Linus Tech Tips & Techquickie is Breached

Azure

Level 28
Verified
Top Poster
Content Creator
Oct 23, 2014
1,714
Anyone here know if Webroot Identity Shield could have protected those session cookies?
 
  • Like
Reactions: Templarware

marksti64

Level 2
Thread author
Sep 13, 2022
56
Anyone here know if Webroot Identity Shield could have protected those session cookies?
I'm guessing probably not, but I think most AVs wouldn't be able to protect those cookies, maybe mark it as suspicious behavior. Bad actors will find ways to get around the antivirus. This could make an interesting discussion though..
 

Trident

Level 34
Verified
Top Poster
Well-known
Feb 7, 2023
2,349
I'm guessing probably not, but I think most AVs wouldn't be able to protect those cookies, maybe mark it as suspicious behavior. Bad actors will find ways to get around the antivirus. This could make an interesting discussion though..
There is a way to control access to these cookies with Kaspersky Application Control and premium Avast has a way to block access to browser repositories. So users are not really powerless.
 

Trident

Level 34
Verified
Top Poster
Well-known
Feb 7, 2023
2,349
So, what about browser-based password managers like Bitwarden or even Google's/Edge's own password manager? Are they also vulnerable to this attack?
They are, look at StealC analysis. Scroll down to the tables to see what’s affected. The browser’s own password manager is what will get exfiltrated first. I’ve played with malware of this sort and it takes seconds, but also it can be tested on any.run. Once you execute it, both passwords and more crucially, session cookies from a huge variety of browsers are gone.

 
Last edited:

goodjohnjr

Level 5
Verified
Jul 11, 2018
227
Some of these new types of attacks are scary, annoying, et cetera.

More things need to be done natively to help protect against these types of attacks, and free cybersecurity training / recommendations for the public needs to be updated & shared better to help educate the public for these newer types of attacks.

I did not learn about this situation until after work today when I watched this YouTube video:

Channel With 15MIL Subs: DELETED:

 
F

ForgottenSeer 98186

The best advise is to use a laptop based on linux/mac/chrome os for managing this content and never open important accounts on a Windows-based PC. If you don’t click on links in emails, it greatly reduces the risk.
In 10 years, only 55 security exploits have been documented for ChromeOS. Apple’s OSX has 2,212 listed vulnerabilities from 1999 until today and Microsoft Windows has 6,814 since 1999.
 
Last edited by a moderator:

Trident

Level 34
Verified
Top Poster
Well-known
Feb 7, 2023
2,349
The vulnerabilities in Chrome and Chrome OS are also relatively short-lived and hard to uncover/exploit.
The platform’s small and quick updates leave little room for CVE exposure.
Very high level of skills is required there, as opposed to Windows, where without exploiting vulnerabilities, an attacker can just smuggle an executable or 2 in various fragmented scripts and stages. The result is then what we are discussing on this thread.
 

piquiteco

Level 14
Verified
Top Poster
Well-known
Oct 16, 2022
624
Large Youtube channels are high value users for hackers because they have high visibility to the public, in this case it is recommended to use Google Advanced Protection Program to secure your account, using hardware security keys like yubikey, Titan key like MFA/2FA whenever possible. Another thing to do is always log out of your account to close the session or clear your browser cookies when you close it. Ideally, you should use the browser in Anonymous Mode, and never mark your device as trusted. I understand that doing this is inconvenient, today we have a plethora of dedicated password managers that have been developed for this purpose. Your Google account with MFA enabled and protected by security keys is more convenient than MFA by token generated by Authenticator app. The yubikey for example you just have to physically tap with your finger to get past the second factor and quickly login to your account is simple, convenient and more secure. ;)
 

piquiteco

Level 14
Verified
Top Poster
Well-known
Oct 16, 2022
624
If Linus Tech Tips had Hard_Configurator or OSArmor installed on his computer he would have blocked it from opening the file disguised as a PDF and he would have no problems. Note: I am not advertising OSArmor or Hard_Configurator, just citing it as an example. People like him who receive hundreds of e-mails a day should not trust only an AV, in this case he would have to have an extra security layer, which would have blocked the .SCR file from passing itself as Windows screensaver, an extension format that is used in Windows since it was released. Another important thing, do not use the Windows operating system to open e-mails, important things, bank accounts such as accessing internet banking. Microsoft Windows operating system is very popular, it is the most targeted by Malware so better avoid using it @Trident said this in the post #32 to use Linux/Mac/Chrome OS based operating system and he is correct the chance of you falling into a trap like this falls drastically. No operating system is perfect, but perhaps in this particular Linus scenario, if the Malware was designed to only run on Windows, to a person with a Mac, Linux or Chrome OS it would be useless. These were my impressions. I hope he solved the problem on his Youtube channel. Guys every time I see a PDF file, I'll check the file properties just to make sure it's not cloaked by the .SCR before opening it lol :LOL:
1679902953365.png
 

Nikos751

Level 20
Verified
Malware Tester
Feb 1, 2013
970
I wonder if ESET banking protection which is by default always on, would block that malware from reading the credentials from cookies.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top