Jump to content

My Channel Was Deleted Last Night.

CPotter

Was wearing my WAN Hoodie at Disneyland today and had 4 people over the day ask if I heard about the hack 😅

See I'm a 21st century digital boy,
I don't know how to live but I've got a lot of toys. 

Link to comment
Share on other sites

Link to post
Share on other sites

11 hours ago, Arika S said:

why does Linus look like Walterific?

It's a Gaelic hair style, it used to be common.

A PC Enthusiast since 2011
AMD Ryzen 7 5700X@4.65GHz | GIGABYTE GTX 1660 GAMING OC @ Core 2085MHz Memory 5000MHz
Cinebench R23: 15669cb | Unigine Superposition 1080p Extreme: 3566
Link to comment
Share on other sites

Link to post
Share on other sites

10 hours ago, earthman06 said:

Thats interesting.

Im not an av expert, but what you are describing sounds to me like how sandbox works. Functionality is great, but at the cost of performance. 

How is Cylance performance overall from your impressions?

I worked for one of the bigger cybersecurity companies in the past and now run IT so need to make decisions that affect big networks.  Cylance has little impact on system performance and still my preferred endpoint AV product. 

Link to comment
Share on other sites

Link to post
Share on other sites

9 hours ago, captain_to_fire said:

I'm pretty sure that is not true. While every endpoint protection program uses so-called "ML algorithms, pattern matching, and cloud sandbox detonation", they still have to use signatures to rapidly inoculate other users from the said malware. If patient 0 was infected by a new malware with detection evasion techniques, that AV would still lock that file and upload it to a remote sandbox for detonation or if it needs manual intervention of a security analyst, then they deploy signatures to inoculate others. Heck even those so called ML detection algorithms require new signatures made by human experts because malefactors will always try to figure out how an AV algorithms work until they can bypass them. That's how all AV programs work. Now if a company has an EDR sensor, then it can spot changes into endpoints regardless if the EPP was able to detect it or not.

 

https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2018/02/Emotet-fig4-Windows-Defender-AV-cloud-protections-service-2.png

https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2018/02/Emotet-fig1-layered-machine-learning-models-funnel-3.png

No, they don't have to use signatures.  We have big parts of our network (the OT network) that has no internet access no automated updates, no sandbox, and the system works as designed. 

Link to comment
Share on other sites

Link to post
Share on other sites

Without reading the rest of this thread in case it was already mentioned, nor being familiar with youtube content manager accounts, and having only watched the video, I assume Linus resetting his password didn't invalidate the session the hacker was using was because they were using a sub account, so having a button to invalidate all sessions with any level of permissions may have helped?

 

I'm not sure what the better solution Google has in the works is, but off the top of my head this is how I would solve it, which AFAIK does not exist yet (verified with 5 minutes of searching), and am curious what others here think of this idea.

 

Basically if you could add a physical key like yubikey as another factor, you could set a very short expiry on all session tokens, say 5 minutes, and have them automatically check the security key to automatically issue new sessions, this way you don't run into notification or password fatigue. So basically the previous session + yubikey can create a new session without needing your password. For the case of actively running malware constantly grabbing the new session, require everyone to remove their yubikeys from their machines when they're done working to prevent this sort of thing from happening at night, or have the machines automatically hibernate when inactive.

Link to comment
Share on other sites

Link to post
Share on other sites

On 3/27/2023 at 1:24 PM, Biohazard777 said:

Just a heads up @CPotter, @LinusTech
searching for Techquickie and Techlinked channels still shows the Tesla logo:

image.thumb.png.424b229953eebd4cd3c467a53653e2c4.png

 

 

image.thumb.png.7969b7599ad6c41b0290c25ea2ffdac0.png

 

Tried from Incognito / Private browser mode, 2 browsers, with a VPN from a couple of different countries...
So this seems not to be just a local cache or regional server cache issue.

I think it is just a YouTube being a mess issue.

I’m guessing LMG want to fix it, but can’t.

Link to comment
Share on other sites

Link to post
Share on other sites

So just learned that one of the first things Linux tried was signing out all devices, but due to how broken YouTube is, it would not let him.

Talk about f*** ups. Wow, YT.

Link to comment
Share on other sites

Link to post
Share on other sites

6 hours ago, CoolJosh3k said:

So just learned that one of the first things Linux tried was signing out all devices, but due to how broken YouTube is, it would not let him.

Talk about f*** ups. Wow, YT.

