Hi everyone, first post so sorry if it’s a bit confusing- I have no tech skills whatsoever. Bt said my router was hacked from the logs and sent a replacement. Devices - phones were hacked, phone calls, camera, screen and access to websites. All devices wiped to factory settings in Store, passwords for apple, Microsoft, gmail etc changed on someone’s secure WiFi laptop in another building. Same things happened again within days, can only half the screen, can’t open files. When I changed admin password it logged as http admin instead of just admin. Devices are labelled by their name or unknown and then labelled as host. Last night remote host opened portals I haven’t seen before both external and internal from my sons smart tv. I’ve probably made everything worse restarting the hub and messing about with the settings but I have no idea what to do. My son was reported for hacking school systems in August and had bought usb sticks with prebuilt Kali Linux software. both his and his brothers computers displayed No Operating System Reboot when switched off - pc shop said whole memory gone for pc but laptop, sons phone and the usbs were seized by police. He’s not hacking anymore but he had originally taken the card out of the hub with the passwords etc. how the hell do I get these people out and take my life back?
You are the victim of a scam, BT would never contact you to say your router has been hacked. Who set the "replacement" router, as its probably not a BT one.
https://www.bt.com/help/security/scams
This is just a BT customer to customer forum.
I doubt anyone here would be able to help.
Even the post looks like a hoax....
@Rum37Tmdfwrote:
Cost £170 for pc to have new operating system and memory put back.
Hi @Rum37Tmdf I'm afraid that is a classic scam.
How can I find out who the remote host is and stop them? They added port rules that opened external and internal ports to my smart tv
external ports: any->61000 | remote host: | internal ports: 7547 | internal client: 192.168.1.114 | ||
22:57:08 | 24 Nov. Port forwarding rule added via TR069. Protocol: TCP | external ports: any->61000 | remote host: | internal ports: 7547 | internal client: 192.168.1.114 |
22:57:07 | 24 Nov. Port forwarding rule added via TR069. Protocol: TCP | external ports: any->61000 | remote host: | internal ports: 7547 | internal client: 192.168.1.114 |
22:57:07 | 24 Nov. Port forwarding rule added via TR069. Protocol: TCP | external ports: any->61000 | remote host: | internal ports: 7547 | internal client: 192.168.1.114 |
22:57:07 | 24 Nov. Port forwarding rule added via TR069. Protocol: TCP | external ports: any->61000 | remote host: | internal ports: 7547 | internal client: 192.168.1.114 |
22:57:07 | 24 Nov. Port forwarding rule added via TR069. Protocol: TCP | external ports: any->61000 | remote host: | internal ports: 7547 | internal client: 192.168.1.114 |
22:57:07 | 24 Nov. Port forwarding rule added via TR069. Protocol: TCP | external ports: any->61000 | remote host: | internal ports: 7547 | internal client: 192.168.1.114 |
Disconnect all your devices from the Internet then carry out a factory reset on all of them and while they are resetting carry out a factory reset on your BT Hub.
If you still have problems after that get your hacker of a son who apparently thinks he is a whiz kid to repair the damage that he has done with his stupid antics and if that doesn't work you will need to employ the services of a computer expert to repair that damage because it really has nothing to do with BT or this forum.
And when you factory reset the Smart Hub, I wouldn’t use the password on the back again. Use something else, at least 15 characters long, numbers, upper/lower case and symbols.