Jump to content

My Channel Was Deleted Last Night.

CPotter
29 minutes ago, s3r4pH said:

Yes, this Microsoft "feature" caused problems for decades πŸ˜‚

This THIOJOE video explains the issue around it quite well.

Β 

╔═════════════╦═══════════════════════════════════════════╗
β•‘__________________β•‘ hardware_____________________________________________________ β•‘
╠═════════════╬═══════════════════════════════════════════╣
β•‘ cpu ______________β•‘ ryzen 9 5900x_________________________________________________ β•‘
╠═════════════╬═══════════════════════════════════════════╣
β•‘ GPU______________β•‘ ASUS strix LC RX6800xt______________________________________ _β•‘
╠═════════════╬═══════════════════════════════════════════╣
β•‘ motherboard_______ β•‘ asus crosshair formulla VIII______________________________________β•‘
╠═════════════╬═══════════════════════════════════════════╣
β•‘ memory___________β•‘ CMW32GX4M2Z3600C18 ______________________________________β•‘
╠═════════════╬═══════════════════════════════════════════╣
β•‘ SSD______________β•‘ Samsung 980 PRO 1TB_________________________________________ β•‘
╠═════════════╬═══════════════════════════════════════════╣
β•‘ PSU______________β•‘ Corsair RM850x 850W _______________________ __________________β•‘
╠═════════════╬═══════════════════════════════════════════╣
β•‘ CPU cooler _______ β•‘ Be Quiet be quiet! PURE LOOP 360mm ____________________________β•‘
╠═════════════╬═══════════════════════════════════════════╣
β•‘ Case_____________ β•‘ Thermaltake Core X71 __________________________________________β•‘
╠═════════════╬═══════════════════════════════════════════╣
β•‘ HDD_____________ β•‘ 2TB and 6TB HDD ____________________________________________β•‘
╠═════════════╬═══════════════════════════════════════════╣
β•‘ Front IO__________   β•‘ LG blu-ray drive & 3.5" card reader, [trough a 5.25 to 3.5Β bay]__________β•‘
╠═════════════╬═══════════════════════════════════════════╣ 
β•‘ OS_______________ β•‘ Windows 10 PRO______________________________________________β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•©β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•

Β 

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, earthman06 said:

I NEVER talk about work online because.. well.. its work.
BUT, the company i work at has a solution to the exact issue you described of employees opening malicious files without training and honestly it is working great.
Not gonna say my company name bec im not interested in publicity and whatever, but the term you should be looking for is CDR.

Β 

I never heard about CDR, what does it stand for. Can you explain further?

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, darknessblade said:

This THIOJOE video explains the issue around it quite well.

Β 

Yes I know this issue since 2003 or something like that. Microsoft made me angry so many times πŸ™‚

Link to comment
Share on other sites

Link to post
Share on other sites

Wow...no matter who you are you are at risk of an attack.Β 

Β 

Interesting that you were able to get this resolved. That takes a lot of skill, Props to Linus!

Link to comment
Share on other sites

Link to post
Share on other sites

Even if they limits the number of videos you can delete per single request or number of changes you can do at a single point in time. You can still write a small python script that can perform the same operations in a few seconds just by adding a delay between each request. A standard delay is around 300ms, up to 1 second, so it won't trigger the DDoS detection, if there is such one.Β 

Β 

Keeping the session alive is extremely easy, you don't even need the credentials. You just send a refresh token request to the authentication endpoint and you continue do whatever you want. Or until you request invalidation of the session from the same endpoint.

Another feature that some systems use on top of location detection is token origin detection. It is basically identifies you, if you are human or not and it is used together with location detection. In the case of session highjacking, which you experienced, can be used to determine which account was compromised. The way it works is that each client is assigned unique ID, that doesn't have anything in common with your credentials, nor the session you have open, its sole purpose is to identify the device.

How you can protect yourself from such thing in the first place? - Zero trust policy! What this means is that you can have access to working resources, only from inside the working space, either through the usage of VPN or secure proxy or authentication certificates or combination of the stuff mentioned. Everywhere else, you need to 2FA authenticate and indentify who you are and even then you don't have access to all resources, just the part that is read-only.

Another layer of protection would be scanning clients on the users' machines - McAfee, Carbon Black or others, that perform sanity check and compare the state of the system with a remote virtual one, which is in healthy state. Thus catching in action when something goes out of the rails.

