Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security

Linus Tech Tips' YouTube Channel Was Hacked (overclock3d.net) 59

New submitter Kitkoan writes: Hackers had gained control of Linus Tech Tips' YouTube channel to promote a cryptocurrency scam. Earlier on Thursday, hackers had gained control of the Linus Tech Tips YouTube channel and used it to promote a fake crypto giveaway that falsely used the name of Elon Musk and the Tesla brand (obviously without the permission of either party). Thankfully, the Linus Tech Tips crew quickly worked to re-establish control of the channel, but not before the channel had started two live streams to promote AI, chat GPT, Bitcoin, and their aforementioned (fake) crypto giveaway.
This discussion has been archived. No new comments can be posted.

Linus Tech Tips' YouTube Channel Was Hacked

Comments Filter:
  • "...but not before the channel had started two live streams to promote AI, chat GPT, Bitcoin, and their aforementioned (fake) crypto giveaway."

    Uh, don't they have like millions of YT followers? (not that I could confirm, finding the channel is a bit difficult right now.)

    So much for relying on your fan base to you know, maybe give you a heads-up before multiple live streams kick off that appear quite out of the ordinary...

    • For every fan, there's probably 100 visitors stumbling on it for a review of some product they want.
    • Re: Uh, fans? (Score:5, Informative)

      by AutoTrix ( 8918325 ) on Thursday March 23, 2023 @04:08PM (#63394055)
      Fans were spending their own money to keep the live chat full of comments about how it was scam to prevent people from falling victim
      • Fans were spending their own money to keep the live chat full of comments about how it was scam to prevent people from falling victim

        Weird how no one could find an email address or contact info for the channel owner for a more direct approach.

        Also seems like YT is more concerned about being MAFIAAs bodyguard and serving copyright takedown notices rather than having a mechanism in place to report what would appear to be an obvious scam and takeover of a well-known channel.

        Hope the AAR results in some kind of better controls other than "keep the live chat full of comments".

        • by Kokuyo ( 549451 )

          Wow, it's crazy how there's always so.eone who would have solved a crisis so much better and faster.

          • Wow, it's crazy how there's always so.eone who would have solved a crisis so much better and faster.

            Point to where the comment hurt you, or wouldn't help prevent the problem next time.

            Common F. Sense will wait.

        • by laxguy ( 1179231 )

          yeah im sure the channel owner is going to stop the live stream to check their email periodically and hopefully find the message that says their live stream audio was out... yeah thats totally better than a LIVE CHAT mentioning it to the person LIVE with specific notifications available to make it VERY OBVIOUS that is happening CURRENTLY

          • yeah im sure the channel owner is going to stop the live stream to check their email periodically and hopefully find the message that says their live stream audio was out... yeah thats totally better than a LIVE CHAT mentioning it to the person LIVE with specific notifications available to make it VERY OBVIOUS that is happening CURRENTLY

            YouTube itself was not taken over, so again my comment stands. So much for a "If you see something, say something" policy of reporting.

            Sorry, but when it becomes that obvious that a takeover is happening (as in multiple live streams), then YouTube itself should have the equivalent of a "911" type of reporting via multiple methods.

            The current "solution" smacks of kids standing around filming someone being assaulted instead of actually trying to help the victim and teach others how to DO MORE next time to c

  • I thought it was pretty flashy, but not that good. Putting it in the same basket with the crypto-scam is a bit surprising though.

  • I've seen this happen several channels I've followed. Usually it starts with them being tricked into installing malicious software by targeted phishing or using google ads to trick people into downloading modified versions of popular software. Once the software is installed, the hackers have remote access and will eventually gain access their accounts, usually starting with Gmail. They use their YouTube access to trick people to purchase crypto or who knows what because Elon musk is saying you will get d
  • Cookie Hijacking? (Score:5, Interesting)

    by organgtool ( 966989 ) on Thursday March 23, 2023 @04:18PM (#63394103)
    I have no idea who "ThioJoe" is, but he claims on his Twitter feed [twitter.com] that the attack vector was cookie hijacking.

    If that's the case, not even MFA can prevent the attack. Regardless of whether or not this was the attack vector, does anyone know of any protections that users and/or web site admins/developers can do to protect against cookie hijacking?
    • Err, don't get your computer controlled by malicious software?

