing the OS is not a solution for most users and companies that depend on Windows or Mac for compatibility.