Link to comment
Share on other sites

Link to post
Share on other sites

14 minutes ago, GodAtum said:

Why no antivirus??

I think everyone uses AV software. The best way to get of this attacks is to use a VM. In this VM you should use the Browser either for only accessing your "work" like youtube, or to open mails and accessing other sites, that maybe harmful. When completely separated and using VPN you should be pretty safe.

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, s3r4pH said:

I think everyone uses AV software. The best way to get of this attacks is to use a VM. In this VM you should use the Browser either for only accessing your "work" like youtube, or to open mails and accessing other sites, that maybe harmful. When completely separated and using VPN you should be pretty safe.

But surely Av would stop the malware that hijacked the cookies?

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, GodAtum said:

But surely Av would stop the malware that hijacked the cookies?

Yes it should, but you are never safe against zero day exploits at all. This is why you can sell this holes in the deep web for a good amount of cash.

Link to comment
Share on other sites

Link to post
Share on other sites

Hey,

Β 

i would like to discuss some software that could had save you some pain. Did you ever hear about ssl inspection and crowdsourced ip blocking.Β 

In an Network an Size like your business runs on you should consider working in secured infrastructure. And it’s something for really interesting content. I don’t sell anything im just an enthusiast. LoL

Link to comment
Share on other sites

Link to post
Share on other sites

Coming soon ltt dressing gown to spare the editors! (actually I think you might say robe in north america?Β  Not sure.)

Link to comment
Share on other sites

Link to post
Share on other sites

OK i searched for CDR and it is very cool I think.

Data Sanitation Service

Advanced threats are constantly evolving to find ways around traditional security signature-based and reputation-based prevention measures.

Content Disarm & Reconstruction (CDR) strips all active content from files in real-time, creating a flat sanitized file. All active content is treated as suspect and removed. CDR processes all incoming files, deconstructs them, and removes all elements that do not match firewall policies. CDR can fortify your zero-day file protection strategy, by proactively removing any possibility of malicious content in your files.

Β 

But I think it is very expensiv.

Link to comment
Share on other sites

Link to post
Share on other sites

I am amazed you guys wrote, shot and edited this video within 24 hours well done.

Also I am happy with the mod team here as @Spottysaid its a team, but he bust his butt moderating that thread along providing the entire fourm with current updates.

Β 

Everyone,Β Creator -Β εˆιŸ³γƒŸγ‚― Hatsune Miku Google commercial.

Β 

Β 

Cameras: Main: Canon 70D - Secondary: Panasonic GX85 - Spare: Samsung ST68. - Action cams: GoPro Hero+, Akaso EK7000pro

Dead cameras: Nikion s4000, Canon XTi

Β 

Pc's

Spoiler

Dell optiplex 5050 (main) - i5-6500- 20GB ram -500gb samsung 970 evoΒ  500gb WD blue HDD - dvd r/w

Β 

HP compaq 8300 prebuilt - Intel i5-3470 - 8GB ram - 500GB HDD - bluray drive

Β 

old windows 7 gaming desktop - Intel i5Β 2400 - lenovoΒ CIH61M V:1.0 - 4GB ram - 1TB HDD -Β dual DVD r/w

Β 

main laptop acer e5 15 - Intel i3 7th gen - 16GB ram - 1TB HDD - dvd driveΒ  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β 

Β 

school laptop lenovo 300e chromebook 2nd gen - Intel celeron - 4GB ram - 32GB SSDΒ 

Β 

audio mac- 2017 apple macbook air A1466 EMC 3178

Any questions? pm me.

#MuricaparrotgangΒ Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  Β Β 

Β 

Link to comment
Share on other sites

Link to post
Share on other sites

5 hours ago, WhiteAirLock said:

I was right, this was probably a fake pdf file.

If you have file extension enabled, the filename would be something like sponsor.exe.pdf but if you don't have file extensions enabled, the file would be displayed as sponsor.pdfΒ 

Β 

Here's how this worksΒ YouTube link

And to be honest, my old steam account was almost hacked that way but luckily Valve reacted and notified me about the sudden change of location and logged me off from all devices.

I tried to run a Macro which was named antiAFKkick.ahk but with file extensions enabled, the file name turned out to beΒ  antiAFKkick.exe.ahkΒ 

You actually have that backwards, a "sponsor.pdf" file would appear as "sponsor.pdf.exe". Nevermind, I watched that video and see how they can be reversed. Interesting!

