goonrunner Posted May 14, 2018 Share Posted May 14, 2018 hey guys, so since my return to osrs, ive only used the osbot/osbuddy clients, yet my main account has been hacked 4 times in the past 3 weeks, i am literally unable to make money/do anything because as soon as my stack hits about 5-6m boom im hacked and its gone, the bastard dropped my fire cape, full recoloured graceful, etc. Just wondering if anyone else has had this happen to them? or am i doing something wrong with my accounts/etc, i virus scanned my PC and all that, no threats came up. (P.S. forgot to ask could this be getting hacked from old RSPS i used to play about a year and a half ago? Quote Link to comment Share on other sites More sharing options...
ProjectPact Posted May 14, 2018 Share Posted May 14, 2018 (edited) It's not OSBot, nor OSBuddy. It is most definitely from another source, such as the one you speak of. P.S - be careful with free scripts that aren't on the SDN Edited May 14, 2018 by ProjectPact Quote Link to comment Share on other sites More sharing options...
luck or skill Posted May 14, 2018 Share Posted May 14, 2018 Have you been using the unofficial scripts? Quote Link to comment Share on other sites More sharing options...
InfinityExists Posted May 14, 2018 Share Posted May 14, 2018 You are more than likely infected with malware... or someone may have access to your email acc. Put a pin on your bank? Quote Link to comment Share on other sites More sharing options...
Burundanga Posted May 14, 2018 Share Posted May 14, 2018 setup 2 step verification, ez Quote Link to comment Share on other sites More sharing options...
DeadPk3r Posted May 14, 2018 Share Posted May 14, 2018 My suggestions are for rsps use a basic password you would only use on a rsps, as most rsps have passwords in plain text meaning owner and or anyone who manages to get database can see login info additionally you could check startup for any sort of keylogger/rat view start with task manager in startup tab or if on older system, on Run enter msconfig, also be careful what unofficial scripts you use. Quote Link to comment Share on other sites More sharing options...
goonrunner Posted May 14, 2018 Author Share Posted May 14, 2018 1 hour ago, ProjectPact said: It's not OSBot, nor OSBuddy. It is most definitely from another source, such as the one you speak of. P.S - be careful with free scripts that aren't on the SDN thanks for the clarification did some scans etc, removed all RSPS from my pc etc, but yeah i didnt use same pass on RSPS but maybe they infected me with a RAT or something? 3 minutes ago, DeadPk3r said: My suggestions are for rsps use a basic password you would only use on a rsps, as most rsps have passwords in plain text meaning owner and or anyone who manages to get database can see login info additionally you could check startup for any sort of keylogger/rat view start with task manager in startup tab or if on older system, on Run enter msconfig, also be careful what unofficial scripts you use. ^ mostly in response above, but im interested if youd be able to tell me how to do the "you could check startup for any sort of keylogger/rat view start with task manager in startup tab" would be greatly appreciated i also had 2fa on my account which somehow they got through, its still on there at the moment, my email also has 2fa so idk, could it be something to do with my internet as ive had lots of ddos attacks recently on my static IP which is what i normally play osrs on. Quote Link to comment Share on other sites More sharing options...
DeadPk3r Posted May 14, 2018 Share Posted May 14, 2018 Sent you a PM about it, for anyone else having issue suggest getting this application if you don't already have it. https://www.malwarebytes.com/ 1 Quote Link to comment Share on other sites More sharing options...
goonrunner Posted May 14, 2018 Author Share Posted May 14, 2018 UPDATE: did a malware check came back with 4 malwares under adware.graftor and adware.premieropinion. 217 suspicious items on PC, all were quarantined, will keep updated if i get hacked again 1 Quote Link to comment Share on other sites More sharing options...