Google Warns High-Profile YouTube Accounts About Cookie-Stealing Malware

Google’s Threat Analysis Group (TAG) discovered on Wednesday, Oct.20 that several hackers were using cookie-stealing malware to exploit high-profile users on YouTube.

Mostly, the latest phishing attack involves a series of crypto scams that emerge from ripped-off YT channels.

YouTube Channels Hacked By Pass-the-Cookie Attack

Google Warns High-Profile YouTube Accounts About Cookie-Stealing Malware

(Photo : Ilya Pavlov from Unsplash)
Google discovered several hacking cases involving the YouTube accounts of high-profile users. According to the security team, the Russians attackers are responsible for the recent malware attack.

According to a report by Threatpost, Google’s security researchers discovered that the cybercriminals have been carrying out their operations since 2019. On Russian-speaking forums, the search engine giant also spotted that there were several threat actors recruited to launch these attacks.

The hackers utilized fake ads or bogus landing pages and accounts, in addition to phishing emails that would steal users’ information. The main target of the criminals is the YouTube content creators who have a huge number of subscribers.

Some of the tools that Google noticed during the incident are Vidar, Nexus stealer, Vikro Stealer, Kantal, Grand Stealer, RedLine, and a lot more. Sorano and AdamantiumThief, an open-source code was also observed during the attack.

After injecting the malware into the systems, the hackers could now obtain the user’s data. They could also manage the cookies of the victims through the cookie-stealing malware.

According to TAG Security Engineer Ashley Shen, since the technique has been around for many years because of multi-factor authentication (MFA), cyber attackers have come up with a unique way of hacking through social engineering.

Shen added that the cookie-stealing malware could steal both cookies and passwords of a user, particularly in YouTube. The team also saw some anti-sandboxing methods in the recent attack such as IP loading download, enlarged files, and archive encryption.

Google Detects At Least 1,011 Domains and 15,000 Actor Accounts

The Google security team did not only find out the obvious attackers in the Russian forums but also the number of threat…


Journalist warns Missouri about security breach. He’s threatened with criminal charges. – East Bay Times

JEFFERSON CITY, Mo. (AP) — Gov. Mike Parson on Thursday condemned the St. Louis Post-Dispatch for exposing a flaw in a state database that allowed public access to thousands of teachers’ Social Security numbers, even though the paper held off from reporting about the flaw until after the state could fix it.

Parson told reporters outside his Capitol office that the Missouri State Highway Patrol’s digital forensic unit will be conducting an investigation “of all of those involved” and that his administration had spoken to the prosecutor in Cole County.

The governor suggested that the Post-Dispatch journalist who broke the story committed a crime and said the news outlet would be held accountable.

The state’s schools department had earlier referred to the reporter who broke the story as “a hacker.”

The Post-Dispatch broke the news about the security flaw on Wednesday. The newspaper said it discovered the vulnerability in a web application that allowed the public to search teacher certifications and credentials.

It notified the Department of Elementary and Secondary Education and gave it time to fix the problem before the story was published.

After removing the pages from its website Tuesday, the agency issued a news release that called the person who discovered the vulnerability a “hacker” — an apparent reference to the reporter — who “took the records of at least three educators.” The agency didn’t elaborate as to what it meant by “took the records” and it declined to discuss the issue further when reached by The Associated Press.

The Post-Dispatch journalist found that the school workers’ Social Security numbers were in the HTML source code of the pages. It estimated that more than 100,000 Social Security numbers were vulnerable.

Source codes are accessible by right-clicking on public webpages.

The newspaper’s president and publisher, Ian Caso, said in a statement that the Post-Dispatch stands by the story and  journalist Josh Renaud, who he said “did everything right.”

“It’s regrettable the governor has chosen to deflect blame onto the journalists who uncovered the website’s problem and brought it to the Department of Elementary…


Homeland Security Warns of Cyberattacks Intended to Kill People

Homeland Security Secretary Alejandro Mayorkas is warning that the next cyberattack could end up killing people — a dangerous and imminent shift from ransomware to “killware.”

In an interview with USA Today, Mayorkas noted that the Colonial Pipeline ransomware attack in April, which shut down much of the gas supply along the East Coast, was distracting from a far more egregious hack.

“And that is an attempted hack of a water treatment facility in Florida, and the fact that that attack was not for financial gain but rather purely to do harm,” he told the newspaper.

The hack almost led to the contamination of much of the water supply in Oldsmar, Florida, with a remote hacker attempting to increase the amount of sodium hydroxide 100 fold. The chemical, more commonly known as lye, is lethal at higher undiluted concentrations.

“The attempted hack of this water treatment facility in February 2021 demonstrated the grave risks that malicious cyber activity poses to public health and safety,” Mayorkas told USA Today. “The attacks are increasing in frequency and gravity, and cybersecurity must be a priority for all of us.”

Thanks to the rise of internet-connected devices all across America, hackers have far more potential weaknesses to exploit.

Eventually, cyber attackers could end up posing a very real threat. In a July report, security firm Gartner warned that “cyber attackers will have weaponized operational technology environments to successfully harm or kill humans” by 2025.

Even more worrying than the Oldsmar incident is the potential of hackers targeting hospitals. Such an attack could lead to patients suffering grave long-term consequences to their health and even risk dying.

Worse yet, private healthcare providers are often not reporting ransomware hacks to the government, according to USA Today.

Earlier this month, a woman sued a hospital after it failed to report a ransomware attack that reportedly led to the death of her newborn child. Hackers gained control over the Springhill Medical Center in Alabama back in 2019. The hospital never acknowledged the attack, according to The Wall Street Journal.

According to Gartner’s report, it will soon make financial sense to…


Expert warns users to look out for text message scams

TULSA, Okla. — Experts are warning people not to trust just any link that comes their way in a text message.

One woman says that’s what happened to her when she got a text saying someone was trying to sign in to her Amazon account.

Melinda says she clicked on the link and provided just enough info for the crook to raid her checking account, stealing several hundred dollars before she closed the account.

“I feel like an idiot,” Melinda says.

“You hear about people getting scammed all the time. I never thought it would be me. They just caught me at the wrong time.”

The wrong time for Melinda turned out to be the perfect time for scammers who bombard people with their urgent-sounding fake texts.

“Most of the time they can be malicious,” says Tyler Moore, a Professor of Computer Science and Cyber Security at the University of Tulsa.

“When people see texts, they don’t think it’s going to be dangerous. You maybe know not to click on links in an email, but for some reason, you don’t make the same association with a link that comes in a text.”

Moore warns folks about texts with links from unknown numbers.

But be leery, too, he says, about texts from numbers or people you recognize as those links can end up being dangerous as well.

“Maybe send then another text saying, ‘what’s this about?’ or call them on the phone,” Moore says.

“We used to actually talk on the phone, you can use it as a chance to talk to someone, ‘hey did you really send me this link?'”

No matter how urgent the text sounds experts say don’t click on any links.

Contact the Problem Solvers:

Stay in touch with us anytime, anywhere —