No video

Stop Hackers With This!

  Рет қаралды 102,515

Seytonic

Seytonic

Күн бұрын

👉 Free $100 Cloud Computing Credit seytonic.cc/li...
0:00 Intro
0:16 Stop Hackers With This
3:36 Clipboard Hijacking Malware Evolves
6:55 Silkroad Hacker Identified
9:28 Linode
10:07 Outro
Sources:
go.theregister...
therecord.medi...
www.icrc.org/s...
www.redcross.o...
www.icrc.org/e...
www.bleepingco...
blog.cyble.com...
darknetlive.co...
arstechnica.co...
go.theregister...
www.hackread.c...
www.bleepingco...
www.wired.com/...
therecord.medi...
www.justice.go...
===============================================
My Website: www.seytonic.com/
Follow me on TWTR: / seytonic
Follow me on INSTA: / jhonti
===============================================

Пікірлер: 297
@camjoo
@camjoo Жыл бұрын
I read my fair share of IT news on the nets and a lot of the info I see here I don't see anywhere else. Quality work. Much respect. Thanks Seytonic
@Seytonic
@Seytonic Жыл бұрын
Thanks :) Pretty sure half the time I spend making videos is spent researching weird corners of the internet
@S_MAN_CHAN
@S_MAN_CHAN Жыл бұрын
@@Seytonic where do you do your research?
@ReFlexz0
@ReFlexz0 Жыл бұрын
@@S_MAN_CHAN Weird corners of the internet
@ProfessionalGasLighting
@ProfessionalGasLighting Жыл бұрын
@@Seytonic PLEASE PLEASE PLEASE do a segment on these recent Instagram hackings. I’ve had 3 personal close friends get their account taken, passwords, emails, and numbers are changed and then plants recovery methods to resteal the account even after they have changed the emails and logins to their original owners. So many people fall for this and don’t know what to do
@ProfessionalGasLighting
@ProfessionalGasLighting Жыл бұрын
@@Seytonic the spam bots are even only spamming in positive comments because KZfaq report buttons doesn’t have a “spam” button, the closest thing it has is misinformation which might not be enough to flag spam
@joesmith1810
@joesmith1810 Жыл бұрын
This is a good example of why pgp key IDs have been extended from 8 chars to 16 chars. With the advance of computing power, it is no longer infeasible to generate similar addresses. 4 chars is even easier.
@diobrando5976
@diobrando5976 Жыл бұрын
I've actually always had the habit of checking the first 4 and last 4 of my wallet address when copy+pasting. Never needed it, but glad I've done it.
@michaelvick2872
@michaelvick2872 Жыл бұрын
The apps I use show me the first and last 4 as standard and I have to tap to see the full string, makes my life a lot easier
@derrekvanee4567
@derrekvanee4567 Жыл бұрын
Hw wallet like ledger helps too.
@CU.SpaceCowboy
@CU.SpaceCowboy Жыл бұрын
dumb, cliploggers are usually run with keylogger in another thread so it wouldnt matter. create a new virtual desktop instead thats separated by the kernel so hooking malware wont have access to you
@michaelvick2872
@michaelvick2872 Жыл бұрын
@@CU.SpaceCowboy a keylogger wont change the keys you press?
@TheAechBomb
@TheAechBomb Ай бұрын
​@@michaelvick2872clip logger, not key logger
@HarryBallsOnYa345
@HarryBallsOnYa345 Жыл бұрын
The Digital Red Cross would get abused by non Hospital organization that also want protection. This would result in Hackers just ignoring or bypassing these measures as well, unfortunately.
@thankarezos
@thankarezos Жыл бұрын
there should be a way to not allow non medical companies to use red crosses just like people are not allowed to use red crosses if they are not medical.
@HarryBallsOnYa345
@HarryBallsOnYa345 Жыл бұрын
@@thankarezos yes this is true. But this all just relies on the Honor System, you have to trust no one will misuse these protections. Likewise this only stops honorable bad actors as well, if someone still wanted to attack these systems they would.
@thankarezos
@thankarezos Жыл бұрын
@@HarryBallsOnYa345 with technology its actually easier. For example isps won't issue medical ips
@daniel4647
@daniel4647 Жыл бұрын
@@thankarezos There is, hospitals can prove who they are, that's how they can buy medical supplies that are otherwise restricted. So it could easily be done with a list of IPs, could just deny anyone who can't prove they're a hospital from getting on the list. Probably wouldn't even need a third party, hospitals could just maintain it themselves as they're the ones with the most to gain from not abusing the system. And hospitals being in charge of it would ensure it was strictly hospitals and not something like a drug researcher that sort of qualifies as medical but not really.
@herrlehrer1479
@herrlehrer1479 4 ай бұрын
It would also make it even easier for evil hackers like like the conti group who specialized on targeting hospitals with ransomware. Because hospital are very desperate to get that data encrypted again
@waldolemmer
@waldolemmer Жыл бұрын
Thanks for consistently producing good content
@Seytonic
@Seytonic Жыл бұрын
I appreciate the comment my dude :)
@spacemeter3001
@spacemeter3001 Жыл бұрын
So let me get this straight: This super hacker had 3 billion dollars worth of BTC but didn't get the idea of having a low profile and also keeping the private key on an ENCRYPTED drive? Get out of here
@ionixm3496
@ionixm3496 Жыл бұрын
prime example of intelligence and wisdom do not overlap
@im_a_blobfish
@im_a_blobfish Жыл бұрын
theres one large issue here. theres another difference between soldiers in war and cybercriminals - cybercriminals are criminals while soldiers are likely forced to be fighting and are normal people, cybercriminals are all criminals which are trying to achieve something malicious when all the hackers have a malicious intent, having a full list of medical devices ip addresses could cause larger issues, psychopaths could specifically target medical devices making their attack much more threatening.