Β 

What's more interesting though, as a techie person anyway, is that anything showing a file extension is a huge red flag. In the modern era of them always being hidden by default, if you see an extension that looks "normal" there's a 99% chance that it's not.

Primary Gaming Rig:

Ryzen 5 5600 CPU, Gigabyte B450 I AORUS PRO WIFI mITX motherboard, PNY XLR8 16GB (2x8GB) DDR4-3200 CL16 RAM, Mushkin PILOT 500GB SSD (boot), Corsair Force 3 480GB SSD (games), XFX RX 5700 8GB GPU, Fractal Design Node 202 HTPC Case, Corsair SF 450 W 80+ Gold SFX PSU, Windows 11 Pro, Dell S2719DGF 27.0" 2560x1440 155 Hz Monitor, Corsair K68 RGB Wired Gaming Keyboard (MX Brown), Logitech G900 CHAOS SPECTRUM Wireless Mouse, Logitech G533 Headset

Β 

HTPC/Gaming Rig:

Ryzen 7 3700X CPU, ASRock B450M Pro4 mATX Motherboard, ADATA XPG GAMMIX D20 16GB (2x8GB) DDR4-3200 CL16 RAM, Mushkin PILOT 1TB SSD (boot), 2x Seagate BarraCuda 1 TB 3.5" HDD (data), Seagate BarraCuda 4 TB 3.5" HDD (DVR), PowerColor RX VEGA 56 8GB GPU, Fractal Design Node 804 mATX Case, Cooler Master MasterWatt 550 W 80+ Bronze Semi-modular ATX PSU, Silverstone SST-SOB02 Blu-Ray Writer, Windows 11 Pro, Logitech K400 Plus Keyboard, Corsair K63 Lapboard Combo (MX Red w/Blue LED), Logitech G603 Wireless Mouse, Kingston HyperX Cloud Stinger Headset, HAUPPAUGE WinTV-quadHD TV Tuner, Samsung 65RU9000 TV

Link to comment
Share on other sites

Link to post
Share on other sites

5 minutes ago, Kid.Lazer said:

You actually have that backwards, a "sponsor.pdf" file would appear as "sponsor.pdf.exe".

Watch the video they posted a link to.

Β 

CPU: Intel i7 6700kΒ  | Motherboard: Gigabyte Z170x Gaming 5 | RAM: 2x16GB 3000MHz Corsair Vengeance LPX | GPU: Gigabyte Aorus GTX 1080ti | PSU: Corsair RM750x (2018) | Case: BeQuiet SilentBase 800 | Cooler: Arctic Freezer 34 eSports | SSD: Samsung 970 Evo 500GB + Samsung 840 500GB + Crucial MX500 2TB | Monitor: Acer Predator XB271HU + Samsung BX2450

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, Spotty said:

Watch the video they posted a link to.

Yeah, I already did that. πŸ™‚

Primary Gaming Rig:

Ryzen 5 5600 CPU, Gigabyte B450 I AORUS PRO WIFI mITX motherboard, PNY XLR8 16GB (2x8GB) DDR4-3200 CL16 RAM, Mushkin PILOT 500GB SSD (boot), Corsair Force 3 480GB SSD (games), XFX RX 5700 8GB GPU, Fractal Design Node 202 HTPC Case, Corsair SF 450 W 80+ Gold SFX PSU, Windows 11 Pro, Dell S2719DGF 27.0" 2560x1440 155 Hz Monitor, Corsair K68 RGB Wired Gaming Keyboard (MX Brown), Logitech G900 CHAOS SPECTRUM Wireless Mouse, Logitech G533 Headset

Β 

HTPC/Gaming Rig:

Ryzen 7 3700X CPU, ASRock B450M Pro4 mATX Motherboard, ADATA XPG GAMMIX D20 16GB (2x8GB) DDR4-3200 CL16 RAM, Mushkin PILOT 1TB SSD (boot), 2x Seagate BarraCuda 1 TB 3.5" HDD (data), Seagate BarraCuda 4 TB 3.5" HDD (DVR), PowerColor RX VEGA 56 8GB GPU, Fractal Design Node 804 mATX Case, Cooler Master MasterWatt 550 W 80+ Bronze Semi-modular ATX PSU, Silverstone SST-SOB02 Blu-Ray Writer, Windows 11 Pro, Logitech K400 Plus Keyboard, Corsair K63 Lapboard Combo (MX Red w/Blue LED), Logitech G603 Wireless Mouse, Kingston HyperX Cloud Stinger Headset, HAUPPAUGE WinTV-quadHD TV Tuner, Samsung 65RU9000 TV

