Linus Tech Tips & Techquickie is Breached

Trident

Level 28
Verified
Top Poster
Well-known
Feb 7, 2023
1,737
Any technical explanation?
Eset has exlained it:
ESET Smart Security Premium and ESET Internet Security contain a built-in list of predefined websites that will trigger a secure browser to open. You can add a website or edit the list of websites in the product configuration.

They don’t mention managing access to credentials anywhere. They just open certain websites in secure environment. If you always bank via this feature, cookies may be protected. But criminals will be mainly interested in opening your email. From there, they will gain access to everything else. They will also exfiltrate saved passwords in various managers.
 

Nikos751

Level 20
Verified
Malware Tester
Feb 1, 2013
969
Eset has exlained it:
ESET Smart Security Premium and ESET Internet Security contain a built-in list of predefined websites that will trigger a secure browser to open. You can add a website or edit the list of websites in the product configuration.

They don’t mention managing access to credentials anywhere. They just open certain websites in secure environment. If you always bank via this feature, cookies may be protected. But criminals will be mainly interested in opening your email. From there, they will gain access to everything else. They will also exfiltrate saved passwords in various managers.
It's actually on for all browsing
 

Attachments

  • f2.png
    f2.png
    28.1 KB · Views: 54

Trident

Level 28
Verified
Top Poster
Well-known
Feb 7, 2023
1,737
It's actually on for all browsing
It only gets triggered when you open a banking website (as per Eset website). And even if it was triggered on all sites, Eset doesn’t prevent programs from accessing your browsers repository. You should be able to create a HIPS rule that will do that but banking protection is a gimmick and won’t help you against these attacks. Attackers will copy the whole browser repository and Eset will just be sitting there.

You see those switches that say “Enhanced Memory Protection, Keyboard protection”.
The cookies are neither in memory, nor is is the user typing them. They are in this folder:
%APPDATA%/Google/Chrome.
 
  • Like
Reactions: Nikos751

Nikos751

Level 20
Verified
Malware Tester
Feb 1, 2013
969
It only gets triggered when you open a banking website (as per Eset website). And even if it was triggered on all sites, Eset doesn’t prevent programs from accessing your browsers repository. You should be able to create a HIPS rule that will do that but banking protection is a gimmick and won’t help you against these attacks. Attackers will copy the whole browser repository and Eset will just be sitting there.

You see those switches that say “Enhanced Memory Protection, Keyboard protection”.
The cookies are neither in memory, nor is is the user typing them. They are in this folder:
%APPDATA%/Google/Chrome.
I know how this works, I just didn't study the malware's behaviour. Even priviledge escalation is not necessary I think.. thanks!
 
  • Like
Reactions: Trident

Trident

Level 28
Verified
Top Poster
Well-known
Feb 7, 2023
1,737
I know how this works, I just didn't study the malware's behaviour. Even priviledge escalation is not necessary I think.. thanks!
It is very common behaviour to copy the browser repositories and even cheap RATs like njRAT which is widely available cracked would do the job. UAC doesn’t work against njRAT and it would copy information from ALL user accounts even if you set the folder only accessible by a specific user.
 
  • Like
Reactions: Nikos751

Nikos751

Level 20
Verified
Malware Tester
Feb 1, 2013
969
I wonder if cr
It is very common behaviour to copy the browser repositories and even cheap RATs like njRAT which is widely available cracked would do the job. UAC doesn’t work against njRAT and it would copy information from ALL user accounts even if you set the folder only accessible by a specific user.
Despite Edge uses Credential Manager sth not being used by other browsers, all browsers repos login data can bring hackers the actual credentials
.
At last, caution and malware definitions is the way to go i guess.
 

Trident

Level 28
Verified
Top Poster
Well-known
Feb 7, 2023
1,737
I wonder if cr

Despite Edge uses Credential Manager sth not being used by other browsers, all browsers repos login data can bring hackers the actual credentials
.
At last, caution and malware definitions is the way to go i guess.
More recent stealers target some third party managers as well. So yeah, caution and AV identification is the way to go definitely.
 
