Jump to content

My Channel Was Deleted Last Night.

CPotter
12 hours ago, StyleTec said:

I am not aware of the mail infrastructure at LMG, but the YARA engine can also be unsed in other setups aswell, with some overhead on how integrate the engine properly.

Judging by screenshots Linus has shared, I believe they use Google Workspace.

Slade Watkins • he/him/they/them

Link to comment
Share on other sites

Link to post
Share on other sites

"No one enters their log in info every time they visit a website"

 

Me:

monkey.jpg

System Specs: Second-class potato, slightly mouldy

Link to comment
Share on other sites

Link to post
Share on other sites

52 minutes ago, Kilrah said:

If you click on it you'll see it directs you to the actual LTT channel.

yeah, i just looked again and i get the same now

before (when i posted) i did not get that

Edited by lukeis2k20
Link to comment
Share on other sites

Link to post
Share on other sites

Will the uncensored video be on Onlyfans @LinusTech

Getting giggity gig like Quagmire – Wild For The Night (Freestyle)Download Quagmire Giggity Wallpaper 240x320 | Wallpoper #30411

PC - NZXT H510 Elite, Ryzen 5600, 16GB DDR3200 2x8GB, EVGA 3070 FTW3 Ultra, Asus VG278HQ 165hz,

 

Mac - 1.4ghz i5, 4GB DDR3 1600mhz, Intel HD 5000.  x2

 

Endlessly wishing for a BBQ in space.

Link to comment
Share on other sites

Link to post
Share on other sites

2 hours ago, bluehawk said:

 

Next up Linus creates a smart turret system for his home defense 

its just a cyber hand... that has the curse of linus ...  where it will drop something.

MSI x399 sli plus  | AMD theardripper 2990wx all core 3ghz lock |Thermaltake flo ring 360 | EVGA 2080, Zotac 2080 |Gskill Ripjaws 128GB 3000 MHz | Corsair RM1200i |150tb | Asus tuff gaming mid tower| 10gb NIC

Link to comment
Share on other sites

Link to post
Share on other sites

I was reminded that it happened to a JRPG YouTuber I follow. Yeah it's just shocking how craven these scammers have become, and how easy the tricks they deploy are way closer than you think.

Link to comment
Share on other sites

Link to post
Share on other sites

One can only aspire to be as free as this guy walking out of the bedroom a 3AM with not even underwear. Does that mean he sleeps naked? 

Intel® Core™ i7-12700 | GIGABYTE B660 AORUS MASTER DDR4 | Gigabyte Radeon™ RX 6650 XT Gaming OC | 32GB Corsair Vengeance® RGB Pro SL DDR4 | Samsung 990 Pro 1TB | WD Green 1.5TB | Windows 11 Pro | NZXT H510 Flow White
Sony MDR-V250 | GNT-500 | Logitech G610 Orion Brown | Logitech G402 | Samsung C27JG5 | ASUS ProArt PA238QR
iPhone 12 Mini (iOS 17.2.1) | iPhone XR (iOS 17.2.1) | iPad Mini (iOS 9.3.5) | KZ AZ09 Pro x KZ ZSN Pro X | Sennheiser HD450bt
Intel® Core™ i7-1265U | Kioxia KBG50ZNV512G | 16GB DDR4 | Windows 11 Enterprise | HP EliteBook 650 G9
Intel® Core™ i5-8520U | WD Blue M.2 250GB | 1TB Seagate FireCuda | 16GB DDR4 | Windows 11 Home | ASUS Vivobook 15 
Intel® Core™ i7-3520M | GT 630M | 16 GB Corsair Vengeance® DDR3 |
Samsung 850 EVO 250GB | macOS Catalina | Lenovo IdeaPad P580

Link to comment
Share on other sites

Link to post
Share on other sites

34 minutes ago, BlueChinchillaEatingDorito said:

One can only aspire to be as free as this guy walking out of the bedroom a 3AM with not even underwear. Does that mean he sleeps naked? 

Linus confirmed to bone

 

Link to comment
Share on other sites

Link to post
Share on other sites

14 hours ago, s3r4pH said:

A VPN conceals your IP address and is a good protection if someone tries an attack.

Very few forms of attack rely on an IP address.

 

Session hijacking like Linus explained happened in this case, could not have been protected by a VPN.

 

In fact, despite how it is marketed, a VPN does very little to improve security. A real problem because it can cause an illusion of being safe, making a cyberattack more likely.

Link to comment
Share on other sites

Link to post
Share on other sites

Great to see you got the channel back and videos restored.

Link to comment
Share on other sites

Link to post
Share on other sites

Would this happen if they were using Macintoshes?

 

I know everyone says that Macs are "easily" hacked but don't ever see that.

 

Think about it.  He clicks a link, downloads a program and runs it.  You just can't do that on a Mac.  You literally have to enter the terminal to hack you own machine to allow it.

 

You don't have a chance in hell of doing that on an iPad.

 

But people always complain about closed ecosystems.  And Linus made fun of a feature which makes sure this stuff doesn't happen.  He made fun of having to literally drag the program icon to the application folder.  But that feature, which Linus made fun of, would have saved his channels.

 

If Linus can prove me wrong and have a special episode showing how this exact thing can happen to Macs, point it out,  I'd love to see it.