I think it was because it was another account that had permissions on the channel, I am pretty sure Google lets you invalidate all active sessions to sign out everywhere, and does this when you change your password (active sessions are tracked server side and can be invalidated before expiry). However other sites like wordpress don't have this ability, so the session token is valid until it expires (14 days I think?), and all "signing out" does is delete the session token locally, but if there's a copy of it somewhere else it is still valid for the remainder of the 14 days (active sessions are not tracked server side).

Link to comment
Share on other sites

Link to post
Share on other sites

9 hours ago, norgaladir said:

I think it was because it was another account that had permissions on the channel, I am pretty sure Google lets you invalidate all active sessions to sign out everywhere, and does this when you change your password (active sessions are tracked server side and can be invalidated before expiry). However other sites like wordpress don't have this ability, so the session token is valid until it expires (14 days I think?), and all "signing out" does is delete the session token locally, but if there's a copy of it somewhere else it is still valid for the remainder of the 14 days (active sessions are not tracked server side).

Whether it would have signed out everyone and not just the owner isn’t the point. Linus said that due to the activity happening many functions just timed out and gave errors.

This says to me that a bad actor can manipulate the system by overloading it such that the owner cannot access features they need.

 

I would expect any site with a log out feature to actually invalidate the session from their server. If not, then this makes session hijacking much more damaging at the fault of the platform.

Link to comment
Share on other sites

Link to post
Share on other sites

LTT is now officially too big to not have a cybersecurity team. This should be a wake up call to Linus about hiring one, that could have been much worse.

Link to comment
Share on other sites

Link to post
Share on other sites

  • 2 weeks later...

So, I just had this happen to me... able to bypass my 2FA and changed my Google information... YouTube channel was deactivated, and the associated email was changed to a new gmail domain and locked with a USB key. Does anybody know what else I can possibly do? Finding this out on a Fridayevening, so Google won't even have any humans available until Monday. :\

Link to comment
Share on other sites

Link to post
Share on other sites

On 4/15/2023 at 2:44 PM, NeekoLionheart said:

So, I just had this happen to me... able to bypass my 2FA and changed my Google information... YouTube channel was deactivated, and the associated email was changed to a new gmail domain and locked with a USB key. Does anybody know what else I can possibly do? Finding this out on a Fridayevening, so Google won't even have any humans available until Monday. 😕


That is quite a mess and Google most certainly should have had reauthorisation required for something as major as that.

Do what you can to at least regain access, then consider a backup service for everything Google/YouTube, such as forwarding through ProtonMail.

 

A very strong and free AV scan be be done with KVRT: https://www.kaspersky.com.au/downloads/free-virus-removal-tool and is good for a pass over your system. It is likely to catch malware even the best (and still very reliable) security software will miss.

 

Certainly mention stuff like the LMG hack, and other examples, when talking to Google/YouTube. The hardest part will be getting in through to someone who can actually do something.

 

It is terrible that such major changes to an account security can happen without any double-checks, but to then make it so incredibly difficult to do any sort of recovery is just not acceptable.

 

Keep us up to date on how things go with this. It could serve as a good example and useful information, while we in turn might be able to help you recover.

Link to comment
Share on other sites

Link to post
Share on other sites

  • 3 weeks later...

Hello Linus. My friends channel suffered the same thing and he has been trying to get it back to no avail. He had his channel (Living on the land/hunting and trapping in Canada's Northwest Territories) The Wild North for more than a decade but has had no success in opening communications with youtube to be able to have his channel reinstated. Hoping there might be something you and your team could do to help him as all two youtubers in our little town of less than 3000 don't seem to have a lot of... voice.

I was granted the honor of doing an edit for him and have one of his videos on my channel to show you the sort of content he was offering, which was a great educational asset for northerners, and those who may not know about northern cultures and practices.

Here is a link to the video I edited for Andrew.  If you think there is anything you may be able to do to help with his situation, please feel free to message me and I will put you in contact with him ASAP.

Thank you in advance for your time.

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

  • 2 months later...

Here's another little guy that git hacked just like you:

 

https://www.youtube.com/@TesIa_US.2023/

 

It used to be a guy who made videos about fixing up old tools.  But he had 15k subscribers, not 15M.  17 years of work lost.  LTT seems to be sympathetic to the plight of the little guy in this situation; can you help, or report here a better way of reporting hacked YT channels since your incident?  Because Google still doesn't have a "I think this channel has been hacked" path in their abuse UX.

http://dnighswander.blogspot.com is the guy's blog.  He's made a new channel at https://www.youtube.com/@DavidMNighswander-ir7os .  Can anyone help him?

image.png.f314069969093f53a513516fb3a59f3b.png

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


×