@thankarezos
@thankarezos Жыл бұрын
hackers and cybercryminals are not psycopaths. they just criminals that want to profit from that, they dont do things just for giggles. also if you want to target hospitals ect you can easily find the ip you dont need the list. the list is so the malware knows not to. also in wars, soldiers dont want to kill but they 1. follow orders. 2. kill not to be killed.
@whtiequillBj
@whtiequillBj Жыл бұрын
I have an expensive solution. The medical industry needs to make it's own version of IP like IP Red. This is incompatible with IPv6 and IPv4. You then get every hospital in the world to migrate to IP Red and never allow traffic from the normal internet. Make it so you need to have signed International treaties to use IP Red. Okay, That is just me being cheaky but, you could make a protocol that runs on UDP like Google's QUIC. Make a new protocol that runs only on Medical devices.
@bufordhighwater9872
@bufordhighwater9872 Жыл бұрын
So every source I've seen thus far says the federal statute of limitations on any cyber crime is only 5 years from when the crime took place, how could they still have gone after him? And not to feed into any conspiracy nonsense, but what are the odds they could have gone after him sooner, but wanted to wait for the bitcoin to increase in value (since asset forfeiture is a thing and incentivizes law enforcement to behave questionably when they stand to profit).
@marc-andreservant201
@marc-andreservant201 Жыл бұрын
There's no statute of limitations on civil asset forfeiture. It only requires the property to be presently in the possession of someone suspected of having obtained it illegally. If I rob a bank and 5 years + 1 day later I get pulled over with $300,000 in sequential banknotes on the back seat, the police will gladly take it.
@anon_y_mousse
@anon_y_mousse Жыл бұрын
@@marc-andreservant201 True, but the law in its current form is abused, as in even if they suspect you of a crime, or claim they suspect, they will cite that as the reason and seize your assets, even if you are innocent, but proving such innocence in court and getting your property back is nearly impossible.
@Dysfunctionality15
@Dysfunctionality15 Жыл бұрын
@@anon_y_mousse Yep. In fact, the value of property seized in civil asset forfeiture actually exceeded the value of property stolen in burglaries in 2014, 2015, and 2019.
@erin1569
@erin1569 Жыл бұрын
The redcross is so important for the future and the present of hacking. There aren't many hacker groups willing to go for healthcare providers or powerplants. I hope a transparent solution will be found asap.
@liarus
@liarus Жыл бұрын
6:17 okay, that's fucked up, i haven't been a victim of it, but i thought "surely checking the last few numbers is a way to avoid this", yeah, no it isn't
@salihtaysi
@salihtaysi Жыл бұрын
make servers specific for critical medical systems, leaving almost no reason to hack them
@exoticlol
@exoticlol Жыл бұрын
They "don't" want to hack them, they "accidentally hack them".
@salihtaysi
@salihtaysi Жыл бұрын
@@exoticlol yeah, im just offering an potential alternative long-term solution
@anteshell
@anteshell Жыл бұрын
@@salihtaysi As noted in the video, malware *_does not know_* what computer, server, domain, etc. it is in and will do it's work regardless of it. That is the reason they're trying to find a viable digital identifier for healthcare services. A single purpose physical server simply is not that and does not work as a valid identifier. Thus, your proposal does not work. Also, you're a tad arrogant to think that the researchers trying to solve this issue are do damn idiots that they didn't think about it. No, your idea is among the first ones that would come to anyone's mind even if they don't have any knowledge on digital security.
@reegyreegz
@reegyreegz Жыл бұрын
@@anteshell honestly this is like putting a sign outside a shop in a bad neighbourhood saying, please dont steal and thinking thats enough to work. If I or anyone else doesnt give a fk about you, we just ignore the "identifier" and burn your shit down anyways and rob you blind. People think most hackers care. Like calling them honest criminal. Hospitals should just use the usual it professionals to secure their shit, you know, the usual. This red cross nonsense honestly pisses me off and makes me want to exploit their system.
@anteshell
@anteshell Жыл бұрын
​@@reegyreegz No, it's nothing alike. There are enough people who respect the boundaries on healthcare that this has much potential to make things a bit easier for them. It's quite different to be playing on the lives of tens, hundreds even thousands of people than burglaring a few TVs and jewelry. Not even criminals without a moral compass and the vast majority of them would not want to be responsible of killing people. Besides, no-one is saying that there still aren't any bad actors who'd ignore this stuff. Hospitals ARE using professional security measures. The digital red cross is NOT supposed to substitute for them. Also, what are you, three years old? At least you act like one. The best way to order them to do something is to say they should not do it. Besides, you don't even have any idea who you'd be attacking. You clearly imply hospitals, but they are not the ones behind this concept. Grow up a little, kid.
@ZephyrysBaum
@ZephyrysBaum Жыл бұрын
Scammers scamming scam victims, adding injury to more injury!
@siddiki9778
@siddiki9778 Жыл бұрын
You can counter the clipboard-hijacking malware by simply dragging & dropping addresses from one tab to another or from one application to another. I do this with my password manager so that nothing gets sent into the clipboard. Hope that helps!
@ppDomino
@ppDomino Жыл бұрын
What password manager if you don't mind?