Link to comment
Share on other sites

Link to post
Share on other sites

20 minutes ago, JimmyJJones said:

Would this happen if they were using Macintoshes?

Yes. it's unrelated to the OS.

🌲🌲🌲

 

 

 

◒ ◒ 

Link to comment
Share on other sites

Link to post
Share on other sites

quick little insider tip from somebody who has had first hand experience speaking with and interacting with these bad actors who indulge in cryptocurrency scams: a lot of the channels hacked tend to be old youtube channels either claimed via "gaia link" or just from breaching the email connected to the channel through social engineering or data breaches.

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, matthewcantswim said:

quick little insider tip from somebody who has had first hand experience speaking with and interacting with these bad actors who indulge in cryptocurrency scams: a lot of the channels hacked tend to be old youtube channels either claimed via "gaia link" or just from breaching the email connected to the channel through social engineering or data breaches.

oh and also there are multiple forums ran by and accessed by a bunch of russians who are the main actors, lmfao

Link to comment
Share on other sites

Link to post
Share on other sites

Hey Linus,

 

Glad to know you were able to take back your channels! Well done! Now it is time for the lessons learned. Simple advise for you to create a security strategy for your organization (if you don't have it already :-))

 

1. Identify the crown jewels of Linus Tech Tips (where the most valuable data resides)

2. Segment your network (probably by function? Accounting, Engineering, Editing, etc,, etc,) 

3. Strongly protect, either via security hardware (preferred) or software, the identified crown jewels in step 1

4. Limit the number of people who can access the channel/s

5. Install SMB size EDRs, Log Management, Alert/Monitoring, etc., and either create a security department to manage those, or hire a Third Party to do the job

6. Create a Security Incident Response process as a way to have a detailed guide on what to do in these cases

7. Security awareness, as you mentioned in your video, learning the basics could enhance the identification of phishing mails, and other social engineering strategies.

8. Create/Register Linus Group for quarterly or twice a year phishing exercises

9. Practice, practice and practice will create the memory muscle required 

 

Any strategy (internally or externally managed) will give you some degree of peace of mind.

 

Regards,

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

3 hours ago, Adrian Stephenson said:

More clean-up work is needed at LTT. The scammers still have links on some videos.

Image1.jpg

Clearly YouTube can’t even restore things properly.

 

Link to comment
Share on other sites

Link to post
Share on other sites

5 hours ago, Arika S said:

Yes. it's unrelated to the OS.

The malware used to perform the attack is made for Windows. The vast majority of it will be.

 

Linux, Mac or other platforms would be much safer to manage accounts from.

Link to comment
Share on other sites

Link to post
Share on other sites

Long life session tokens create security issues especially for high risk groups like Linus Media Group. Any session should be short lived and require some form of authentication to continue use or make critical changes. I wonder if some sort of proxy can be done with Content Manager or something else to only have cookies that are only relevant to Content Manager or the proxy with no google relevant cookies stored on the end user browser. The real google cookies would be used by the proxy, safe from enemy hands. I use Traefik for Google SSO for my personal applications and am looking into Authelia but I don't think either can be used to manage the actual google cookies with any sort of ease of use. This is just an idea but not that easy to do in practice.

 

Employee training is critical. Periodic phishing exercises are common at my employer's. Tools such as Proofpoint are great at filtering potentially bad emails. It sits between the outside and the domain and provides a daily digest of blocked emails that have a score between 1 and 99. A score of 100 is determined to be bad for sure and never notifies the user. A score of 0 means it was sent to the user. This can all be managed in an admin console to see which emails were sent to the user and which were quarantined. There are also malware isolation tools that initially block downloads from either attachments or URLs. Users can then click exit to continue forward. This is great for accidental clicking and to make users think twice about going forward.

The best practice for every employee is to contact the sender from another channel like phone or IM to confirm if they indeed sent this to them. That thwarts attacks like this. Just like when the Bank calls you for your SSN. Hang up and call them back.

Link to comment
Share on other sites

Link to post
Share on other sites

I think you have shown one more time how this is an amazing company to work for and how a good business owner should think and treat their employees. When I saw your tweet I was puzzled seeing old videos in the cannel's homepage, then I realized that a new video talking about what happened would be available soon and that something to be learned was going to be in it.

Thank you.

Link to comment
Share on other sites

Link to post
Share on other sites

Maybe instead of getting emails with attachments for sponsorships they should setup a portal through which offers are submitted in text with only specific attachment types allowed. Content submitted to the portal can be opened in a computer or VM that's a sandbox and not logged into any accounts. Create a new position 'intake administrator' who's job it is to double check that things being passed onto the less technically savvy members of the team are clean.

Then lockdown incoming emails to strip or reject attachments to the marketing team. It'll make things slightly more annoying but it would entirely bypass this method of attack in the future or any copy-cat attempts which are going to be coming now.

 

I do wonder if maybe something like my old PFsense box which had virus scanning on the fly for all incoming/outgoing traffic might have picked up on something like this?

Link to comment
Share on other sites

Link to post
Share on other sites

image.png.f9f45f1081177503d92a8ac37359f915.png

A PC Enthusiast since 2011
AMD Ryzen 7 5700X@4.65GHz | GIGABYTE GTX 1660 GAMING OC @ Core 2085MHz Memory 5000MHz
Cinebench R23: 15669cb | Unigine Superposition 1080p Extreme: 3566
Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


×