1603
Be careful. (feddit.org)
submitted 5 days ago by 101@feddit.org to c/technology@lemmy.world
top 50 comments
sorted by: hot top controversial new old
[-] Kethal@lemmy.world 195 points 5 days ago* (last edited 5 days ago)

It seemed odd to me that a Web site could write to or read from the clipboard without the user approving it. That would be a pretty obvious security and privacy issue. From what I gather, on Chrome sites can write to the clipboard without approval, but they need approval to read. ~~On Firefox and others any access requires permission. Thus this exploit seems limited to Chrome users.~~

@SkaveRat pointed out that it doesn't require permission, only interaction. So likely there's a button that's clicked that writes to the clipboard, and most browsers are susceptible to this.

[-] SkaveRat@discuss.tchncs.de 174 points 5 days ago

not when there was a user intent like clicking a button.

For example in this screenshot, it's likely that there's only the "verify I'm human" button first, you click it, the steps pop up, and at the same time the command ist copied into your clipboard

[-] MeatsOfRage@lemmy.world 91 points 5 days ago* (last edited 5 days ago)

Exactly, copy requires a click but there's no rule that the copy button has to look like anything particular

load more comments (1 replies)
load more comments (9 replies)
load more comments (1 replies)
[-] ghurab@lemmy.world 123 points 5 days ago

This reminds of when I was 13 I used to tell my opponents in Warcraft 3 that pessing alt+q+q quickly reveals the map. It's a shortcut for closing the game. Worked way to many times

I do see this working

[-] lurch@sh.itjust.works 47 points 5 days ago

btw if you want to try and hack me, my IP is 127.0.0.1

[-] TwanHE@lemmy.world 54 points 5 days ago

ALT+F4 for free funds, opened alot of slots on bfh servers whenever my friends couldn't join.

[-] theangryseal@lemmy.world 41 points 5 days ago

Haha, god I loved doing this on Counter-Strike. “Did you guys hear about the hidden tit pics in counter strike? No shit, hold alt and press f4 and it shows the best tits I’ve ever seen. I don’t know how game developers get away with this stuff.”

Half the lobby is gone, the other half is laughing.

load more comments (1 replies)
[-] PM_Your_Nudes_Please@lemmy.world 35 points 4 days ago* (last edited 4 days ago)

Yeah, and you can dupe items in RuneScape by dropping them and pressing Alt+F4. Don’t worry, I’ll stand way over here to prove I’m not trying to steal it. If I try to pick up the item you’ll see me move, and you can just pick it up first.

[-] _bcron@lemmy.world 49 points 4 days ago

The day of a new patch in WoW I said in general chat "wow, they finally put a confirmation when you type /gquit , crazy how long it took" and sit in town and watch peoples guild names disappear

load more comments (5 replies)
[-] BetaDoggo_@lemmy.world 129 points 5 days ago

This is actually pretty smart because it switches the context of the action. Most intermediate users avoid clicking random executables by instinct but this is different enough that it doesn't immediately trigger that association and response.

[-] Interstellar_1@lemmy.blahaj.zone 142 points 5 days ago
load more comments (17 replies)
[-] seth@lemmy.world 111 points 5 days ago

Followed instructions but verification failed, seems like nothing happened except dick got stuck in toaster again. Using Arch, btw.

load more comments (1 replies)
[-] LillyPip@lemmy.ca 62 points 4 days ago

Kinda brilliant to disguise malware as a captcha, though. I won’t be surprised.

[-] SpaceCowboy@lemmy.ca 28 points 4 days ago

We now need a "verify you are a captcha" mechanism to counter this.

That’s so sassy I kinda respect it.

Too bad for those who fall for it.

[-] Hikermick@lemmy.world 57 points 4 days ago

Usually I warn my 81 year old dad about these scams. Don't think I need to worry about this one, he wouldn't be tech savvy enough to find the windows button

[-] TwoBeeSan@lemmy.world 11 points 4 days ago* (last edited 4 days ago)

When I saw a women get hacked aftermath. They installed remote access software, however in her downloads you could see the 10 duplicates.

The scum fuck scammer on the phone had to spend at least 45 minutes trying to get them to navigate to their downloads and run the installer.

Our elders are safe from this one lol

load more comments (1 replies)
load more comments (1 replies)
[-] sugar_in_your_tea@sh.itjust.works 88 points 5 days ago

I almost fell for an unrelated scam just a couple months ago. Basically, I was on vacation visiting family, had just gotten a new phone (w/ GrapheneOS, so it didn't have Google's network of spam detection), and was out and about at the time. Here's how it went down:

  1. received text earlier that day saying that my CC was used for an unauthorized purchase (happens a couple times/year)
  2. got a call from someone claiming to be my bank (not one of the popular chains like Chase or whatever)
  3. caller asked me to verify myself through text code, and I didn't read the text message carefully and provided it (later inspection showed that it was a password reset code)
  4. after going through some (fake) recent transactions, I told them they all sounded fraudulent (they were on the other side of the country)
  5. they asked me to confirm myself again through another code to finalize, at which point I told them they don't need a second code since I already proved my identity, and they hung up

I immediately went to go reset my password and found I was locked out, so I called my bank. They confirmed that my account had been automatically locked for suspicion of fraud (good job!!) and confirmed what I suspected, the scammer had reset my password (first code) and was attempting to add an external account (second code). Had I given them that second code, they likely would have been able to submit the transfer and it would've been a giant headache to try to get that money back.

I didn't lose anything and I immediately improved the security on my account, but I felt like an idiot for letting them get that far. I had also recently consolidated my other accounts to this one, so this would've been a big blow. They changed my account numbers, I changed my username and password, and they held my account for a week or so to ensure everything was good. This bank is one of the few that actually cares about security, so I set up voice recognition (they said they track it anyway, this just turns on an extra feature) and Symantec VIP (I prefer my regular TOTP app, but they don't support that).

