#Hacking
Explore tagged Tumblr posts
Text
372 notes
·
View notes
Text
Stay safe, everyone!
Cybercriminals are abusing Google’s infrastructure, creating emails that appear to come from Google in order to persuade people into handing over their Google account credentials. This attack, first flagged by Nick Johnson, the lead developer of the Ethereum Name Service (ENS), a blockchain equivalent of the popular internet naming convention known as the Domain Name System (DNS). Nick received a very official looking security alert about a subpoena allegedly issued to Google by law enforcement to information contained in Nick’s Google account. A URL in the email pointed Nick to a sites.google.com page that looked like an exact copy of the official Google support portal.
As a computer savvy person, Nick spotted that the official site should have been hosted on accounts.google.com and not sites.google.com. The difference is that anyone with a Google account can create a website on sites.google.com. And that is exactly what the cybercriminals did. Attackers increasingly use Google Sites to host phishing pages because the domain appears trustworthy to most users and can bypass many security filters. One of those filters is DKIM (DomainKeys Identified Mail), an email authentication protocol that allows the sending server to attach a digital signature to an email. If the target clicked either “Upload additional documents” or “View case”, they were redirected to an exact copy of the Google sign-in page designed to steal their login credentials. Your Google credentials are coveted prey, because they give access to core Google services like Gmail, Google Drive, Google Photos, Google Calendar, Google Contacts, Google Maps, Google Play, and YouTube, but also any third-party apps and services you have chosen to log in with your Google account. The signs to recognize this scam are the pages hosted at sites.google.com which should have been support.google.com and accounts.google.com and the sender address in the email header. Although it was signed by accounts.google.com, it was emailed by another address. If a person had all these accounts compromised in one go, this could easily lead to identity theft.
How to avoid scams like this
Don’t follow links in unsolicited emails or on unexpected websites.
Carefully look at the email headers when you receive an unexpected mail.
Verify the legitimacy of such emails through another, independent method.
Don’t use your Google account (or Facebook for that matter) to log in at other sites and services. Instead create an account on the service itself.
Technical details Analyzing the URL used in the attack on Nick, (https://sites.google.com[/]u/17918456/d/1W4M_jFajsC8YKeRJn6tt_b1Ja9Puh6_v/edit) where /u/17918456/ is a user or account identifier and /d/1W4M_jFajsC8YKeRJn6tt_b1Ja9Puh6_v/ identifies the exact page, the /edit part stands out like a sore thumb. DKIM-signed messages keep the signature during replays as long as the body remains unchanged. So if a malicious actor gets access to a previously legitimate DKIM-signed email, they can resend that exact message at any time, and it will still pass authentication. So, what the cybercriminals did was: Set up a Gmail account starting with me@ so the visible email would look as if it was addressed to “me.” Register an OAuth app and set the app name to match the phishing link Grant the OAuth app access to their Google account which triggers a legitimate security warning from [email protected] This alert has a valid DKIM signature, with the content of the phishing email embedded in the body as the app name. Forward the message untouched which keeps the DKIM signature valid. Creating the application containing the entire text of the phishing message for its name, and preparing the landing page and fake login site may seem a lot of work. But once the criminals have completed the initial work, the procedure is easy enough to repeat once a page gets reported, which is not easy on sites.google.com. Nick submitted a bug report to Google about this. Google originally closed the report as ‘Working as Intended,’ but later Google got back to him and said it had reconsidered the matter and it will fix the OAuth bug.
7K notes
·
View notes
Text

laptop with seven fold-out screens
#cyberpunk#cyberpunk aesthetic#cyberpunkstyle#cyberpunk photography#cyberpunkedit#futuristic#laptop#hacking
36K notes
·
View notes
Text
Shoutout to gay furry hackers. In this house we support our troops 🫡
[Video ID: The Patriot Place / Gillette Stadium sign. On the digital screen, three images of furry art cycle. The third image has the text "Gay Furry Pride Bitches" on it. The person taking the video snorts with laughter when the third image appears on the screen]
24K notes
·
View notes
Text
OPINION: stop studying cybersecurity because of me
im trying to get u into activism, not college
#maia arson crimew#disclaimer: this is not about anyone in particular and was written weeks ago#this also contains basic resources to get into hacking for everyone whos asked for that#infosec#opinion#politics#hacking#hacking resources#resource#cybersecurity
4K notes
·
View notes
Text
Hackers (1995)
#hackers#cyberpunk aesthetic#macintosh#retro computing#cyber security#cyberpunk#cyberpunk movies#gifs#gifset#cyberspace#mac os#apple mac#hypercard#hacking#data security#e=mc2#floppy disk#dial up#90s#judge dredd
2K notes
·
View notes
Text






Hacking a Furby Connect
#stimboard#moodboard#stim#furby#furby connect#hacking#hacker#tech#screen#fur#pink#dancing#eyes#blue#black#white#green#flashing tw#glitch effect#visual stim
50 notes
·
View notes
Text
Hey y'all, there's been a zero-day vulnerability found in WinRAR, so you gotta update it if you're on an older version (anything below 6.24/6.23). It doesn't auto update so you need to do it manually. It's been around for a few months and has been fixed, but if you don't update your shit then your computer will still be vulnerable.
please reblog this so that people learn about it or whatever (10/19/23)
10K notes
·
View notes
Text

885 notes
·
View notes
Text
#fallout#fallout new vegas#fnv#joe biden#hacking#i unironically love this minigame tbh i love puzzles
10K notes
·
View notes
Text

Seriously.
808 notes
·
View notes
Text

Be poly, do crimes
#not even sure this is a crime honestly. Seems like it should be public record?#polyamory#hacking#police accountability#poly memes
569 notes
·
View notes
Text
The batcomputer has a child lock on it, it's a right of passage for all the robins to hack their way past it.
They all did it, most within a few weeks of getting there, batman is nonthewiser
Damian thinks he hacked it the youngest, but out of respect for his father he waited a few months to a year to hack it (don't get me wrong, he COULD HAVE hacked it day one, but he respects batman enough to wait the longest) and Tim did it before he even became Robin, like a month after he started stalking them at 8 years old, so no one knows it but Tim was the youngest one to hack the computer.
Thank you for listening to my insane ramblings
#tim drake#red robin#robin#rr#chaotic tim drake#batfam#damian wayne#batman and robin#batman#batcomputer#hacking#dc
1K notes
·
View notes
Text

laptop with seven fold-out screens
#cyberpunk#cyberpunk plaza#cybernetics#cyberpunkstyle#cyberpunk aesthetic#cyberpunk photography#cyberpunk art#futuristic#cyberpunk is now#laptop#hacking
3K notes
·
View notes
Text
Are the tech bros just mad at trans people because trans women are better at hacking and netsec than cis men?
I mean we know this to be a documented medical fact, but I didn’t think it’d have such a long tail of effects
155 notes
·
View notes