There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

Kethal , (edited )

It seemed odd to me that a Web site could write to or read from the clipboard without the user approving it. That would be a pretty obvious security and privacy issue. From what I gather, on Chrome sites can write to the clipboard without approval, but they need approval to read. On Firefox and others any access requires permission. Thus this exploit seems limited to Chrome users.

@SkaveRat pointed out that it doesn’t require permission, only interaction. So likely there’s a button that’s clicked that writes to the clipboard, and most browsers are susceptible to this.

SkaveRat ,

not when there was a user intent like clicking a button.

For example in this screenshot, it’s likely that there’s only the “verify I’m human” button first, you click it, the steps pop up, and at the same time the command ist copied into your clipboard

MeatsOfRage , (edited )

Exactly, copy requires a click but there’s no rule that the copy button has to look like anything particular

dan , (edited )
@dan@upvote.au avatar

It doesn’t necessarily need a click - it can be triggered by a keypress too (eg at my workplace we have a few internal pages where you can press a keyboard shortcut to copy a shortened URL for the current page).

It has to be something the browser considers a user interaction, meaning the user has expressed an intent to perform the action. That’s usually a button press or keypress.

lando55 , (edited )

Why isn’t the default behavior for browsers to not allow access to the clipboard? Similar to how it prompts you for access to camera/microphone

Edit: On a per-site basis, like if you use the Zoom website it asks you for access to the webcam, would something like this work for clipboard as well or would it break stuff?

madcaesar ,

The browser can’t access your clipboard contents without permission, but it can place text into the clipboard.

The problem is people the talking the copied text and pasting it into the command prompt.

lando55 ,

Yeah that’s what I’m curious about; I’m used to copying code snippets or codes from websites by clicking a button (presumably through some browser API?), but am just now realizing that this in itself has security implications.

Using noscript or some such JS blocker would prevent this but break a lot of other things in the process. That’s why I’m wondering why the API isn’t locked down via some user prompt.

dan ,
@dan@upvote.au avatar

but it can place text into the clipboard.

Only as the result of a user interaction, for example by pressing a button.

schnurrito , (edited )

There is no inherent security problem with changing the content of the clipboard. That doesn’t do anything until the user pastes it somewhere; of course if that “somewhere” is a command prompt, then that is a security problem, but users really ought to check what they’re pasting there before they execute it (yeah, I know, “ought to”).

It would be possible to do it the way you say, but that would mean that the user would need to allow that for many websites; I don’t think copying from apps like Google Docs would work anymore, and “here’s your access token, click here to copy it to the clipboard” features certainly wouldn’t.

The screenshot in the OP would then probably be changed to include a step “click: allow clipboard access”; I think most people who fall for the screenshot in the OP would also fall for that.

MeatsOfRage ,

Exactly. Furthermore they’d probably just include it in those instructions “Step 1: when the box pops up with clipboard press allow”

Interstellar_1 ,
@Interstellar_1@lemmy.blahaj.zone avatar

That’s a sneaky one.

Kusimulkku , (edited )

You’re probably sarcastic but

paste this random line in the run prompt (or what’s it called) and run it

sneaky

Hmm

rhombus ,

It opens the run dialog, which I’m sure the vast majority of Windows users have never heard of. This would trick a lot of people who just trust whatever their computer asks them to do.

Kusimulkku ,

It’s not sneaky, it’s just people are morons and fall for the simplest shit

user224 ,
@user224@lemmy.sdf.org avatar

Not everyone knows everything. Actually, nobody does.

Computers simply became an easily available necessity, thus you get a lot of computer-illiterate people using computers.

Kusimulkku ,

Perhaps it would’ve been fairer to say that they’re morons when it comes to computers

Honytawk ,

Fairer to call at least 80% of people morons because they don’t know one specific computer feature that is mainly used just by IT people?

Seems like the only moron here is you.

Kusimulkku , (edited )

Of course it’s fairer. Before it meant that they’re all around idiots. Now it just says they’re idiots when it comes to computers. There might be aspects they’re not idiots in, but if they’re running random commands, computers isn’t one of them.

Seems like the only moron here is you.

