[The security box] How hackers hijacked thousands of high-profile YouTube accounts

Jared Rimer jaredrimer at 986themix.com
Thu Oct 21 16:44:12 EDT 2021


Every time I look at the news, I always wonder if I'm done seeing 
everything.  But this, probably doesn't surprise me.

Jared Rimer
Check out my shows on 986 the mix. www.986themix.com/schedule for more 
info. Shows are on Wednesdays, Saturdays and Sundays
Wednesday's show is on the independent channel. Check schedule for time
www.jaredrimer.net for my other site.

On 10/21/2021 1:12 PM, Michael Brock via Thesecuritybox wrote:
> 
> How hackers hijacked thousands of high-profile YouTube accounts
> Ars Technica  /  WIRED
> 
> Spate of attacks turned creator channels into cryptocurrency scam 
> livestreams.
> 
> How hackers hijacked thousands of high-profile YouTube accounts
> Enlarge 
> <https://cdn.arstechnica.net/wp-content/uploads/2021/10/youtube-logo.jpg>
> 
> Since at least 2019, hackers have been hijacking high-profile YouTube 
> <https://www.wired.com/tag/youtube> channels. Sometimes they broadcast 
> cryptocurrency scams 
> <https://www.wired.com/story/cryptocurrency-scams-ico-trolling/>, 
> sometimes they simply auction off access to the account. Now, Google has 
> detailed 
> <https://blog.google/threat-analysis-group/phishing-campaign-targets-youtubers-cookie-theft-malware/> 
> the technique that hackers-for-hire used to compromise thousands of 
> YouTube creators 
> <https://www.wired.com/story/our-favorite-youtube-channels/> in just the 
> past couple of years.
> 
> Cryptocurrency scams and account takeovers themselves aren’t a rarity; 
> look no further than last fall’s Twitter hack for an example of that 
> chaos at scale. But the sustained assault against YouTube accounts 
> stands out both for its breadth and for the methods the hackers used, 
> and an old maneuver that’s nonetheless incredibly tricky to defend against.
> 
> It all starts with a phish 
> <https://www.wired.com/2017/03/phishing-scams-fool-even-tech-nerds-heres-avoid/>. 
> Attackers send YouTube creators an email that appears to be from a real 
> service—like a VPN, photo editing app, or antivirus offering—and offer 
> to collaborate. They propose a standard promotional arrangement: Show 
> our product to your viewers and we’ll pay you a fee. It’s the kind of 
> transaction that happens every day for YouTube’s luminaries, a bustling 
> industry of influencer payouts.
> 
> Clicking the link to download the product, though, takes the creator to 
> a malware landing site instead of the real deal. In some cases the 
> hackers impersonated known quantities like Cisco VPN and Steam games, or 
> pretended to be media outlets focused on COVID-19. Google says it has 
> found over 1,000 domains to date that were purpose-built for infecting 
> unwitting YouTubers. And that only hints at the scale. The company also 
> found 15,000 email accounts associated with the attackers behind the 
> scheme. The attacks don’t appear to have been the work of a single 
> entity; rather, Google says, various hackers advertised account takeover 
> services on Russian-language forums.
> 
> Once a YouTuber inadvertently downloads the malicious software, it grabs 
> specific cookies from their browser. These “session cookies” confirm 
> that the user has successfully logged in to their account. A hacker can 
> upload those stolen cookies to a malicious server, letting them pose as 
> the already authenticated victim. Session cookies are especially 
> valuable to attackers because they eliminate the need to go through any 
> part of the login process. Who needs credentials to sneak into the Death 
> Star detention center when you can just borrow a stormtrooper’s armor?
> 
> “Additional security mechanisms like two-factor authentication can 
> present considerable obstacles to attackers,” says Jason Polakis, a 
> computer scientist at the University of Illinois, Chicago, who studies 
> cookie theft techniques. “That renders browser cookies an extremely 
> valuable resource for them, as they can avoid the additional security 
> checks and defenses that are triggered during the login process.”
