Managing and enforcing security policies for devices and apps to protect organizational data through Intune
Hi Ashley, yes it is not only possible but it appears that you have been hacked and scammed.
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
So I have a bit of a weird question/story. And I know how this will sound. It sounds far fetched...so if you don't truly believe what I'm saying, then you're not who I'm looking for to help me bring this home.
I need help in either understanding the what and how of what I'm about to tell you, and/or deciding what steps to take next. Here we go.
Around July 2024, my husband told me my phone was hacked and within 20 min of looking into it we found $1800 missing from our llc checking. We went through all proper channels and thought we secured our network and all of our banking. Fast forward to April 2025. We hadn't had any further issues until one day my husband came home thinking I was messing with him by logging into his phone from my phone and changing his settings. I assured him I wasn't but he said he could see it was my device doing it. Well, my husband is a diesel mechanic and he writes software for diagnostics. So his laptop had dealership software as well as diagnostic software he was still writing. He used my Microsoft account on that computer, this account PII. we kept having issues of my phone taking over our ENTIRE house. So I started logging my accounts out of every device. When I did that, who or what ever was laying dormant in our network was able to take full control of his laptop. We couldn't even recover with his bit keys. This computer is the only computer saved on this account. By the next day the software took over our Ford sync on our 2015 f-150. We called y'all, ford dealerships, the police, it companies, we even went as far as calling the FBI cyber division. By the end of that week my husband was still fighting this. I pulled in the drive way one afternoon and I had POP3 pop up on my dash(by speedometer) as a trailer setting. So I pressed save thinking it was my father in laws trailer, our daughters call him Pop. I'm sure you know what POP3 actually is, but I was unaware at that point. When I told my husband he went check the truck and our f-150 had settings that shouldn't have been on it, like big truck settings. My husband has now contained it for the most part. The lap top is no long useful. But he was able to find out that whoever got into our network was using AI to do everything. How fast-forward to yesterday. I see this... https://www.microsoft.com/en-us/ai/mobility/automotive
And Microsoft is not the only account that this type of situation has come to light. My husband kept saying my ai on all my accounts was writing codes. My Google, Samsung, Microsoft. Then what really set it all off was around April when this began, my ex boss tricked me into signing into Microsoft authenticator to log into our tax program at the office. When I did that my school acct and his enterprise account that had entra and azure began fighting for admin and made my device a entra hybrid device. When I realized that my boss was the one changing my husbands setting through MDM I checked the account and he had every single device in my house pulled in and was MDM. Even my 13 year old daughters phone! My husband now seems to think y'all (Microsoft, Samsung, Google, etc) have been reaching out to him wanting us to finish the codes. They are all open source at the moment. He said I need to add the credit to the original developer and add my name to it. So what do I do?
Is any of this even possible?
Managing and enforcing security policies for devices and apps to protect organizational data through Intune
Hi Ashley, yes it is not only possible but it appears that you have been hacked and scammed.