I don't think it'll happen to me again, but I was still surprised that I got so far through the process before recognizing that it's a scam. And I consider myself pretty security conscious (e.g. I use TOTP everywhere, password manager, keep credit bureaus frozen, etc). I guess they got my info from a breach somewhere because they knew my name, my username (to be fair, I used it everywhere), and the bank I use (could've gotten lucky). I have since changed most of my usernames to be random, so hopefully I'll be more safe going forward.

Anyway, stay on your guard, it can happen to you.

[-] LiveLM@lemmy.zip 39 points 5 days ago

Pro-tip: Whenever you receive a call/text/email from "your bank" saying something is wrong, don't interact!

Open their app/website or call them yourself to verify.

load more comments (1 replies)
[-] dan@upvote.au 31 points 5 days ago* (last edited 4 days ago)

I set up voice recognition

This feature is extremely insecure now that there's several AIs that can replicate voices. If a scammer calls you and you say a few words (like if you say "hello" and "sorry, I think you've got the wrong number"), a recording of that can be enough for them to replicate your voice.

This happened at my workplace. An attacker got into someone's Schwab account by calling Schwab support and successfully getting past the voice verification, and attempted to transfer $100k (from a recent stock sale) out of their account. It took a bit of effort but they managed to get all the money back.

Schwab sent out a bulk email to everyone at my company saying they're improving their security as a result, but I'm not sure if they've actually improved it. They're still promoting this insecure feature.

load more comments (3 replies)
[-] MystikIncarnate@lemmy.ca 26 points 5 days ago

Your story reminds me of something that my bank started doing. I got a robocall about something to do with my credit card, and the voice said to verify using x and y using my keypad, I think it was day/month/year of birth or something and I immediately noped out of the call. I hit all the wrong buttons until it got me to a person and I ripped them apart, and their supervisor for basically training their userbase to answer security questions given by an automatic voice on the other end of the line with no way to verify who is calling.

You can spoof your caller ID, you can get a text to speech robocall bot with DTMF recognition and just spam call a whole area where the bank operates and gather a bunch of personal information because it sounds just like the bank and there's no way to prove who called.

What a crock of shit. It's a security nightmare.

I did call my bank after at a known valid number, verified them as they verified me, and there was something going on, so the call was legit, and totally unacceptable.

These clowns want us to trust them completely, and give us no reason to do so, but they want us to bend over backwards to validate ourselves. Fuck that.

load more comments (5 replies)
load more comments (23 replies)
[-] Tylerdurdon@lemmy.world 98 points 5 days ago

So inventive these guys. If only we could harness that ingenuity for the common good instead, it would have a huge impact.

[-] CosmicTurtle0@lemmy.dbzer0.com 56 points 5 days ago

Fwiw there are a large number of people who volunteer their time and effort toward worthwhile projects. It's just they don't get rewarded anywhere near the level of benefit that they provide.

load more comments (3 replies)
[-] GraniteM@lemmy.world 53 points 5 days ago

"To prove that you are human, donate $$$ to Doctors Without Borders."

"To prove that you are human, register to vote."

"To prove that you are human, adopt a pet from the local animal shelter."

load more comments (5 replies)
[-] JohnyRocket@discuss.tchncs.de 36 points 4 days ago

/s no I wouldn't actually implement it

load more comments (2 replies)
[-] RandomVideos@programming.dev 22 points 4 days ago

I cant believe they made captcha that only works on windows

load more comments (2 replies)
[-] cmrn@lemmy.world 65 points 5 days ago

As someone tech literate that looks hilarious to follow through with.

But if not, that really does seem similar to a normal captcha with fairly simple steps.

[-] ZILtoid1991@lemmy.world 44 points 4 days ago

Instructions were unclear, ransomware dev now owes me 0.15 bitcoin.

[-] Binette@lemmy.ml 42 points 5 days ago

That is extremely hilarious

[-] dan@upvote.au 83 points 5 days ago

Except for the fact that a lot of less tech savvy people will fall for it.

[-] daniskarma@lemmy.dbzer0.com 9 points 4 days ago

Ok, that is kind of clever.

Though I suppose even the dumbest user will chicken out once the terminal pops out.

[-] Wispy2891@lemmy.world 4 points 3 days ago

With that shortcut only a tiny run window will appear and not the scary terminal

load more comments (1 replies)
[-] ColdWater@lemmy.ca 22 points 4 days ago

I tried it and it's not working for me, my terminal is super+T and paste is Ctrl+Shift+V

[-] tb_@lemmy.world 12 points 4 days ago

Win + R isn't the terminal but rather the run command.

load more comments (5 replies)
[-] rickyrigatoni@lemm.ee 31 points 5 days ago
[-] x00za@lemmy.dbzer0.com 36 points 5 days ago

Anybody got more info on the actual payload?

powershell.exe -eC [payload_w_base64] is mentioned here.

-eC just means encoded command afaik.

load more comments (4 replies)
[-] potentiallynotfelix@lemmy.fish 22 points 4 days ago

its not working, my krunner bind is windows+d

load more comments (2 replies)
[-] zephorah@lemm.ee 34 points 5 days ago

That’s going to catch some people, especially older ones.

load more comments (1 replies)
[-] pewgar_seemsimandroid@lemmy.blahaj.zone 20 points 4 days ago* (last edited 4 days ago)

ah, think this is like one of those survey scams.

load more comments
view more: next ›
this post was submitted on 14 Sep 2024
1603 points (99.1% liked)

Technology

58132 readers
4284 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS