Jump to content

Linus Tech Tips, Tech Quickie, Tech Linked channels hacked

betav17
Message added by Spotty,

The Linus Tech Tips, TechLinked, and TechQuickie Youtube channels have been restored.

A video explaining what happened is now up:

 

 

If y’all are interested in redline stealers, which this probably was I’d recommend reading 


https://securityscorecard.com/research/detailed-analysis-redline-stealer/ - analysis of how they work 

 

https://blog.avast.com/adobe-acrobat-sign-malware - latest known vector, using legitimate adobe software to proliferate it (17/03/2023) 

Link to comment
Share on other sites

Link to post
Share on other sites

4 hours ago, ramm said:

How the hell does this even happen to something like Linus Tech Tips? Was your password like qwerty123 or something

Well, malware can happen to anyone. Big Youtube creators are big targets. I guess there's some security lessons that LTT can learn here though. Possibly there was some account sharing going on rather than separate account roles for different staff members.Almost certainly they didn't use hardware security keys as a second authentication factor for people who can do serious modifications on their channels. Youtube, unlike a lot of social media companies (cough, instagram, twitter, cough) do provide decent tools for companies running a brand account to do it securely. Just from what I've seen in their videos, LTT seems to cut corners because they think that the company being highly computer literate obviates the need for a dedicated IT person/department which has bitten them in arse several times already.Hopefully this incident will spur them to make some changes in that area.

Link to comment
Share on other sites

Link to post
Share on other sites

i think this is what happened

 

- a manager or employee in LTT was searching to downlaod something 
- a google ad was placed on top of the search results with “the download link”
- this “download link” claims to be legit however it’s actually redline stealer
- they copy the site and also abuse discord cdn to distribute the links
- probably that person downloaded it and ran it
- which then now LTT has redline on one of their systems which allows access to the entire channels and accounts 

 

 

it isn’t surprising that it’s all tesla crap since these kinds of hackers use redline to do the exact same thing. i myself got effected by this.

 

n3ptune_cpu

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

18 minutes ago, sombradirectory said:

I think we did good... ?

fp2.png

Not really surprised, LTT subs on FP have gone up by over 1000 in the last 2hrs alone. Not sure what impact it has on non-LTT creators, presumably only the backend issues.

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, jeevesmkii said:

Well, malware can happen to anyone. Big Youtube creators are big targets. I guess there's some security lessons that LTT can learn here though. Possibly there was some account sharing going on rather than separate account roles for different staff members.Almost certainly they didn't use hardware security keys as a second authentication factor for people who can do serious modifications on their channels. Youtube, unlike a lot of social media companies (cough, instagram, twitter, cough) do provide decent tools for companies running a brand account to do it securely. Just from what I've seen in their videos, LTT seems to cut corners because they think that the company being highly computer literate obviates the need for a dedicated IT person/department which has bitten them in arse several times already.Hopefully this incident will spur them to make some changes in that area.

i doubt this was a malware hack, this is VERY familiar to the common social engineering compromises that have happened with other youtubers

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, LinusTech said:

Thanks for the concern everyone. We are still in recovery mode over here and working with YouTube to get everything restored. Will hopefully have a video (or at least an update on WAN Show) to share with you all ASAP, but we want to make sure we get the details right since smaller channels may rely on our experience to help harden their own security.

I do not envy the day you must be having. Deep breaths, Linus.

BabyBlu (Primary): 

  • CPU: Intel Core i9 9900K @ up to 5.3GHz, 5.0GHz all-core, delidded
  • Motherboard: Asus Maximus XI Hero
  • RAM: G.Skill Trident Z RGB 4x8GB DDR4-3200 @ 4000MHz 16-18-18-34
  • GPU: MSI RTX 2080 Sea Hawk EK X, 2070MHz core, 8000MHz mem
  • Case: Phanteks Evolv X
  • Storage: XPG SX8200 Pro 2TB, 3x ADATASU800 1TB (RAID 0), Samsung 970 EVO Plus 500GB
  • PSU: Corsair HX1000i
  • Display: MSI MPG341CQR 34" 3440x1440 144Hz Freesync, Dell S2417DG 24" 2560x1440 165Hz Gsync
  • Cooling: Custom water loop (CPU & GPU), Radiators: 1x140mm(Back), 1x280mm(Top), 1x420mm(Front)
  • Keyboard: Corsair Strafe RGB (Cherry MX Brown)
  • Mouse: MasterMouse MM710
  • Headset: Corsair Void Pro RGB
  • OS: Windows 10 Pro

Roxanne (Wife Build):

  • CPU: Intel Core i7 4790K @ up to 5.0GHz, 4.8Ghz all-core, relidded w/ LM
  • Motherboard: Asus Z97A
  • RAM: G.Skill Sniper 4x8GB DDR3-2400 @ 10-12-12-24
  • GPU: EVGA GTX 1080 FTW2 w/ LM
  • Case: Corsair Vengeance C70, w/ Custom Side-Panel Window
  • Storage: Samsung 850 EVO 250GB, Samsung 860 EVO 1TB, Silicon Power A80 2TB NVME
  • PSU: Corsair AX760
  • Display: Samsung C27JG56 27" 2560x1440 144Hz Freesync
  • Cooling: Corsair H115i RGB
  • Keyboard: GMMK TKL(Kailh Box White)
  • Mouse: Glorious Model O-
  • Headset: SteelSeries Arctis 7
  • OS: Windows 10 Pro

BigBox (HTPC):

  • CPU: Ryzen 5800X3D
  • Motherboard: Gigabyte B550i Aorus Pro AX
  • RAM: Corsair Vengeance LPX 2x8GB DDR4-3600 @ 3600MHz 14-14-14-28
  • GPU: MSI RTX 3080 Ventus 3X Plus OC, de-shrouded, LM TIM, replaced mem therm pads
  • Case: Fractal Design Node 202
  • Storage: SP A80 1TB, WD Black SN770 2TB
  • PSU: Corsair SF600 Gold w/ NF-A9x14
  • Display: Samsung QN90A 65" (QLED, 4K, 120Hz, HDR, VRR)
  • Cooling: Thermalright AXP-100 Copper w/ NF-A12x15
  • Keyboard/Mouse: Rii i4
  • Controllers: 4X Xbox One & 2X N64 (with USB)
  • Sound: Denon AVR S760H with 5.1.2 Atmos setup.
  • OS: Windows 10 Pro

Harmonic (NAS/Game/Plex/Other Server):

  • CPU: Intel Core i7 6700
  • Motherboard: ASRock FATAL1TY H270M
  • RAM: 64GB DDR4-2133
  • GPU: Intel HD Graphics 530
  • Case: Fractal Design Define 7
  • HDD: 3X Seagate Exos X16 14TB in RAID 5
  • SSD: Inland Premium 512GB NVME, Sabrent 1TB NVME
  • Optical: BDXL WH14NS40 flashed to WH16NS60
  • PSU: Corsair CX450
  • Display: None
  • Cooling: Noctua NH-U14S
  • Keyboard/Mouse: None
  • OS: Windows 10 Pro

NAS:

  • Synology DS216J
  • 2x8TB WD Red NAS HDDs in RAID 1. 8TB usable space
Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, n3ptune_cpu said:

i think this is what happened

 

- a manager or employee in LTT was searching to downlaod something 
- a google ad was placed on top of the search results with “the download link”
- this “download link” claims to be legit however it’s actually redline stealer
- they copy the site and also abuse discord cdn to distribute the links
- probably that person downloaded it and ran it
- which then now LTT has redline on one of their systems which allows access to the entire channels and accounts 

 

 

it isn’t surprising that it’s all tesla crap since these kinds of hackers use redline to do the exact same thing. i myself got effected by this.

 

nep nep nepu

Link to comment
Share on other sites

Link to post
Share on other sites

Very sad.

I wish all the best to LTT and hope that it wont take too long until the channel is up and running again!...

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, SNeel said:

Very sad.

I wish all the best to LTT and hope that it wont take too long until the channel is up and running again!...

The good news is YouTube should be able to put things right back to the way they were. Of course I'm sure they have lost subs before being taken down. This also probably affects their upload schedule they set for the week. 

Link to comment
Share on other sites

Link to post
Share on other sites

so why is the lmg clips ,there just moves, mac address, and Channel Super Fun still up they all be under one account like it seems the other ones was 

Link to comment
Share on other sites

Link to post
Share on other sites

5 minutes ago, n3ptune_cpu said:

i think this is what happened

 

- a manager or employee in LTT was searching to downlaod something 
- a google ad was placed on top of the search results with “the download link”
- this “download link” claims to be legit however it’s actually redline stealer
- they copy the site and also abuse discord cdn to distribute the links
- probably that person downloaded it and ran it
- which then now LTT has redline on one of their systems which allows access to the entire channels and accounts 

 

 

it isn’t surprising that it’s all tesla crap since these kinds of hackers use redline to do the exact same thing. i myself got effected by this.

 

Highly unlikely scenario. 

Link to comment
Share on other sites

Link to post
Share on other sites

8 minutes ago, wordloc said:

If y’all are interested in redline stealers, which this probably was I’d recommend reading 


https://securityscorecard.com/research/detailed-analysis-redline-stealer/ - analysis of how they work 

 

https://blog.avast.com/adobe-acrobat-sign-malware - latest known vector, using legitimate adobe software to proliferate it (17/03/2023) 

An Adobe vector? That's not good.