@siddiki9778
@siddiki9778 Жыл бұрын
@@ppDomino Bitwarden
@gangsterism
@gangsterism Жыл бұрын
sending crypto you always check the address and amount sent 10 times, if you dont youre doing it wrong
@8BitShadow
@8BitShadow Жыл бұрын
for the clipboard hijacking (specifically in this case) you could honestly just write a tampermonkey script (quick sudo-code): //start script into a sleep-loop // if(e.key == "c" && e.ctrlKey) // clip = ... // if(e.key == "v" && e.ctrlKey && clip != clipboard...) // alert("Sumthin' funky with that clipboard there chief.") Basically; monitors what you copy, doesn't store anything past the current copy, and just simply checks if your clipboard has suddenly changed by *also* watching what you paste. If what you paste is different from what you copied then some 3rd party software has copied to the clipboard or manipulated it. Then just pop up a warning with 'alert()' and done. No need to do any more than that.
@Michelino_M5
@Michelino_M5 Жыл бұрын
very nice, but pseudo-code*
@saddish2816
@saddish2816 Жыл бұрын
This is very easy to bypass
@jabster286
@jabster286 Жыл бұрын
works perfectly* * if the hacker doesn't just, i dunno, wait 30ms before pasting, or replaces the clipboard before and after the paste
@8BitShadow
@8BitShadow Жыл бұрын
​ @Jabster28 The e.key (and CTRL equivalent) only fires when the keys are pressed *in the browser*. Hell I could even throw in 'document.oncopy = (event)...' as even this only fires within the user agent. Unless the external program simulates a CTRL and C keypress/event in the users browser after changing the clipboard; just 'replacing the clipbaord before and after' wouldn't work - I'm sure even windows defender would find simulated keypresses or forced event fires onto a browser highly suspicious. The hack program would have to manage to perfectly time it so the changed clipboard pastes and changes the clipboard back all before my script Even if the program directly changed the pasted input in the browser; it would def get flagged by an AV either way. The entire point of clipboard jacking *is so that the hack does not have to interact with the browser at all to seem as mundane to an AV as possible*. I fail to see how waiting any time prior to or after the user pasting would do much of anything, the script would still be checking the clipboard for changes, not the input - it doesn't update the 'clip' variable *at all until* CTRL+C is pressed, the script would still spot the tampering. This isn't a 'one shot' script, it loops forever using sleep. The only real issue with the code is that, on the copy of the address when pressing the 'copy' button instead of doing CTRL+C, it wont trigger the CTRL+C check ever as the 'copy' button just copies directly to the clipboard and does not simulate a keypress, something the script wasn't made for anyway - but even then that's an easy fix, again just add a 'document.oncopy = (event)...' second and you're all good.
@banocean
@banocean Жыл бұрын
Very good idea to show where is the critical infrastructure, it will only bring problems XD
@Alkaris
@Alkaris Жыл бұрын
It's funny how the government thinks that crypto that guy took from Silk Road is now theirs, when clearly, it belongs to that guy who discovered this little exploit in the first place. Plus I probably would of done a better job of concealing it instead of inside some container in the bathroom. Put it where nobody would ever consider looking, even if they scan through the entire house top to bottom.
@anon_y_mousse
@anon_y_mousse Жыл бұрын
Agreed. I think the US government has a massive amount of overreach.
@Xmw92ba3oenalfk9
@Xmw92ba3oenalfk9 Жыл бұрын
I’m just glad that James Zhong is getting fucked. I hope gets the maximum time possible and that he ends up homeless after he gets out.
@josh_d_k
@josh_d_k Жыл бұрын
And on top of that they wanna jail him for up to 20 years? Seems way overkill if you ask me.
@RedOneM
@RedOneM Жыл бұрын
@@josh_d_k Especially when he targeted a three to four digit haul, not nine to ten. Feds always overreach when it comes to their personal interest.
@user-kh1es5gg9m
@user-kh1es5gg9m Жыл бұрын
So stupid to stay in the US. He could've moved anywhere in the world with thak kind of money. Especially if he had bought an unkown amount of XMR
@midimusicforever
@midimusicforever Жыл бұрын
How convenient that the feds could just appropriate the funds...
@santiagoeltoma5122
@santiagoeltoma5122 Жыл бұрын
You just HAVE to hate feds no matter what your ideology or backgound is, its just natural
@nomore-constipation
@nomore-constipation Жыл бұрын
Pure genius, keep your stolen assets in the same building or property you own. What could go wrong? 🤑
@tips1483
@tips1483 Жыл бұрын
I'd at least take apart a blender or something and hide it in there :D
@nomore-constipation
@nomore-constipation Жыл бұрын
@@tips1483 Do what my alcoholic relative did. Put it in a Ziploc bag in the toilet tank. I gotta hand it to them. It at least will be colder than in the open on hot summer days. 😂
@tips1483
@tips1483 Жыл бұрын
@@nomore-constipation yeah, only issue is I’ve heard of that too many times they must check that
@nomore-constipation
@nomore-constipation Жыл бұрын
@@tips1483 Well if you really want to go all spy games. Then might I suggest off-site bugout bags. Hollow out a tree or something similar close to the property but not all in your property. Gotta give them the illusion they found your stashes 😏 When I lived on the school campus we used fake floor & wall trim panels with magnetic locks. So it's basically it's setup like the retail tags on clothes. Get a strong magnet on the right spot and it can easily pull open. It's where we hid our contraband. 😐
@jakadirnbek7141
@jakadirnbek7141 Жыл бұрын
To match all 4 last characters they would only need to store 16^4=65536 addresses. As for generating them it would probably be connected with coupon collector problem in probability since each unique 4 hex-letter ending could be a coupon and each address is generated at random. Expected number of "draws"/trials would be n*H_n, where H_n is the n-th harmonic number. H_65536=~11.67, 65536*11.67=~764805 .. which is completely doable.
@Lrripper
@Lrripper Жыл бұрын
So you get charged with wire fraud if you scam a drugpin ???