      • I believe there are other ways of hijacking cookies than malware installed on your device. According to the Wikipedia page for Firesheep [wikipedia.org], cookies from other devices on the same WiFi network can be hijacked. However, the page is short on details. Is it only unencrypted WiFi? Would WPA3's Wi-Fi Device Provisioning Protocol prevent that attack vector? Could secure cookies provide safety from cookie hijacking on WiFi devices that don't support WPA3?

        Once an organization becomes large enough, infections b
      • Err, don't get your computer controlled by malicious software?

        (Me) *Don't ask it man...just don......dammit, I can't help myself*

        Was he running...Linux?

    • A popular Chrome extension called "get cookies.txt" recently turned full malware, sending identifying header information and all your cookies to some third party site. Most users of the extension were using it for tube downloader clients (the most popular OSS version even linked to the extension on its GitHub, since until recently the extension was safe and useful).

      If TFA was actually recent and not from two years ago, I'd say that it probably stemmed from that - but it's a two year old incident, so who eff

      • A popular Chrome extension called "get cookies.txt" recently turned full malware...

        Written like the t-virus finally made it's way to the brain and went full Resident Evil.

        The hell causes that? Supply chain hack in the formerly benign code or what?

    • does anyone know of any protections that users and/or web site admins/developers can do to protect against cookie hijacking?

      Nope, but I do know one that browser developers could use on Android, at least: Token binding using the hardware-backed keystore. Token binding couples an asymmetric key pair with the cookie, and requires a challenge/response authentication, with the client using the private key to sign the server's challenge (can also just use the key pair for mTLS). If the key pair is in the hardware-backed keystore it is bound to the device and barring a pretty deep exploit (deeper than the kernel), the private key canno

    • 1: Your daily driver should not be trusted with critical accounts, it is the most likely system you use to get infected
      2: Only access critical accounts from a "closed" system
      2a: No remote access potential (ssh, IPMI, VNC, RPD, etc) and no services/open ports.
      2b: Minimize hardware use, no USB, no bluetooth, no wifi if you're on ethernet.
      3: Minimize use of the high security system - it is only used to access your critical infrastructure/accounts. It does not get random software installed. It does no
    • On the server side. You have to do something like lock cookie sessions to IPs. This is problematic on systems that frequently change IPs like on mobile networks, so it is not generally done. But it probably should be an option on high security accounts.
    • Cookie compromised!

      https://www.reddit.com/r/itsau... [reddit.com]

  • by NewtonsLaw ( 409638 ) on Thursday March 23, 2023 @04:41PM (#63394211)

    Why doesn't YT require users to re-authenticate whenever their IP number associated with a sesseion changes?

    This would effectively circumvent the session-cookie vulnerability (thanks to 2FA) and although it might be a little inconvenient for those who are jumping around using different networks, that would be a small price to pay for patching this gaping hole in security!

    • Prolly cost money.
    • by Jezral ( 449476 )

      ...it might be a little inconvenient for those who are jumping around using different networks...

      Such as everyone working via 5G or everyone behind ISP NAT. If we were on IPv6 then this would work, but with IPv4 the IP is sadly not guaranteed to remain stable. Tying credentials to the IP would be a massive inconvenience for a lot of people - many more than you think.

      This has been true since the dialup days, and only IPv6 has a chance of fixing it.

    • by youn ( 1516637 )

      There is not enough details on the actual attack but assuming one device is compromised on that network (router, iot...), they could be used as a proxy and provide the same ip address.

      With that said, YouTube likely do something like that where they try to find patterns like that but it's tricky because ip addresses change/ people move from network to network. Also they likely have multiple servers and it may take time to propagate information like that so it could be a tradeoff for performance.

      so, it may no

  • Woke up this morning, Breakfast, shower, check YT and LTT's entire freaking catalogue is up in the screen, drowning EVERYTHING out.

    Got my first call of the day, came back and refreshed. All gone.

  • Linus not finding any way to directly contact anyone at Google.

  • APK could have saved Linus if he would have just shared his divine hosts file gospel.

    Sadly Lord APK has been missing so yet another youtuber has had to fall victim. ;-(

  • I saw a couple of videos from Tesla in my feed. I thought it was Google being scummy inserting ads in the new videos from subscribed channels list. It was just Linus being negligent, but not outside the realm of possibility for Google.

UNIX was not designed to stop you from doing stupid things, because that would also stop you from doing clever things. -- Doug Gwyn

Working...