What To Do If Your Roblox Account Gets Hacked

  

  1. How To Fix A Hacked Roblox Account

There have been a lot of instances of Roblox users exploiting flaws in the game in order to introduce their own hacks, like a highly publicized and, quite frankly, terrifyingly disgusting story of someone who was able to exploit the game's code in order to introduce custom animations. This person decided to animate graphic character movements that mimicked rape, and proceeded to virtually.

  1. I've seen a lot of posts about Roblox accounts being 'hacked' and people losing thousands in Robux and items. This post is to help all those that.
  2. WHAT TO DO if YOUR ROBLOX ACCOUNT got HACKED?!

Archive

Let’s face it, when you run a website or gaming service that is used by millions of people each day, there are going to be a few bad eggs. It’s an unfortunate truth. Scammers, especially around the holidays, are looking to steal account information through various schemes and tricks. We’re not writing this to scare you; we’re writing this to prepare you. With common sense and some of the suggestions in this article, you can make your ROBLOX account hack-proof.

Never give out your account information
This may sound obvious, but you’d be amazed how many users are tricked into giving up their account details. Often, ROBLOX scammers make false promises to get you to divulge your account details. Here’s a checklist of requests to think twice about.

1. I’ll give you some Robux
2. I’ll help you build something
3. I’ll level up your Group rank
4. Let’s “trade accounts” for a while
5. I can unlock Builders Club for free, I just need your log-in.

How To Fix A Hacked Roblox Account

ROBLOX offers a ton of services, and often new users go looking for help to understand the process and methods of being a successful ROBLOXian. The joy of having such a robust community is that there are tons of friendly people out there who are willing to show you the ropes. But the ones that ask you for something in return are not to be trusted. Many new users get scammed because they’ve never been targeted before–they don’t know what is considered to be suspicious behavior or what to do when they’ve been scammed.

Basically, have faith in our community. If someone legitimately wants to help you, they don’t need your account details. If you’re new to ROBLOX and have lots of questions, check out our forums, brush up on some blog articles, and interact with users who are willing to help without asking for personal info.

“Phishing”
“Phishing” is an attempt to acquire information, such as usernames, passwords, or credit card details, by masquerading as a trustworthy entity through e-mail or as a website. Phishing is not a ROBLOX-specific issue, but something that affects major websites including eBay, Amazon, and others.

There are websites that exist outside of ROBLOX that replicate services we offer, such as our surveys, for example. Users that are up to no good copy our surveys and offer them to other users–the only difference being they create the page with a user-name and password “log-in.” Remember, we will never ask you for your log-in info to take a poll. If you’re ever taking a poll and you’re asked for your account info, we’re not the ones asking.

There’s an easy way to know whether the poll you’re taking is legit: check the URL. If you don’t see polls.roblox.com in the URL, you’re not taking an official ROBLOX poll. There are also legitimate third-party websites that offer incentives for participation and that’s fine. We encourage community interaction. Just keep in mind, you should never have to “log in” to participate in these activities.

Always keep an eye on your address bar when submitting information to the web. Make sure that somewhere within the text field, roblox.com is there. That way you know you’re safely on our website and not a forged copy.

E-mail
Don’t ever give your e-mail password away for any reason. A lot of times, users use the same password for their email account as they do for their ROBLOX account, so giving one away is like giving away the keys to the kingdom.

Try to keep your conversations within the confines of ROBLOX. We understand that friendships form, and if you trust a person you’ve been talking with (or developing games with) enough, it’s OK to developing a healthy professional relationship via e-mail. Just make sure to e-mail people you’ve come to trust if you’re going to correspond outside of ROBLOX. Don’t give your e-mail address to just anyone.

A great way to secure your account information is to verify your e-mail address with ROBLOX. In the rare case that your account is compromised, there’s a link on our site called “Password Recovery”–hitting that link will shoot an e-mail to your primary account that will allow you to regain control of your ROBLOX account.

False Trading
Always use the trading system to exchange items. Users often want to trade items for Robux directly, but there isn’t an official way to do this. To get around this, some users decide to set up private trades, and not just for items. Users are privately trading groups, currency, and even accounts (which is against our terms of service).

Gets

This puts users in a very strange position. Who exchanges the goods first? The person with the item? If you were to do that, then the person with the money could easily vanish without paying and take the item (or group, or account) in the process. Don’t put yourself in this position. Always use our trading system for item exchanges. We’re actively working on eliminating reasons why users would feel the need to barter outside of our system–stay tuned for an exciting upcoming announcement that will change the way gear items are exchanged forever.

The Bottom Line (TL;DR)

  • We will never ask you for your password. There is no reason for any user to ask you for your log-in credentials.
  • Official ROBLOX Polls will have polls.roblox.com in the URL. If your browser does not show that, it’s not one of our polls. You should never have to log-in to take a poll.
  • The only place you should enter your user name and password is at Roblox.com.
  • Do not share your e-mail address with any user.

