Jump to content

Linus Tech Tips, Tech Quickie, Tech Linked channels hacked

betav17
Message added by Spotty,

The Linus Tech Tips, TechLinked, and TechQuickie Youtube channels have been restored.

A video explaining what happened is now up:

 

 

1 minute ago, Blqckqut said:

whats the site

google password monster 👍

My Rig - Intel I7-5820k@ 4ghz| Rampage V Extreme| 4x4GB Corsair Vengeance DDR4|RTX 2060 SUPER| Corsair 650D| Corsair HX750| 2TB Samsung 850 EVO| H100i| 3x SF-120's| 1x 240 cooler master Red LED Front intake

 

Everything I say defaults to include /s

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

5 minutes ago, CoolJosh3k said:

It really depends on how it happened.

 

Some people use the same password in multiple places. Some have very weak passwords, negating any encryption. Some refuse to use any 2FA at all.

 

Malware is a common way to bypass the need for any authentication.

 

I’d like to take this chance to mention that Steam has better security than my bank.

I have never been hacked...

As long as you are careful it should be fine.

And my passwords are very very long and each website account has a different password...

A PC Enthusiast since 2011
AMD Ryzen 7 5700X@4.65GHz | GIGABYTE GTX 1660 GAMING OC @ Core 2085MHz Memory 5000MHz
Cinebench R23: 15669cb | Unigine Superposition 1080p Extreme: 3566
Link to comment
Share on other sites

Link to post
Share on other sites

well it clearly can't be anyone with alot of perms since the forum haven't been overrunned by the Crypto scammer

Link to comment
Share on other sites

Link to post
Share on other sites

3 minutes ago, Blqckqut said:

whats the site

I just made my password in Ukranian)

photo_2023-03-23_15-59-20.jpg

Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, RuffRuffmcgruff said:

 

 

Better be alpha-numerical! 😛

image.png.2f195de39935042476e5c29fc0151b74.png

 

looks good to me

Dont forget to mark as solution if your question is answered

Note: My advice is amateur help/beginner troubleshooting, someone else can probably troubleshoot way better than me.

- I do have some experience, and I can use google pretty well. - Feel free to quote me I may respond soon.

 

Join team Red, my apprentice

 

STOP SIDING WITH NVIDIA

 

Setup:
Ryzen 7 5800X3DSapphire Nitro+ 7900XTX 24GB / ROG STRIX B550-F Gaming / Cooler Master ML360 Illusion CPU Cooler / EVGA SuperNova 850 G2 / Lian Li Dynamic Evo White Case / 2x16 GB Kingston FURY RAM / 2x 1TB Lexar 710 / iiYama 1440p 165HZ Montitor, iiYama 1080p 75Hz Monitor / Shure MV7 w/ Focusrite Scarlett Solo / GK61 Keyboard / Cooler Master MM712 (daily driver) Logitech G502-X (MMO mouse) / Soundcore Life Q20 w/ Arctis 3 w/ WF-1000XM3

 

CPU OC: -30 all cores @AutoGhz

GPU OC: 3Ghz Core 2750Mhz Memory w/ 25%W increase (460W)

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, Fullmental said:

Here's a security tip: Don't type passwords for your websites into other websites designed solely to capture and analyze passwords...

i didnt, its a similar one in terms of numbers and amount of stuff, different pass tho

Dont forget to mark as solution if your question is answered

Note: My advice is amateur help/beginner troubleshooting, someone else can probably troubleshoot way better than me.

- I do have some experience, and I can use google pretty well. - Feel free to quote me I may respond soon.

 

Join team Red, my apprentice

 

STOP SIDING WITH NVIDIA

 

Setup:
Ryzen 7 5800X3DSapphire Nitro+ 7900XTX 24GB / ROG STRIX B550-F Gaming / Cooler Master ML360 Illusion CPU Cooler / EVGA SuperNova 850 G2 / Lian Li Dynamic Evo White Case / 2x16 GB Kingston FURY RAM / 2x 1TB Lexar 710 / iiYama 1440p 165HZ Montitor, iiYama 1080p 75Hz Monitor / Shure MV7 w/ Focusrite Scarlett Solo / GK61 Keyboard / Cooler Master MM712 (daily driver) Logitech G502-X (MMO mouse) / Soundcore Life Q20 w/ Arctis 3 w/ WF-1000XM3

 

CPU OC: -30 all cores @AutoGhz

GPU OC: 3Ghz Core 2750Mhz Memory w/ 25%W increase (460W)

Link to comment
Share on other sites

Link to post
Share on other sites

13 minutes ago, CapCloud said:

Does this mean these hackers got out (so far) with 10,000 USD+?

yeah, but I noticed that I had the ether wallet twice (because the tether wallet uses the same address), so it is more like 6500$. Getting anything back after it is transferred is pretty much impossible. But this should be everything they got, since the stream is offline now.