@InternetRacks
@InternetRacks Жыл бұрын
if it's profitable for the feds, yes
@Dysfunctionality15
@Dysfunctionality15 Жыл бұрын
I mean, you're still a thief even if you only steal from other thieves. Just don't get caught! 🤷
@mrbanana6464
@mrbanana6464 Жыл бұрын
@@InternetRacks I wonder if the agents get to keep it for themselves or if it goes directly to the agency 🤔
@InternetRacks
@InternetRacks Жыл бұрын
@@mrbanana6464 I'm pretty sure it goes to the agency, but I wouldn't put it past them to be receiving a large bonus this year.
@xiaowong6651
@xiaowong6651 Жыл бұрын
4:16 imagine someone's editing their registry and the malware's just replacing the values and ruining their system (more than it already is by having the malware on it)
@B0wser998
@B0wser998 Жыл бұрын
Honestly, by "ruining" their system it could save them money in the future if they had to reinstall because of it, getting rid of the malware in the process.
@edgay
@edgay Жыл бұрын
Why would the malware wait for the user to edit their registry.. instead of doing it itself xd?
@B0wser998
@B0wser998 Жыл бұрын
@@edgay What they meant is the user editing registry by themselves and copy & pasting something from somewhere and the malware editing the string that was copy & pasted in the clipboard. But yeah, unless you are pasting crypto wallets directly into the registry, I don't see this happening. :D
@Jeff-ss6qt
@Jeff-ss6qt Жыл бұрын
@@B0wser998 There are application UUIDs. Maybe they could be slightly similar.
@louis-philippesavard742
@louis-philippesavard742 Жыл бұрын
I always thought that checking the 4 last number, was lazy but did it anyway, thanks for confirming it is a bad practice. I'll check the whole number next time.
@ZyDoxx
@ZyDoxx Жыл бұрын
I know a guy that ran these types of malware for a while years ago. The malware compared a crypto wallet to its 200.000 wallets database and took the one that had a nearly identical beginning and end.
@takipsizad
@takipsizad Жыл бұрын
genius
@xntumrfo9ivrnwf
@xntumrfo9ivrnwf Жыл бұрын
I almost fell prey to clipboard hijacking ~a year ago. I was about to make a (relatively small) crypto payment, and very luckily, I double checked the address I copy-pasted before sending. It was completely different. At first I was super confused, but once I figured out what was going on, I wiped and reinstalled everything
@DRSDavidSoft
@DRSDavidSoft Жыл бұрын
Makes you wonder how such a malware gets installed on your machine in the first place, I would take an image of all executables for further inspection.
@takipsizad
@takipsizad Жыл бұрын
@@DRSDavidSoft yeah
@mrlildylchillin
@mrlildylchillin Жыл бұрын
I wonder how the feds caught that silkroad bitcoin theif. Either they got lucky or thats some incredible/shady detective work
@vitolapinta
@vitolapinta Жыл бұрын
Disregard my other comments. I was dumb lol
@jamlike1222
@jamlike1222 Жыл бұрын
I mean he probably didn't have a job and was spending thousands of dollars
@JustinMumma
@JustinMumma Жыл бұрын
I think luck. I don’t know how true this is, but I read that he called to report a break-in a while back and mentioned having “a lot of bitcoin” which triggered investigation for tax evasion, escalating into this.
@Beknown107
@Beknown107 Жыл бұрын
I’m confused what zhong actually did, I mean back then there were 0 laws to do with crypto and it was obviously an almost untraceable medium. I bet he talked after they threatened him even though they had nothing in actuality
@TheGTP1995
@TheGTP1995 Жыл бұрын
>it was obviously an almost untraceable medium Bitcoin's blockchain is, and has always been, public. Anyone can see the transactions. What can be hard to do, is to link a Bitcoin address to a specific person. But as he purchased many things with his Bitcoins, I guess this is how he got caught.
@NotKewl
@NotKewl Жыл бұрын
Every BTC transaction can be viewed on the blockchain. It is not untraceable.
@Beknown107
@Beknown107 Жыл бұрын
@@TheGTP1995 back then there were almost no parties logging or tracing IP addresses to specific transactions, anonymity was reasonable as long as he mixed the coins
@Beknown107
@Beknown107 Жыл бұрын
@@TheGTP1995 that’s a good point though maybe they found the man not the crypto
@TheGTP1995
@TheGTP1995 Жыл бұрын
@@Beknown107 This has little to nothing to do with IP addresses. You can link an identity in many other ways. E.g. in the video it is said that he purchased gold and silver bars. How did those end up in his home? If these were shipped to him, he must have given an address. Maybe not his home address, but still some physical location where he had to go to get them. So they could have got him on some camera nearby. Or if he went to a physical store to collect them, police could have gained information on him by talking with people working there.
@philippes.42069
@philippes.42069 Жыл бұрын
Lol the thing about hospitals not being targeted by ransomware is pretty strange because in france it happened like 3 times over the past year...
@CU.SpaceCowboy
@CU.SpaceCowboy Жыл бұрын
if tour that paranoid create a new virtual workspace, its separated by the kernel. this means hooking from loggers etc wont have access to your new desktop. you can add hot keys to the program to allow you to switch back and forth.
@Jeff-ss6qt
@Jeff-ss6qt Жыл бұрын
That won't work if you're infected with malware. Usually if one is running on your system the rest will follow, since they come in bundles and even download more stuff. In the case of a rootkit, your kernel is compromised. So, everything running on top of it is compromised. In the case of a malicious filter-driver, everything can be changed, hidden, and stolen from you. If you have a RAT or Remote Access Trojan then everything you do is compromised and you even have a human creeping on you for extra horror. A worm, worst-case-scenario everything you own is compromised now. A persistent malware that infects your UEFI, safe mode in Windows and even likely Linux won't keep you safe. A persistent malware that infects a firmware chip on your motherboard, Optical Media drives, hard drives, USB Flash drive controller firmwares, etc., God can't even help you there. If you're PWNED, you're BONED. So don't think a virtual workspace will save you if your main one is now untrusted. Everything on the top layers are untrusted as well.