> 
> Such “pass-the-cookie” techniques have been around for more than a 
> decade, but they’re still effective. In these campaigns, Google says it 
> observed hackers using about a dozen different off-the-shelf and open 
> source malware tools to steal browser cookies from victims' devices. 
> Many of these hacking tools could also steal passwords.
> 
> “Account hijacking attacks remain a rampant threat, because attackers 
> can leverage compromised accounts in a plethora of ways,” Polakis says. 
> “Attackers can use compromised email accounts to propagate scams and 
> phishing campaigns or can even use stolen session cookies to drain the 
> funds from a victim’s financial accounts.”
> 
> Google wouldn’t confirm which specific incidents were tied to the 
> cookie-theft spree. But a notable surge in takeovers occurred in August 
> 2020 
> <https://www.businessinsider.com/youtube-channels-bitcoin-scammers-twitter-hack-2020-8>, 
> when hackers hijacked multiple accounts with hundreds of thousands of 
> followers and changed the channel names to variations on “Elon Musk” or 
> “Space X,” then livestreamed bitcoin giveaway 
> <https://www.wired.com/story/classic-scam-steals-bitcoin-on-twitter/> 
> scams. It’s unclear how much revenue any of them generated, but 
> presumably these attacks have been at least moderately successful given 
> how pervasive they became.
> 
> This type of YouTube account takeover ramped up in 2019 and 2020, and 
> Google says it convened a number of its security teams to address the 
> issue. Since May 2021 the company says it has caught 99.6 percent of 
> these phishing emails on Gmail, with 1.6 million messages and 2,400 
> malicious files blocked, 62,000 phishing page warnings displayed, and 
> 4,000 successful account restorations. Now Google researchers have 
> observed attackers transitioning to targeting creators who use email 
> providers other than Gmail—like aol.com, email.cz, seznam.cz, and 
> post.cz—as a way of avoiding Google’s phishing detection. Attackers have 
> also started trying to redirect their targets over to WhatsApp, 
> Telegram, Discord, or other messaging apps to keep out of sight.
> 
> “A large number of hijacked channels were rebranded for cryptocurrency 
> scam live-streaming,” Google TAG explains in a blog post 
> <https://blog.google/threat-analysis-group/phishing-campaign-targets-youtube-creators-cookie-theft-malware/>. 
> “The channel name, profile picture and content were all replaced with 
> cryptocurrency branding to impersonate large tech or cryptocurrency 
> exchange firms. The attacker live-streamed videos promising 
> cryptocurrency giveaways in exchange for an initial contribution.”
> 
> Though two-factor authentication can’t stop these malware-based cookie 
> thefts, it’s an important protection for other types of scams and 
> phishing. Beginning on November 1, Google will require YouTube creators 
> who monetize their channels to turn on two-factor for the Google account 
> associated with their YouTube Studio or YouTube Studio Content Manager. 
> It’s also important to heed Google’s “Safe Browsing” warnings about 
> potentially malicious pages. And as always, be careful what you click 
> and which attachments you download from your email.
> 
> The advice for YouTube viewers is even simpler: If your favorite channel 
> is pushing a cryptocurrency deal that seems too good to be true, give it 
> some Dramatic Chipmunk side eye and move on.
> 
> /This story originally appeared on wired.com 
> <https://www.wired.com/story/youtube-bitcoin-scam-account-hijacking-google-phishing/>./
> 
> 
> 
> Original Article: https://arstechnica.com/?p=1806361 
> <https://arstechnica.com/?p=1806361>
> 
> 
> Michael Brock
> 
> Thank you for subscribing to the Security Box email list.  If you need list management options, please see the link for a section to log in, manage your subscription, and possibly other options that may be of interest.
> 
> Need help?  write the owner, and the owner will get back to you as quickly as possible.  Be clear on what you need.
> 
> Thanks for subscribing!
> 




More information about the Thesecuritybox mailing list