Link to comment
Share on other sites

Link to post
Share on other sites

I'm going to guess that it's a cookie hijacking event.  YouTube really could have shut down the majority of these cases if they linked auth with IP and required 2FA when changing any important settings (like passwords, channel name, icons).

 

The best way to stop scammers on a platform like YouTube, make it so the effort required is more than what can be made

 

Any word on whether or not this forum might have been compromised?  Once this is resolved, I still will probably change up my password as a precaution.

 

Well hopefully this is just cookie hijacking and not a virus, although it does beg the question when they have tons of computers why not have a more dedicated PC (or PC's) to do all the YouTube portion, where no one is allowed to open emails, click on links etc, just only YouTube stuff and have it walled off from the rest of the network (or rather it can access SMB and other components but effectively it effectively denies all inbound connections).  This would have prevented something like this from happening, and if made correctly I doubt it would impose that much of workflow bottleneck.

3735928559 - Beware of the dead beef

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, linuxlover98 said:

so why is the lmg clips ,there just moves, mac address, and Channel Super Fun still up they all be under one account like it seems the other ones was 

i would think that all accounts are seperate and the software got on 1 or 2 computers not the whole network

Link to comment
Share on other sites

Link to post
Share on other sites

LMG's biggest headache is now they can't trust any of the computers on their network until they run a basically deep check on everything. That's the real headache that comes with this.

Link to comment
Share on other sites

Link to post
Share on other sites

22 minutes ago, LaroTayoGaming said:

The tesla hack happens with a lot of YouTubers. Hopefully YouTube resolves the issue (which in most cases, cookie jacking) as much as possible.

 

Not gonna lie, Password, email and 2FA auth changes needs to be enforced by default as always to not get changed by bots.

 

Also, I wanna recommend the whole ThioJoe video on how RedLine stealers work.

 

 

Sorry this happened Linus. Me and my best friend for life have been watching you to unwind when we don’t want to study IT directly. I appreciate all u do and I hope to see your accounts restored and a influx of new viewers and subs for support.

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, Taf the Ghost said:

An Adobe vector? That's not good.

Exactly, if it’s only been known about for a week it’s probably been around for a few weeks/couple of months. LMG doesn’t have the resources to keep someone on top of this so it’s not exactly surprising if that’s how. Especially since they’re posing as a copyright infringement notice. Who wouldn’t click on that as a YouTube creator when it’s obviously delivered by adobe?

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, Jumurdzsak said:

Yo LMG Team,
By any chance would you consider uploading this react video somewhere else as well? 

Good luck with getting everything back into order.

It's not a video, it's just a text message. A copy is pinned to the top of this page if you would like to read it.

CPU: Intel i7 6700k  | Motherboard: Gigabyte Z170x Gaming 5 | RAM: 2x16GB 3000MHz Corsair Vengeance LPX | GPU: Gigabyte Aorus GTX 1080ti | PSU: Corsair RM750x (2018) | Case: BeQuiet SilentBase 800 | Cooler: Arctic Freezer 34 eSports | SSD: Samsung 970 Evo 500GB + Samsung 840 500GB + Crucial MX500 2TB | Monitor: Acer Predator XB271HU + Samsung BX2450

Link to comment
Share on other sites

Link to post
Share on other sites

7 minutes ago, TheTripleDeuce said:

i doubt this was a malware hack, this is VERY familiar to the common social engineering compromises that have happened with other youtubers

LTT uses 2FA, which means it pretty much would have had to be someone running a piece of malware (having their cookie sessions stolen).

 

Although then again, malware really is sort of a catch all term, there are ones that steal sessions all the way to ones that propagate through the system (those ones are the worst to deal with because you need to figure out the scope in which it could have spread)

3735928559 - Beware of the dead beef

Link to comment
Share on other sites

Link to post
Share on other sites

y'all need to realize it was a social engineering attack, the signs are EVERYWHERE

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, Jumurdzsak said:

Yo LMG Team,
By any chance would you consider uploading this react video somewhere else as well? 

Good luck with getting everything back into order.
image.png.3e4cb0501d01b80345ee3eebbf781bdd.png

the content of the viedeo is summerized on top of this forum post pls go to page 1

Link to comment
Share on other sites

Link to post
Share on other sites

 

Seems like it aligns with what happened. Also concerning if they have/had remote access to an LTT asset.

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, wanderingfool2 said:

LTT uses 2FA, which means it pretty much would have had to be someone running a piece of malware (having their cookie sessions stolen).

 

Although then again, malware really is sort of a catch all term, there are ones that steal sessions all the way to ones that propagate through the system (those ones are the worst to deal with because you need to figure out the scope in which it could have spread)

2FA is fine...unless you use text message 2FA....linus has been hacked through his mobile carrier in the past...

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


×