@CU.SpaceCowboy
@CU.SpaceCowboy Жыл бұрын
@@Jeff-ss6qt agreed, a shell is a shell and it really wouldnt matter. it would only be practical on a company computer that might monitor your activity
@trolly4233
@trolly4233 Жыл бұрын
I have a revolutionary idea, it’s called unplugging. You disconnect literally everything, from everything. It’s so effective not even you can access your computer while you put in such measures.
@achannel9598
@achannel9598 Жыл бұрын
Air gap the ultimate defense
@LOGoltem4682
@LOGoltem4682 Жыл бұрын
2:07 Or to troll keep accessing the file for no reason and the staff needs to work over time to keep the systems locked down.
@OfficialPooYT
@OfficialPooYT Жыл бұрын
For a seizure of maybe 3billion dollars how are you the only person mentioning this? Thanks 🙏 ❤ your work bro
@joez.2794
@joez.2794 Жыл бұрын
"It's pretty hard to explain away a multi-billion dollar crypto fortune..."
@Lrripper
@Lrripper Жыл бұрын
Yeah cause everybody had 600k to spend in 2012...
@joez.2794
@joez.2794 Жыл бұрын
​@@Lrripper Merely having $600K in 2012 does not automatically make you sussy baka. In the USA anyway...
@Jeff-ss6qt
@Jeff-ss6qt Жыл бұрын
@@joez.2794 They'd probably look into his tax records. If he lied about having $600k he'd be in even more hot water, especially with the IRS. They'd want their cut of the money from something he never actually had to start with.
@chrisjinks5414
@chrisjinks5414 Жыл бұрын
I hope he encrypted the shiz out of that SD, then he might have a bargining chip becuase my guess is they want the crypto more than they want him.
@DRSDavidSoft
@DRSDavidSoft Жыл бұрын
Yes, it would be very stupid of a multi-billion worth SD card owner to just hide it without any encryption in a bathroom cabinet. You'd think that no one is going to look for it there, but the "good old-fashioned police work" is exactly this. Once the person's a suspect, they're going to inspect every possible hiding place in their home, and not just for SD cards.
@DarkGT
@DarkGT Жыл бұрын
For the amount of money it is, I bet they will use some supper computer to crack in few days.
@anon_y_mousse
@anon_y_mousse Жыл бұрын
@@DRSDavidSoft They would even smash through the walls too.
@chri-k
@chri-k Жыл бұрын
@@DarkGT that is infeasible, no matter how big a server room you have.
@DRSDavidSoft
@DRSDavidSoft Жыл бұрын
@@chri-k That's correct if you use a proper encryption scheme with large keys, which is what the owner should have done.
@ThourCS2
@ThourCS2 Жыл бұрын
I lost $5000 with the Clipboard Hijacking where the address was exactly similar to my address. 5 digits front and 4 digits on the back. It sucks man. :/
@ZoeyMikol
@ZoeyMikol Ай бұрын
Holy shit, 9 digits of similarity? That's over 68 billion possible private keys you'd have to convert. Even at some crazy, modern GPU speed, like 1000 Mkeys/s, it would have to run at max processing speed for over a minute. And that's over 5 terabytes of pre-computed keys. Even if you got unlucky and one of the digits was just randomly correct, it'd still be several seconds of processing, or hundreds of gigs of pre-computed keys. I really wonder how they manage to do something like that.
@enkephalin07
@enkephalin07 11 ай бұрын
No one could mistakenly hack Red Cross, and intentionally attempting would be a worse mistake than abusing cats on 4chan.
@kamlong7358
@kamlong7358 Жыл бұрын
My guess is that since most hospitals nowadays use digital charting software like Epic, which I assume has to talk to Epic servers, or specialised programs (That probably cant/won't run on standard and up-to-date computers) to operate medical machinery, maybe hackers could check/monitor for healthcare specific traffic,
@Nontoxicz
@Nontoxicz Жыл бұрын
Just lost nearly $10k crypto yesterday to a clipboard hijacker. It was my own fault. I used that laptop to watch some sketchy UFC streams which was dumb. Trying to be grateful for the things i do have
@Paco1337
@Paco1337 Жыл бұрын
I had a similar malware with pasting wrong address.
@iUUkk
@iUUkk Жыл бұрын
An extra checksum next to a crypto address would do wonders :)
@felixschndr
@felixschndr Жыл бұрын
Now I am curious, what would your ideas of storing and hifing such an SD card be? Maybe put themicro SD card INTO a normal size SD card (so that the normal one still works)? Hide it in the case of some device such as TV or wifi repeater? Hide it in the earth of a pottet plant?
@DRSDavidSoft
@DRSDavidSoft Жыл бұрын
Store it in cloud with an additional recovery key that could be remembered instead of written down? I think some special opsec and/or transfer mechanism should be developed and used for anyone having such wallets. Any cryptocurrency wallet containing >1B$ should be stored with careful considerations, as it's similar to an account containing unlimited amounts of funds for a regular person, during the lifetime of that wallet use. You can't just put it without any encryption in a bathroom cabinet, lol
@hhvhhvcz
@hhvhhvcz Жыл бұрын
not to mention SDcards are like the worst forms of storage - they constantly fail on when i play with my RPi, would never there to store there a wallet with one coin, let alone exceeding billion dollar he should have generated a private key through some mnemonic and then use that to encrypt the private key of the wallet and distribute that into multiple places both online and offline, no wonder certain anon orange crypto is better than shitcoin
@anon_y_mousse
@anon_y_mousse Жыл бұрын
@@DRSDavidSoft I don't know if you've ever thought about it this way before, but 1 million seconds takes 11.57 days to elapse, while 1 billion seconds takes 31.71 years to elapse. If you had a billion dollars you could spend a dollar a second for decades and not go broke.
@DRSDavidSoft
@DRSDavidSoft Жыл бұрын
@@anon_y_mousse Exactly my point, there should be a system in place that's developed exactly for spending huge amounts of cryptocurrency from anywhere, without ever needing to retrieve a key from a SD card in a bathroom cabinet.
@jeffbrownstain
@jeffbrownstain Жыл бұрын
This video makes me think the internet is getting stupider. Again.
@MintyFarts
@MintyFarts Жыл бұрын
I'm not sure that would protect healthcare networks... I mean, some hackers WANT to target those systems..
@ZentaBon
@ZentaBon Жыл бұрын
Some people want to target Red Cross, however your concern is valid. A hacker is disconnected emotionally from their actions as they don't see the people they're affecting unless they go out of their way to consider it consciously. A soldier in a battlefield has to choose to kill someone they see with their own eyes. They can't unsee the "human" they're hurting unlike how someone staring at a screen can.
@isheamongus811
@isheamongus811 4 ай бұрын
Spam the emblem anywhere. Each traffic/communication.
@raiden72
@raiden72 Жыл бұрын
Wouldn't this work just about as good as Joe Biden giving Putin a list of things not to attack
@Quacking-duck
@Quacking-duck Жыл бұрын
Most cyber criminals have already pledged and not too we just need something that doesn't blow the cover so they will actually use it
@raiden72
@raiden72 Жыл бұрын
@@Quacking-duck keyword being most... Now that will just leave our medical establishments more vulnerable to nation state hacking... Especially during wartime. Does anyone think that the Geneva convention actually matters?? Come on people you need to build a real wall not just a fence that says keep out!!!
@Quacking-duck
@Quacking-duck Жыл бұрын
If somebody doesn't follow the Geneva Convention they going straight to prison and if you can't take it to prison they're gonna give you a huge debt
@raiden72
@raiden72 Жыл бұрын
@@Quacking-duck tell that to Russia who has been committing atrocities in Ukraine yet the sanctions aren't working worth a crap. Where's your GENEVA convention now huh?!!!
@chri-k
@chri-k Жыл бұрын
The difference is that cyber criminals want to avoid attacking hospitals.
@RedOneM
@RedOneM Жыл бұрын
Vanity adress generation isn't worth $59 🤣 Hackers scamming other hackers. Hacker with even basic knowledge can easily run a vanity adress generation code or even write own.
@user-xz1ur8us5p
@user-xz1ur8us5p Жыл бұрын
Lets be honest, the majority of low level cyber criminals are likely script kiddies who don't probably know how to code at all.
@seanfaherty
@seanfaherty Жыл бұрын
Yup, Malware by subscription and these idiots will be surprised when the malware hides other malware.
@Jeff-ss6qt
@Jeff-ss6qt Жыл бұрын
I think they might be paying for the computer power needed to brute-force it.
@Squeeekii
@Squeeekii Жыл бұрын
much love my dude, have a great weekend + chat too :)
@soggamer6974
@soggamer6974 Жыл бұрын
Bruh why something implement if hospitals could use their own local servers (without internet connection) which could be used with 2 functions only to upload that data to medical gov site or smh and read from there thats it, really simple soliution, you dont need no DNS or Redcross just server blocking all connections with just 2 allowed rules
@anon_y_mousse
@anon_y_mousse Жыл бұрын
You're right, hospitals shouldn't be connected to the internet.
@danser_theplayer01
@danser_theplayer01 Жыл бұрын
6:20 can't you write a function on your website that automatically will check every time you pasted something in that specific window if it is equal to the thing you last copied? Or is it inaccessible?
@ZoeyMikol
@ZoeyMikol Ай бұрын
How will it check what you last copied? By reading the clipboard. This malware changes your clipboard. You're better off writing your own program that keeps track of your clipboard and makes sure nothing changes it, alerting you if something does.
@johnkx9496
@johnkx9496 Жыл бұрын
Can’t they make a bitcoin stealer that acts as a request proxy , so even if the address is right , when you send the payment it will intercept the request and change the address ?
@raresandrei7205
@raresandrei7205 Жыл бұрын
Only if they hijack the wallet/payment app. If you have a webwallet is a bit harder to do and a core wallet needs to be hooked in and modified before the data reaches the chain
@hurtjonnegut
@hurtjonnegut Жыл бұрын
Why would hackers respect these do-not-call lists? Why wouldn’t they target them knowing how valuable they are?
@menjolno
@menjolno Жыл бұрын
Zhong tried to brag by storing everything unsecured. He's cringe.
@fiecylick3981
@fiecylick3981 Жыл бұрын
On PC use Ctrl+f and paste into the highlight. This would validate if that exact key is the same. If not then it is malware. Best advice I have for it. Phone users Idk
@Nontoxicz
@Nontoxicz Жыл бұрын
I just check the whole address side by side. Unfortunately I had to pay $10k to learn how necessary that was 😅
@alejandroalzatesanchez
@alejandroalzatesanchez Жыл бұрын
ME: But how i make the red cross work? Seytonic: That's the neat part you don't
@there_can_only_be_one__unicorn
@there_can_only_be_one__unicorn Жыл бұрын
Thanks 👍
@zigafide
@zigafide Жыл бұрын
the silk road hacker story is so lame. i feel like that was his BTC fair and square especially since the site has been shut down forever now
@cajunfox
@cajunfox Жыл бұрын
Oooo the double dip 🍦🍦
@In_swedish_the_jam_means_sylt
@In_swedish_the_jam_means_sylt Жыл бұрын
An honour based system is the only one hackers will honour for sure
@1337h3x
@1337h3x Жыл бұрын
@6:36 Not an expert on quantum computing but I think there is a specific bridge you can use to do this
@Charkel
@Charkel Жыл бұрын
Trust me, if i had a SD card worth billions no one would find it.