Link to comment
Share on other sites

Link to post
Share on other sites

Better solution would be using sand boxed environment for youtube upload mount a local drive to that enviroinment/ VM

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, Harsha Vardhan said:

Better solution would be using sand boxed environment for youtube upload mount a local drive to that enviroinment/ VM

If you isolate/sandbox the system that is uploading videos to youtube then it only stops them from hijacking the Youtube channel. The computer that the malware was on would potentially still expose other sensitive data and accounts. It would make more sense to isolate/sandbox the system that is downloading the files from potentially unknown sources that way even if the system is infected it doesn't have access to any other data or accounts.

CPU: Intel i7 6700kΒ  | Motherboard: Gigabyte Z170x Gaming 5 | RAM: 2x16GB 3000MHz Corsair Vengeance LPX | GPU: Gigabyte Aorus GTX 1080ti | PSU: Corsair RM750x (2018) | Case: BeQuiet SilentBase 800 | Cooler: Arctic Freezer 34 eSports | SSD: Samsung 970 Evo 500GB + Samsung 840 500GB + Crucial MX500 2TB | Monitor: Acer Predator XB271HU + Samsung BX2450

Link to comment
Share on other sites

Link to post
Share on other sites

6 hours ago, tartan said:

how many times do think linus had the heart dropping feeling last night?

precisely 22.879

Link to comment
Share on other sites

Link to post
Share on other sites

Do Linus Media Group not have Cyber Incident Insurance to cover for this type of thing? I have no idea how much adsense money was lost from the outage but I can't imagine it's negligible. Seems a little bit brave given the size of the company not to insure yourself against hacks and such.

Β 

There's a lot of providers out there, and a lot of them will provide their own training material and tests for your employees, where employees passing tests adds discounts to the monthly premium.

Link to comment
Share on other sites

Link to post
Share on other sites

As really thinking about it their are easy possible security features that you think should be in place that aren't , kina makes you wonder why aren't they a thing and what is more important to youtube .

Link to comment
Share on other sites

Link to post
Share on other sites

4 hours ago, DrHax34 said:

I'm pretty sure you can't use external IdPs with youtube account. If you can, there are more alternatives apart from Okta like AzureAD, Auth0, etc.

Sincerely i don't know about youtube but maybe the application that they are using for the content creators have some external idp feature. In any case they can use it for secure gsuite and more apps.

Β 

In any case the actual solutions are Okta Workforce, Auth0 (more for b2c applications and it's an okta product now), AzureAD and Ping Identity (ofc there are other more but i'm talking about the most famous and Gartner reviews).

Β 

All depends on what you need.

Link to comment
Share on other sites

Link to post
Share on other sites

When changing a password, why isn't there an option to log out of all current sessions? It would basically force all session tokens to be invalid and stop this dead in it's tracks.

Link to comment
Share on other sites

Link to post
Share on other sites

Zipped malware can slip through mail filters, but a good anti-malware tool on the endpoint should have caught that crap once triggered.Β  Anyone know what was running on the endpoint?

Link to comment
Share on other sites

Link to post
Share on other sites

Points that might be interesting or helpful, (Obviously would have been better if I'd posted this last week)

1) We use Panda Systems Management security software that does not allow you to run any software that is not on the approved list, even if you unwittingly download an innocent looking file that turns out to not be innocent then it will get blocked and your Tech team get notified

2) Outgoing firewall with rules that a) automatically update and b) include known sites and addresses involved in malware so that the outgoing traffic can be blocked.Β  You're never going to 100% block everything but any improvement is an improvement, or better still, some form of ML based rules that understands where you normally connect to and raises an alert for out of the ordinary traffic.Β  Something like thisΒ https://shop.opnsense.com/product/etpro-telemetry/Β might be a good place to start (not affiliated)

2) That was very brave knowing your systems were compromised yet not putting pants on first!Β  Not sure if your home surveillance has remote access that uses session ids like youtube but you could have got more videos back on youtube than you were expecting...

Β 

Hope the rest of the process goes well.

C

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


Γ—