Not when it comes to computers but in some other things for sure

notabot ,

Not morons, just not educated enough about them to understand exactly what the implications of that action are.

Kusimulkku ,

You’ve got to remember that these are just simple computer users. These are people of the land. The common clay of the new West.

can ,

Kinda like you when it comes to social interaction?

Kusimulkku ,

Oh snap!

yarrage ,

Are you by chance running Arch btw?

Kusimulkku ,

Hah, I used to

BetaDoggo_ ,

This is actually pretty smart because it switches the context of the action. Most intermediate users avoid clicking random executables by instinct but this is different enough that it doesn’t immediately trigger that association and response.

Tylerdurdon ,

So inventive these guys. If only we could harness that ingenuity for the common good instead, it would have a huge impact.

CosmicTurtle0 ,

Fwiw there are a large number of people who volunteer their time and effort toward worthwhile projects. It’s just they don’t get rewarded anywhere near the level of benefit that they provide.

sugar_in_your_tea ,

Yup, I used to do that as a hobby, but now that I have kids, I just don’t have the time. There’s no way I could do it full-time, so I have a regular 9-5 that pays reasonably well for a cause I don’t hate. For me, that’s enough.

I hope I can make enough at my day job to go back to working on FOSS projects before I lose my ability to write competent software.

CosmicTurtle0 ,

When you look at the value proposition purely from a capitalistic standpoint, I get why scammers and black hats exist. I just wish they could point their weapons toward the 1% and pull something similar to a Mr. Robot and redistribute their wealth.

slaacaa ,
XeroxCool ,

What’s the plagiarism machine, AI/LLM chatbots?

snekmuffin ,

mhm

Krzd ,
@Krzd@lemmy.world avatar

Yes

explodicle ,

I can’t even download and run the first two, those are business innovations! 🤮

Neon ,

Uber

Airbnb

Bitcoin?

LLMs?

GraniteM ,

“To prove that you are human, donate $$$ to Doctors Without Borders.”

“To prove that you are human, register to vote.”

“To prove that you are human, adopt a pet from the local animal shelter.”

OutlierBlue ,

“To prove that you are human, adopt a pet from the local animal shelter.”

I’ve got 22 cats already, but I need to check my email!

GraniteM ,

PLEASE ADOPT VERIFICATION CAT TO CONTINUE

seth ,

Followed instructions but verification failed, seems like nothing happened except dick got stuck in toaster again. Using Arch, btw.

bhamlin ,

You have to pacman -S femboy first.

cmrn ,

As someone tech literate that looks hilarious to follow through with.

But if not, that really does seem similar to a normal captcha with fairly simple steps.

ghurab ,

This reminds of when I was 13 I used to tell my opponents in Warcraft 3 that pessing alt+q+q quickly reveals the map. It’s a shortcut for closing the game. Worked way to many times

I do see this working

TwanHE ,

ALT+F4 for free funds, opened alot of slots on bfh servers whenever my friends couldn’t join.

theangryseal ,

Haha, god I loved doing this on Counter-Strike. “Did you guys hear about the hidden tit pics in counter strike? No shit, hold alt and press f4 and it shows the best tits I’ve ever seen. I don’t know how game developers get away with this stuff.”

Half the lobby is gone, the other half is laughing.

thermal_shock ,

was funny when someone said “alt f4” and 3 people immediately leave LOL

pyre ,

also makes the victims self selecting, much like the deliberate spelling errors in scam mails.

bhamlin ,

We’d constantly get people by telling them holding alt and typing fax would get mirc to give them ops. Usually about a quarter of the channel would drop out.

sugar_in_your_tea ,

I almost fell for an unrelated scam just a couple months ago. Basically, I was on vacation visiting family, had just gotten a new phone (w/ GrapheneOS, so it didn’t have Google’s network of spam detection), and was out and about at the time. Here’s how it went down:

  1. received text earlier that day saying that my CC was used for an unauthorized purchase (happens a couple times/year)
  2. got a call from someone claiming to be my bank (not one of the popular chains like Chase or whatever)
  3. caller asked me to verify myself through text code, and I didn’t read the text message carefully and provided it (later inspection showed that it was a password reset code)
  4. after going through some (fake) recent transactions, I told them they all sounded fraudulent (they were on the other side of the country)
  5. they asked me to confirm myself again through another code to finalize, at which point I told them they don’t need a second code since I already proved my identity, and they hung up

I immediately went to go reset my password and found I was locked out, so I called my bank. They confirmed that my account had been automatically locked for suspicion of fraud (good job!!) and confirmed what I suspected, the scammer had reset my password (first code) and was attempting to add an external account (second code). Had I given them that second code, they likely would have been able to submit the transfer and it would’ve been a giant headache to try to get that money back.

I didn’t lose anything and I immediately improved the security on my account, but I felt like an idiot for letting them get that far. I had also recently consolidated my other accounts to this one, so this would’ve been a big blow. They changed my account numbers, I changed my username and password, and they held my account for a week or so to ensure everything was good. This bank is one of the few that actually cares about security, so I set up voice recognition (they said they track it anyway, this just turns on an extra feature) and Symantec VIP (I prefer my regular TOTP app, but they don’t support that).

I don’t think it’ll happen to me again, but I was still surprised that I got so far through the process before recognizing that it’s a scam. And I consider myself pretty security conscious (e.g. I use TOTP everywhere, password manager, keep credit bureaus frozen, etc). I guess they got my info from a breach somewhere because they knew my name, my username (to be fair, I used it everywhere), and the bank I use (could’ve gotten lucky). I have since changed most of my usernames to be random, so hopefully I’ll be more safe going forward.

Anyway, stay on your guard, it can happen to you.

Telorand ,

The fact that many banks still don’t have at least app-based 2FA should be criminal.

LDerJim ,

How would that help in this case? “Sir, please accept the pop up from our app”

Telorand ,

I’m talking about TOTP in something like Bitwarden or Authy. You can still social engineer your way to getting a code, but a scammer would have to convince the user to reveal that secret, not just pretend to send a code.

LodeMike ,

Implementing the open source TOTP system would cost them money! They’ll rather keep paying SMS egress instead.

To be fair it’s probably way cheaper nowadays.

EngineerGaming ,
@EngineerGaming@feddit.nl avatar

App-based would be bad, as bank apps are notoriously unfriendly to people who don’t own Google/Apple smartphones. Rather, a TOTP or Yubikey.

Telorand ,

That’s what I mean by app-based. Something like Authy or Google Authenticator, etc.

MystikIncarnate ,

Your story reminds me of something that my bank started doing. I got a robocall about something to do with my credit card, and the voice said to verify using x and y using my keypad, I think it was day/month/year of birth or something and I immediately noped out of the call. I hit all the wrong buttons until it got me to a person and I ripped them apart, and their supervisor for basically training their userbase to answer security questions given by an automatic voice on the other end of the line with no way to verify who is calling.

You can spoof your caller ID, you can get a text to speech robocall bot with DTMF recognition and just spam call a whole area where the bank operates and gather a bunch of personal information because it sounds just like the bank and there’s no way to prove who called.

What a crock of shit. It’s a security nightmare.

I did call my bank after at a known valid number, verified them as they verified me, and there was something going on, so the call was legit, and totally unacceptable.

These clowns want us to trust them completely, and give us no reason to do so, but they want us to bend over backwards to validate ourselves. Fuck that.

peopleproblems ,

Step 3 was your earliest big clue. You’ll never give that to a person. You’ll only ever be asked to enter it on the website it originated from.

That being said, the other commentors are right too.

bamboo ,

FWIW this isn’t always true. A few months ago, I needed to add an email to my Zelle account on Chase, and had to call them. I initiated the call and they did issue a text message verification to the phone number in my account while on the phone to confirm.

EngineerGaming ,
@EngineerGaming@feddit.nl avatar

I think you should not feel like an idiot in this case. Just keep in mind that EVERYONE can fall for a scam, even the experts. The people who think they wouldn’t are themselves likely victims.

LiveLM ,

Pro-tip: Whenever you receive a call/text/email from “your bank” saying something is wrong, don’t interact!

Open their app/website or call them yourself to verify.

dan , (edited )
@dan@upvote.au avatar

I set up voice recognition

This feature is extremely insecure now that there’s several AIs that can replicate voices. If a scammer calls you and you say a few words, a recording of that can be enough for them to replicate your voice.