@ZentaBon
@ZentaBon Жыл бұрын
I love this so much
@2OXX
@2OXX Жыл бұрын
Yo I actually feel bad for the last guy
@ironknightgaming5706
@ironknightgaming5706 Жыл бұрын
there is a big difference between a hacker and a scammer.
@brucesmith9682
@brucesmith9682 Жыл бұрын
"Healthcare identifier found. Better find someone else to hack." said by no bad actor. More like, "Healthcare identifier found. B-I-N-G-O-$$$$$." Great concept with well intentions but would be as useful as "Gun Free Zone" signs that have yet to stop any bad actor from inflicting harm.
@ZephyrysBaum
@ZephyrysBaum Жыл бұрын
Question: Do you think it is morally right to use LibGen or other similar services to get old books?
@Skaos87
@Skaos87 Жыл бұрын
While gaining access to good old fiction books etc. is potentially problematic, I don't have any problems downloading scientific publications (books or papers). Paywalling "knowledge" is fucked up, especially when a single textbook could run you hundreds of ~money~. Fuck that system. Again, downloading "normal books" is likely not as black and white, but contrary to scientific publications, these texts/books often drop significantly in value - especially on the secondhand market. Here it very much depends on the author/publishing house imo. Do I care about people ripping the new Stephen King book? No, not at all. What about a indie-publication? Yes, as long as you have the funds you ought to give to the author. Don't have the money or no (convenient) way to buy the book? Find the author's patreon or alternative to give that way. Also not a thing? Fuck it, download and don't look back.
@BeHappyTo
@BeHappyTo Жыл бұрын
Yes. For all books.
@nohs8776
@nohs8776 Жыл бұрын
is it morally right to use the internet archive to get old books? or going to the library?
@hhvhhvcz
@hhvhhvcz Жыл бұрын
piracy is always morally alright
@Cookiekeks
@Cookiekeks Жыл бұрын
Who cares, just do it
@Littlefighter1911
@Littlefighter1911 Жыл бұрын
Underwhelming. That's like banning someone on an Anarchy server.
@ThePlacehole
@ThePlacehole Жыл бұрын
Storing $1B on an SD card is brave!
@mx338
@mx338 Жыл бұрын
Why are criminals so stupid and stay in the country where they made their robbery, even though they could live like a king together with their friends in another country.
@user-wi1ep6cm9l
@user-wi1ep6cm9l Жыл бұрын
The criminals which are intelligent and do that do not get caught or attract public attention, meaning that we only get to see reporting on the stupid ones.
@RedOneM
@RedOneM Жыл бұрын
In this billion dollar heist, he was probably scared. He likely felt like a wanted #1 criminal when the haul became worth millions, hunderds of millions and then a billion. His original goal was to scam a illegal platform for couple of hunderds - thousands of dollars, not 9 to 10 digits. In his shoes, I would have planned months long a out of the country route, once it hit $million+, cuz that's getting real heavy in the eyes of the local laws. Transparent chains are toxic, this is why everyone should use Monero, nobodys business what you're doing. Obviously don't commit illegal activities like wire fraud though.
@mx338
@mx338 Жыл бұрын
@@RedOneM I am very pro-privacy but financial privacy is a case where I do not think you should not have full privacy. Money is power and money is involved in the majority of criminal dealings. The current banking system has issues but the experience for normal people really is fine.
@RedOneM
@RedOneM Жыл бұрын
@@mx338 So you never pay with cash?
@mx338
@mx338 Жыл бұрын
@@RedOneM I do but there's limits on how much you can pay with cash, without ID. So I don't see a problem with cash. You also can't just send cash with a click of a button to the other side of the world.
@Kuratius
@Kuratius Жыл бұрын
What was the attack vector for the customers on your site that got infected by the clipboard malware?
@chri-k
@chri-k Жыл бұрын
how would he know
@Jeff-ss6qt
@Jeff-ss6qt Жыл бұрын
Anything that has access to the clipboard could do it. So, probably a lot of different things. Chrome and other modern browsers don't give access to your clipboard by default and you have to explicitly allow it for each site, for example. But, otherwise, everything running on your computer under your current account can.
@EmM-ko7mu
@EmM-ko7mu Жыл бұрын
I had something like this but it was just a bad/invalid QR code and copy paste worked
@username4755
@username4755 Жыл бұрын
Dude in thumbnail looks like it could be Chamillionaire
@Hyraethian
@Hyraethian Жыл бұрын
If places want to lock down their systems, that's a wonderful headache for IT staff at least. I think this is a good idea. It also generally ups the level of entry for heists. Were going to see major hacks, like set for two dozen lives hacks. It sort of works out for both sides well in the long term. I see this as a benefit to society, both its civil side and its underworld. Plus it will be cool to see how this unfolds. Humans have a way of taking things and using things in ways you wouldn't have thought they would misuse it. Humans are a wonderful level of creative.
@fathertimegaming17
@fathertimegaming17 Ай бұрын
Based on stupid false equivalencies. Anyone can wear an armband but not anyone is in an active warzone. All computers are.
