Head Replacement Comb for WD 2TB WDBAAU0020HBK-01 / I Was Hacked

  • Hi there and welcome to PC Help Forum (PCHF), a more effective way to get the Tech Support you need!
    We have Experts in all areas of Tech, including Malware Removal, Crash Fixing and BSOD's , Microsoft Windows, Computer DIY and PC Hardware, Networking, Gaming, Tablets and iPads, General and Specific Software Support and so much more.

    Why not Click Here To Sign Up and start enjoying great FREE Tech Support.

    This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.
Welcome to our Community
Wanting to join the rest of our members? Feel free to sign up today.
Sign up
Status
Not open for further replies.

Manny Maniago

PCHF Member
Mar 3, 2024
74
7
70
Hello again. Some weeks back, I apparently was hacked. And I guess I deserved it for not using a security app after Windows ended support for Defender on my Windows 8 PC. I got a text in my cell that had a photo that was only on my external HD. After that, the external would not open to access files. Add to that, I dropped it. Now, the click of death. I bought another of the same external to use its actuator arm / head.

Two things...

1) Please recommend an inexpensive head replacement comb kit for this model.

2) Am I wasting my time? I mean, as I say, after the hack, the drive would not open. Did they kill it? Wipe it? It has 21 years of data on it.

Thank you.
 
Thank you. Can you elaborate? The actuator arm is clicking and going on and off the disk. If I replace the actuator arm / heads of my external drive, it won't read my data?
 
The more the arm moves the more damage you do.
You can try and change it - nothing lost nothing gained.
You will most likely have more than 1 arm - multi disc = multi arms.
 
before changing try and tighten the screw at the end of the head I have had them come loose and managed to get data off.
The parts that nearly contact the discs are damaged. So, if I use a data recovery service, they will recovery my data from the data storage chip?
 
So, if I use a data recovery service, they will recovery my data from the data storage chip?
No
What they would do is take the disc and chip from the current drive and put into a new drive.
After that, the external would not open to access files
If they have encrypted the disc then no data recovery firm can access the drive.
When you tried to access the disc before you dropped it what error did you get.
Have they asked for payment?

You also have to weigh up the cost of data recovery to the cost of what the data is worth to you.
They may be able to recover the data but if it is encrypted then it is of no use.
 
@Manny Maniago if you’d like, you can create a separate thread for the machine in question. So we can clean the malware from the computer. But like @PeterOz is saying, if the data is encrypted there is little to be done for your files, But the malware can be cleared.

If you want, follow instructions here to get Frst logs, and post a new thread.

 
No
What they would do is take the disc and chip from the current drive and put into a new drive.

If they have encrypted the disc then no data recovery firm can access the drive.
When you tried to access the disc before you dropped it what error did you get.
Have they asked for payment?

You also have to weigh up the cost of data recovery to the cost of what the data is worth to you.
They may be able to recover the data but if it is encrypted then it is of no use.
ok, i see now. the $1000 would be a gamble. no error message. clicked the shortcut, drive would not open. so i think they screwed it up or wiped it. and the photo they got from my external was texted to me from fort drum. i am near the end of the journey. i suppose i can live without my 24 years of work. so i'll hope i can save up a thousand before my time comes. no ransom payment.
 
@Manny Maniago if you’d like, you can create a separate thread for the machine in question. So we can clean the malware from the computer. But like @PeterOz is saying, if the data is encrypted there is little to be done for your files, But the malware can be cleared.

If you want, follow instructions here to get Frst logs, and post a new thread.

Yes, that would be nice to move the post. I don't think there's any malware. My 8 pc was unprotected at the time. I have an app working real time now. It just so happens, the operations manager at Ft Drum hates my guts (long story). I bet he got in, wiped the drive then sent that photo to hint it was him.
 
  • Like
Reactions: Malnutrition
It’s best to create a new thread. Run FRST as suggested here.

Better to be sure, could be something still be lurking on the machine .

Then post FRST and Addition logs in a new thread.
 
It’s best to create a new thread. Run FRST as suggested here.

Better to be sure, could be something still be lurking on the machine .

Then post FRST and Addition logs in a new thread.
It’s best to create a new thread. Run FRST as suggested here.

Better to be sure, could be something still be lurking on the machine .

Then post FRST and Addition logs in a new thread.
I have no money for the head replacement tool kit until around the 1st. Meanwhile, would you recommend an affordable kit that would work with this WD 2TB WDBAAU0020HBK-01? I would be running FRST on the external drive?

I have watched YouTube videos. Over and over as if practicing.

Thanks, again.
 
I would be running FRST on the external drive?


No, you will run it on the machine that it was attached to, this way we can ensure that there is nothing lurking on the machine which could pop up later and cause more issues. It is best to be certain that there is no residual infection on the machine. You will need FRST 64bit version, save it to the desktop of that machine, right click run as admin. Two logs will be created, FRST and addition.txt post those logs in a new malware thread.
 
No, you will run it on the machine that it was attached to, this way we can ensure that there is nothing lurking on the machine which could pop up later and cause more issues. It is best to be certain that there is no residual infection on the machine. You will need FRST 64bit version, save it to the desktop of that machine, right click run as admin. Two logs will be created, FRST and addition.txt post those logs in a new malware thread.
Yes, I've downloaded FRST. I'm new to this. How does this differ from the TotalAV I installed after the incident?
 
This is a diagnostic tool, it will list certain areas file paths that malware is known to hide. I take this information and create a script to remove any bad items from the machine.
 
Status
Not open for further replies.