This happened at my workplace. An attacker got into someone’s Schwab account by calling Schwab support and successfully getting past the voice verification, and nearly successfully transferred $100k (from a recent stock sale) out of their account. Schwab sent out a notice saying they’re improving their security, but I’m not sure if they’ve actually improved it.

zephorah ,

That’s going to catch some people, especially older ones.

Rhaedas ,

Yet if I was helping my elders over the phone, I'd get all sorts of "What Windows key?", "I can't find that Control key", or "I did that key, the plus key, and then my hand slipped and I minimized everything."

x00za ,

Anybody got more info on the actual payload?

powershell.exe -eC [payload_w_base64] is mentioned here.

-eC just means encoded command afaik.

purplemonkeymad ,

Seen this on the powershell subreddit before, it just downloads and runs another executable.

BearOfaTime ,

Wouldn’t it require elevation?

Yet another example of why running as root/admin is a Bad Idea©

IsThisAnAI , (edited )

Yes. The prompt asking you if you wanted to do it or not would come up next. Unless they figured out some sneaky way to do something to avoid using admin.

avidamoeba ,
@avidamoeba@lemmy.ca avatar

Deploy a user-level payload that is auto started on login. The computer is now part of the botnet and can already be used for useful ops. Deploy a privilege escalation payload later if needed.

dgriffith , (edited )

90% of users when they are presented with the UAC popup when they do something:

“Yes yes whateverrr” <click>

IsThisAnAI ,

🤷‍♂️ people are going to take the path of least resistance

groet ,

No, why would it? It will run code in the context of the current user which is absolutely enough to start a new process that will run in the background, download more code from a attacker server and allow remote access. The attacker will only have as much permissions as the user executing the code but that is enough to steal their files, run a keyloggers, steal their sessions for other websites etc.

They can try to escalate to the admin user, but when targeting private victims, all the data that is worth stealing is available to the user and does not require admin privs.

avidamoeba , (edited )
@avidamoeba@lemmy.ca avatar

Exactly. The moment you hit Enter, the computer becomes part of a botnet on every login.

Womble ,
Treczoks ,

Once you run something on windows, elevation is just a thing of using the right toolbox.

Bezier ,
@Bezier@suppo.fi avatar

That should be easy on windows, but user permissions might also be enough for whatever it does.

taiyang ,

I wish more people knew what Run… did, but the Ctrl + v should be a little more obvious. We need to teach more computer literacy if you don’t immediately know that means you’re copying text to something.

Especially on a shady site, mind you. But then again, this could be on a phishing email, so that’s not always the case I guess. (I got one from “STARBUCKS” that Gmail didn’t catch, their spam filter has been shit lately, blocking my work emails but letting through a lot of sus stuff).

Ghoelian ,

Yeah, all this behaviour leads to is more annoyances for the people who do know what they’re doing. People should really learn how the devices they use every day work, which includes stuff like the command prompt. Not necessarily how to use it, but at least what it is and what it can do.

QuadratureSurfer ,
@QuadratureSurfer@lemmy.world avatar

Just reported by Mohamed Aruham on Twitter

The oldest tweets I could find that actually started reporting this are from ~16 days ago.

x.com/Piotrdotcom/status/1829126494574067992

They reference a page here that was posted on Aug 29th.

niebezpiecznik.pl/…/uwazajcie-na-takie-captcha/

rickyrigatoni ,

diabolical

ininewcrow ,
@ininewcrow@lemmy.ca avatar

General rule of thumb for me to interact with a website and read or watch whatever I want … if you require me to do more than two things to show me the content I came to see, I’m closing the tab or windows and moving on.

If it’s really important and security related, I’ll take my time and carefully examine everything I do.

Otherwise I’m not clicking more than twice and definitely not using my keyboard to see your dumb website or TikTok video.

RisingSwell ,

I don’t think I’ve ever gone through anything with less than 2 captchas in years

madcaesar ,

This isn’t targeting you.

These scumbags are going after the elderly and computer illiterate.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • random
  • lifeLocal
  • goranko
  • All magazines