  • Like
Reactions: Nikos751
F

ForgottenSeer 98186

lol, Linus Techtips has had revenue of 5+ million euros per year for a while.

Linus himself has been a multi-millionaire for at least the past 10 years off his channel.
 

wat0114

Level 12
Verified
Top Poster
Well-known
Apr 5, 2021
571
The best advise is to use a laptop based on linux/mac/chrome os for managing this content and never open important accounts on a Windows-based PC. If you don’t click on links in emails, it greatly reduces the risk.

In these forums and others, it's funny how at least someone mentions the numerous vulnerabilities and LOLBins in Linux compared to Windows, yet if you stick to recommended repositories and keep it updated, Linux is a completely worry-free OS. I run Linux with kernel based Apparmor-enforced browsers (most likely way overkill), UFW with default-deny out/In, and apply all updates in a timely manner, which btw install significantly faster than the snail pace of Windows updates, and there is nothing to worry about. Security in Linux is actually boring because little is needed to keep it secure. With no more than 2% user base, no one cares to go after it. Yes, "security thorough obscurity" really is a thing :LOL:
 

Digmor Crusher

Level 23
Verified
Top Poster
Well-known
Jan 27, 2018
1,264
I can say the same about Windows though, worry free, boring and secure. I have a 11 year old desktop that runs W10, boots in 15 seconds, loads web pages instantly and runs every program I need. Windows updates never give me any issues and I have no issues with security, whether I'm running FSecure, Microsoft Defender , Voodoo Shield, Malwarebytes, Configure Defender or Simple Windows Hardening its basically all quite on the western front, no issues, no infections, no nothing. Plus with Windows I actually have options for any programs I want to install.
 

Nikos751

Level 20
Verified
Malware Tester
Feb 1, 2013
969
More recent stealers target some third party managers as well. So yeah, caution and AV identification is the way to go definitely.
I wonder if it’s that easy to steal and decrypt credentials data in Linux too.
 
  • Like
Reactions: Trident

Trident

Level 28
Verified
Top Poster
Well-known
Feb 7, 2023
1,737

Nikos751

Level 20
Verified
Malware Tester
Feb 1, 2013
969
There are some stealers.
it's interesting though, that when having saved passwords in Windows 11 browsers, and tried using browserpassview utility by Nirsoft, I noticed the following:
Edge: (custom primary password or device password or no password) & (sync on or off): the utility managed to decrypt my password
Firefox: no sync & (master password or no master password): the utility managed to decrypt my passwordFirefox: sync on & (no master password: the utility managed to decrypt my logins
Firefox: sync on & master password): the utility did not manage to decrypt my logins
Chrome: sync on (there is no master password option) The utility managed to decrypt my logins
Nirsoft tool is a specific simplistic tool, for legit usage, so no serious assumption can be made granted that the behaviour could be just a bug (I dont know what exactly firefox master password protects), but this behaviour maybe is a indication of Firefox with sync & master password is more secure than Edge with same settings.
 
Last edited:

vtqhtr413

Level 26
Verified
Top Poster
Well-known
Aug 17, 2017
1,491
Hijacking a YouTube channel without a password | Kaspersky official blog
A couple of months ago, the popular tech blogger Linus Tech was hacked. All three of his YouTube channels (the biggest of which boasts over 15 million subscribers) fell into the hands of cybercriminals, who began broadcasting streams with crypto-scam ads. How did the hackers manage to gain access to the channels? Didn’t the famous tech-blogger protect his accounts with a strong password and two-factor authentication? Of course he did (at least, that’s what he himself says).

Linus Tech fell victim to a pass-the-cookie attack, a common method for targeting YouTubers. In this post we take a closer look at the objectives and motives behind such attacks, how hackers can access channels without knowing password and second factor, what Google’s doing about it, and how not to fall victim to this attack.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top