Following these simple rules should keep your account hack-proof. And remember, if something sounds too good to be true, it probably is. Do you have any methods of hack-proofing your ROBLOX account that we didn’t mention? Let us know in the comments below.

Recommended

As our whole life is becoming online, the number of white hat and black-hat hackers are increasing. Many of you or someone you know, may have gotten their account hacked at one point in time.

There are multiple ways a hacker could hack you and one way to keep yourself secure is by knowing how hackers hack the passwords and the methods and software they generally use.

By knowing how hackers get into target accounts, you will be in a better situation to understand how you can possibly get hacked and how to increase your security.

  • Read: 5 Ways to Keep yourself safe while using the Internet

How Do Hackers Get Your Passwords?

Contents

  • How Do Hackers Get Your Passwords?

There are some common techniques that hackers use to hack your passwords.

One of them is phishing pages. A hacker will send a login page of Gmail or Facebook which looks exactly the same as the real Facebook or Gmail login page.

Most of the time they use social engineering skills where they send a message that says

“This person has posted your bad picture on Facebook, click here to check your photo”. Once you click on the link, you will be taken to the login page and as soon as you enter your password, it will be available to the hacker.

Most of the time, the victim doesn’t even realize that the password is gone.

Watch this video to learn more about the phishing attack:

Hackers hack accounts and passwords for various reasons. Some of them hack just to show their skills off while some get into hacking for profits.

Many of them will use your email account to send spam links to your contact list or use your Facebook account to send spam application links.

The major problem arises when hackers get hold of your private and sensitive data. Like I mentioned above, there are many other methods being used by hackers to hack passwords or email access.

1. Keyloggers

This is one of the basic tools used for getting your passwords. Keylogger resides in your system memory and runs at every startup. These keyloggers log all your keystrokes.

A log is created and is then sent to the hacker. One of the most famous is the Ardamax Keylogger. It can be customized to not be shown in “Processes” (Windows Task Manager).

I suggest you to start using Online virtual Keyboard when typing passwords for sensitive sites like your bank account, email and Paypal account. You can also start using a password manager like Dashlane that auto-fills the login data and thus no key logs are made.

2. RAT

RAT stands for Remote Administration Tool. With RAT, a hacker can connect to your PC without your knowledge. The hacker can see your screen and also see the sites you surf. It also has the built-in functionality of keylogger.

Hackers can copy files from your hard disk to his/her computer – all this without your knowledge.

A good example of RAT is Poison Ivy. It can be customized to connect to your PC on a particular port number specified while creating the RAT.

3. Trojan Horses

These are the most common types of malware. Trojans spread through warez sites mostly.

When you download from warez sites, all the keygens and patches and even the original trial programs are infected with a trojan.

This means you will get the software for free, but your computer will be affected with a trojan horse.

When you run the patch/keygen, you’ll get the desired output, but in the background, your system gets infected with the trojan.

Turkojan is a famous Trojan horse. A trojan is much more superior compared to keyloggers or RATs. It provides much more functionality so that the hacker has greater access to your PC.

These days Android phones are most vulnerable to the trojan horse a.k.a backdoors. Hackers will persuade you to install an apk file which will then install a backdoor apk.

This is why you should never install .apk files from untrusted sources. We will talk more about how to safeguard yourself in future articles.

There are many other ways which a hacker uses, for example, if you are connected to the internet on a LAN, which uses the same router, a hacker can use any packet sniffer and base decoder to read all sensitive data being transmitted from your computer. Cain and Abel is one such sniffer, but there are many more.

That’s one reason why I always encourage secure browsing whenever possible. Most sites, like Facebook, give an option to use the https login, which encrypts your data. In such cases, even if the hacker uses the sniffer to capture your data, decoding passwords will not be easy.

Brute forcing is another common method, but with technology advancement, most email and web login forms come with features that can handle such attacks.

How to protect yourself from hacking:

  • Install a good, licensed anti-virus. I suggest you go for Kaspersky. It’s the best anti-virus out there.
  • Always have your Windows Firewall turned on.
  • Encrypt your data.
  • Start using a password manager like Dashlane or any other.
  • Activate 2FA for all the services you use.
  • If you are paranoid just like me, start using hardware-based security such as Yubikey.
  • Never ever trust warez sites. There is a lot of malware flowing out there.
  • Never auto-play a pen drive. The malware automatically gets installed on your PC.
  • Don’t run attachments from emails unless you are certain about the source.
  • If you want to run .exe files safely, run them sandboxed. A free application Sandboxie is available for this purpose.
  • If you feel you’re infected, format your PC/Mobile phone immediately. No anti-virus can remove a Trojan horse from your PC. It’s very difficult to remove a trojan from an infected PC.
  • Do a security audit every quarter or half yearly, depending on your need.

Well, to be safe, you have to take preventive methods and make sure you enable all security features offered by the web app you are using. I hope this article helps you to understand how hackers hack so that you can take all preventive measures to keep your passwords safe.

If you find this article useful, don’t forget to share it on Whatsapp and Facebook for more social awareness.