Theoretically they could show different wallets to different people (to obfuscate how much they got), but I tested with a vpn and different browsers and always got the same addresses.

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, Fullmental said:

Here's a security tip: Don't type passwords for your websites into other websites designed solely to capture and analyze passwords...

at least not paswords that you are using

Link to comment
Share on other sites

Link to post
Share on other sites

13 minutes ago, Drazil100 said:

"Really stupid" is probably a bit too far you are right. Maybe I am wrong and the hackers have ways around this but I would think there would be measures against people trying to use a session from a wildly different IP that makes you confirm you are the account holder.

I don't have experience with targeting users using Google (as I mostly attack/work with clients largely using O365 with Okta or other third-party SSO providers). But there are only so many values that can be checked to look for suspicious sessions. You can typically blend in by using a highly-reputable VPS or proxy close to the location of the original login IP and changing your UserAgent header to match the original.

Speculating further (because why not), if it is the cases that an editor's computer got compromised, another common approach is to tunnel network traffic through the compromised workstation, effectively turning it into a proxy, and therefore having the stolen session originate from the original IP.

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, Fullmental said:

Here's a security tip: Don't type passwords for your websites into other websites designed solely to capture and analyze passwords...

Good advice, but that site is fine. There's no network requests happening when you type in the box. A lot of these strength tests are done using javascript run in the browser to detect strength. Every website does this already. It's nothing new.

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

3 minutes ago, PointyJackalope said:

I just made my password in Ukranian)

photo_2023-03-23_15-59-20.jpg

 

Meanwhile....

image.png.7a46b3277de34fe1ca2ff991614f5855.png

Link to comment
Share on other sites

Link to post
Share on other sites

YouTube: “what’s that you are connecting via a never-before-seen device from a never-before-seen-address? This is fine.”

 

Ofcourse this could have been stolen 2FA code or maybe even a RAT. However, I really do sense this new device, new address is part of the scenario that unfolded.

Link to comment
Share on other sites

Link to post
Share on other sites

8 minutes ago, XenZibe said:

Good advice, but that site is fine. There's no network requests happening when you type in the box. A lot of these strength tests are done using javascript run in the browser to detect strength. Every website does this already. It's nothing new.

It's fine until someone hijacks the site and changes the code to capture it live instead, or makes a new one that the casual user doesn't do their due diligence on before trying a bunch of their passwords, or maybe they randomly harvest the input fields on a random sample of hits using server side code you can't possibly see or analyze. You don't know who you're putting your trust in when you visit this kind of site. Plus, now that someone's posted that URL, a bunch of people reading this topic are going out to the site and entering random passwords. Do they all run a wireshark trace beforehand and obfuscate their passwords before checking? 99.99% of people almost certainly don't, and if they ARE smart enough to do that, they don't need an algorithm to tell them if their password is strong or not in the first place.

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, XenZibe said:

Good advice, but that site is fine. There's no network requests happening when you type in the box. A lot of these strength tests are done using javascript run in the browser to detect strength. Every website does this already. It's nothing new.

is the site open source ? if not do Not trust it

Link to comment
Share on other sites

Link to post
Share on other sites

i believe the way they hack the accounts is they copy your saved passwords from google chrome ect not the password has been hacked so when you go onto a website the password is already saved for you it clones the database of every password and once in changes your two factor verification so u cannot just change the password again 

 

really when a number is changed youtube should send a text or email asking if you confirm the two factor verification and if no then u can change your password but if they already had access to the email addresses passwords ect then no point

Link to comment
Share on other sites

Link to post
Share on other sites

15 minutes ago, Kartikay-Agarwal said:

Can the people who watch LTT on youtube get access to see the full statement that linus published on floatplane?

It posted at the top of this thread. It's the same one from floatplane

I'm usually as lost as you are

Link to comment
Share on other sites

Link to post
Share on other sites

8 minutes ago, RuffRuffmcgruff said:

image.png.2a30f9880fca0ed15f06721a0fa5ac40.png

 

Better be alpha-numerical! 😛

image.png.477d116ae5940c9db77891be49f77890.png

I think my password might be a tad bit aggressive. Might take a hot minute to break. And it is one of many like it.

Link to comment
Share on other sites

Link to post
Share on other sites

Woke up to Elons Mug on my phone..  said WTF are you doing there.  I don't follow tesla.. and i sick to death of crypto.

 

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


×