#Tech Support
Explore tagged Tumblr posts
funnefox · 7 hours ago
Text
Stay safe, everyone!
Cybercriminals are abusing Google’s infrastructure, creating emails that appear to come from Google in order to persuade people into handing over their Google account credentials. This attack, first flagged by Nick Johnson, the lead developer of the Ethereum Name Service (ENS), a blockchain equivalent of the popular internet naming convention known as the Domain Name System (DNS). Nick received a very official looking security alert about a subpoena allegedly issued to Google by law enforcement to information contained in Nick’s Google account. A URL in the email pointed Nick to a sites.google.com page that looked like an exact copy of the official Google support portal.
As a computer savvy person, Nick spotted that the official site should have been hosted on accounts.google.com and not sites.google.com. The difference is that anyone with a Google account can create a website on sites.google.com. And that is exactly what the cybercriminals did. Attackers increasingly use Google Sites to host phishing pages because the domain appears trustworthy to most users and can bypass many security filters. One of those filters is DKIM (DomainKeys Identified Mail), an email authentication protocol that allows the sending server to attach a digital signature to an email. If the target clicked either “Upload additional documents” or “View case”, they were redirected to an exact copy of the Google sign-in page designed to steal their login credentials. Your Google credentials are coveted prey, because they give access to core Google services like Gmail, Google Drive, Google Photos, Google Calendar, Google Contacts, Google Maps, Google Play, and YouTube, but also any third-party apps and services you have chosen to log in with your Google account. The signs to recognize this scam are the pages hosted at sites.google.com which should have been support.google.com and accounts.google.com and the sender address in the email header. Although it was signed by accounts.google.com, it was emailed by another address. If a person had all these accounts compromised in one go, this could easily lead to identity theft.
How to avoid scams like this
Don’t follow links in unsolicited emails or on unexpected websites.
Carefully look at the email headers when you receive an unexpected mail.
Verify the legitimacy of such emails through another, independent method.
Don’t use your Google account (or Facebook for that matter) to log in at other sites and services. Instead create an account on the service itself.
Technical details Analyzing the URL used in the attack on Nick, (https://sites.google.com[/]u/17918456/d/1W4M_jFajsC8YKeRJn6tt_b1Ja9Puh6_v/edit) where /u/17918456/ is a user or account identifier and /d/1W4M_jFajsC8YKeRJn6tt_b1Ja9Puh6_v/ identifies the exact page, the /edit part stands out like a sore thumb. DKIM-signed messages keep the signature during replays as long as the body remains unchanged. So if a malicious actor gets access to a previously legitimate DKIM-signed email, they can resend that exact message at any time, and it will still pass authentication. So, what the cybercriminals did was: Set up a Gmail account starting with me@ so the visible email would look as if it was addressed to “me.” Register an OAuth app and set the app name to match the phishing link Grant the OAuth app access to their Google account which triggers a legitimate security warning from [email protected] This alert has a valid DKIM signature, with the content of the phishing email embedded in the body as the app name. Forward the message untouched which keeps the DKIM signature valid. Creating the application containing the entire text of the phishing message for its name, and preparing the landing page and fake login site may seem a lot of work. But once the criminals have completed the initial work, the procedure is easy enough to repeat once a page gets reported, which is not easy on sites.google.com. Nick submitted a bug report to Google about this. Google originally closed the report as ‘Working as Intended,’ but later Google got back to him and said it had reconsidered the matter and it will fix the OAuth bug.
8K notes · View notes
bambilovesribbons · 2 days ago
Text
i made a new account incase this one gets banned but im kinda confused i clicked on the "create a new tumblr" button but is that making a new account or that like an extension to this account i dunno i need tech support but anyways the username is bambinotbimbo
also wtf how is this post potentially mature content is it because of the gif girl bye
Tumblr media
22 notes · View notes
teethstoobigmouthwontclose · 5 months ago
Text
Tumblr media Tumblr media
In a fantasy setting, my job would be exactly the same
33K notes · View notes
outsidewolves · 16 days ago
Text
Tumblr media
This is 40% of you
2K notes · View notes
cantotallyeven · 3 days ago
Note
Event logs and the digital panopticon where someone can be watching your screen remotely at any given moment
excuse me, i'm borrowing a work laptop and there's a wall to stop me from going to gaming sites. do you or anyone else have any suggestions to bypass the wall?
I would strongly recommend not trying to get around blocking rules on your work laptop because your work is almost certainly logging what happens on the laptop; if they check those logs at the very least you will no longer be allowed to borrow the laptop, and possibly you won't continue to have a work to borrow a laptop from.
Also, depending on how huge a deal anyone wants to make of this, it may be actually illegal to do this on someone else's computer (and even if they lent it to you, that is their computer, and what you are discussing is sometimes described as "unauthorized access" and is a no-shit crime; people also don't think that logging into an ex's email that they had the password to is a crime - it is. Don't do this shit)
You can do whatever you want on your own computer and your own network. If you are on somebody else's computer you have to follow their rules. This is annoying, but unless you are certain that you are good enough to do this in a way that will be completely undetectable to your employer, you shouldn't do this.
If you work someplace that provides you a computer for work, you should ONLY use that computer for work. Assume that your boss can see everything that you do on that work computer and act accordingly.
2K notes · View notes
prokopetz · 11 months ago
Text
There are people in this world who approach all communication as a form of intellectual combat which is "won" by deliberately providing the most obstructive and least informative possible answer which technically satisfies the precise letter of the stated request, and literally all of them are on Stack Overflow.
2K notes · View notes
fuckyeahgoodomens · 10 months ago
Text
Aziraphale and tech support :)
Tumblr media
1K notes · View notes
reelaroundthedavekan · 8 months ago
Text
Have you tried turning it on and off? You have? Have you tried turning it off and on? That too? Have you tried listening to "Bela Lugosi's Dead" by Bauhaus repeatedly alone in a darkened room? No? Well get back to me when you have.
560 notes · View notes
ovegakart · 1 year ago
Text
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
malon, local time expert
<previous / next>
first
3K notes · View notes
shroudthecursedone · 1 year ago
Text
668 notes · View notes
cirrus-grey · 7 months ago
Text
Tumblr media
The implication that Freddie changed Colin's ringtone is sending me
217 notes · View notes
loadingartist · 2 years ago
Text
Tumblr media
new comic! - user terror
I drew 3 bonus panels for this one, see em by becoming my patron ❤
1K notes · View notes
nixcraft · 2 months ago
Text
Tumblr media
79 notes · View notes
harald-iii-of-norway · 2 years ago
Text
Tumblr media
I have now obtained enough followers on tumblr dot com that I can force you all to look at my favorite image of all time
1K notes · View notes
prokopetz · 1 year ago
Text
One of the fun things about web development these days is that nothing is self-contained anymore and there are so many layers of middleware talking to middleware talking to middleware that even "turning it off and back on again" has become an expert-level troubleshooting step because identifying exactly what needs to be turned off and back on again is a process in itself. I've been on multiple calls today alone where the resolution to a tech support issue has been "we restarted the XYZ", and the response from the client's own developers, who presumably set the stupid thing up in the first place, has been "we have an XYZ?"
1K notes · View notes