@OfficialJuggaloJesus
@OfficialJuggaloJesus Жыл бұрын
The digital Red Cross needs to be embedded into the O.S. upon purchase and the computers with said embedded Red Cross OSes need to only be purchased from licensed sellers of Digital Red Cross O.S. machines. The only issue is that eventually the O.S. will leak and allow for all computers to become the Digital Red Cross. I agree it's a VERY tricky issue but the issue is that we don't need to be caring about protecting the bad actors. Bad actors are bad actors and we need to be more worried about cyber security on a national security level which we are not because our nuclear arsenals are not connected to the internet and they don't care about the general populace the way they say they do which is why we are seeing hack attacks against water departments poisoning the water supplies.
@OfficialJuggaloJesus
@OfficialJuggaloJesus Жыл бұрын
NEVER TAKE A GREEDY BAD ACTOR BLACK HAT HACKER AT THEIR WORD THAT THEY WILL NOT TARGET YOU FOR ANY REASON. THAT IS GULLIBILITY WHICH IS EXACTLY WHAT HACKERS EXPLOIT THROUGH SOCIAL ENGINEERING.
@diablominero
@diablominero Жыл бұрын
If you don't protect bad actors, they have no reason to cooperate with your digital red cross. It's the same as the reason why medics aren't supposed to shoot enemy soldiers.
@OfficialJuggaloJesus
@OfficialJuggaloJesus Жыл бұрын
@@diablominero they have no reason to cooperate, they're bad actors. They act like they have a reason to cooperate but all is fair in love in war. I don't know one man who would pick the Geneva Convention over being handed $1,000,000 tomorrow to break the rules of engagement.
@ScienceLifeChronicles
@ScienceLifeChronicles Жыл бұрын
can you make a video on FTX crash? please.
@insane101hawken7
@insane101hawken7 Жыл бұрын
I MADE IT IN THE FIRST HOUR FINALLY!!!
@slickrickcm
@slickrickcm Жыл бұрын
Copy and paste somewhere else and just type it out instead of pasting it.
@corners1733
@corners1733 Жыл бұрын
Epic
@Novers
@Novers Жыл бұрын
Check for an epic install
@fsdfgasgfisd
@fsdfgasgfisd Жыл бұрын
At least the Silk Road hacker was diversified in assets 😂.
@ThePowerRanger
@ThePowerRanger Жыл бұрын
Man these are come clever hacks.
@amysilver4864
@amysilver4864 3 ай бұрын
Funny I was exploiting the last vulnerability on crypto gambling websites years ago.
@ZephyrysBaum
@ZephyrysBaum Жыл бұрын
omg! that spike!
@andreujuanc
@andreujuanc Жыл бұрын
Sobeys has a ramsomware issue since last week. Check it out.
@USBEN.
@USBEN. Жыл бұрын
Damn Zhong what a lame ending my dude. Of all the possibilities.
@mrhappytroll
@mrhappytroll Жыл бұрын
Why was he just sitting on the bitcoin? isnt the whole point that its untraceable, just cash out or however the fuck it works. even if he didnt wait till it hit 1b, would still have been hundreds of millions of dollars
@ShitStainedBallSack
@ShitStainedBallSack Жыл бұрын
3 billion on an SD card. Try explain that to your parents or grandparents geezus
@THYCR3AT0R
@THYCR3AT0R Жыл бұрын
imagine having to tell your kids you had $3 billion but had to give it over to the government lmao
@sookmaideek
@sookmaideek Жыл бұрын
pls no hack
@SocialistDog
@SocialistDog Жыл бұрын
How you feeling about steamdeck?
@Hyperboid
@Hyperboid Жыл бұрын
probably something like "great as long as you don't unlock the file system"
@SocialistDog
@SocialistDog Жыл бұрын
@@Hyperboid oh think that's where I missed up. Lol
@Elliott.Revell
@Elliott.Revell Жыл бұрын
Was expecting lockbit coverage mate!
@purenationalistlucasrajput6160
@purenationalistlucasrajput6160 Жыл бұрын
ok
@smartbusinessltd
@smartbusinessltd Жыл бұрын
Finally… being waiting for an upload
@RagingAcid
@RagingAcid Жыл бұрын
James Zhong did nothing wrong. free my guy.
@tamertamertamer4874
@tamertamertamer4874 Жыл бұрын
Thé concept of a digital Red Cross is stupid. Like the fbi would have the digital Red Cross to not be targeted which would make the entire system useless
@TheGrzybon
@TheGrzybon Жыл бұрын
bro, faking a red cross armband is a warcrime you know
@ifur
@ifur Жыл бұрын
Stealing from dark web still a crime ✍🏻
@artandmemes9190
@artandmemes9190 Жыл бұрын
The digital red cross would have a bullseye for foreign actors in times of war.
@gunnargu
@gunnargu Жыл бұрын
What kind of genius does not encrypt his 50k bitcoin wallet!?
@mycelia_ow
@mycelia_ow Жыл бұрын
Billion dollar microSD card
Dad Takes out Town's Internet by Mistake
9:20
Seytonic
Рет қаралды 156 М.
Hello, old friend…
13:34
Linus Tech Tips
Рет қаралды 1,4 МЛН
A teacher captured the cutest moment at the nursery #shorts
00:33
Fabiosa Stories
Рет қаралды 61 МЛН
WHO CAN RUN FASTER?
00:23
Zhong
Рет қаралды 30 МЛН
The Accidental $70k Android Hack
10:01
Seytonic
Рет қаралды 117 М.
Hiding Malware in Space Pictures
9:12
Seytonic
Рет қаралды 115 М.
Hacking a SATA Cable to Transmit Files
10:11
Seytonic
Рет қаралды 92 М.
Weaponized Tor is being Spread on YouTube
10:05
Seytonic
Рет қаралды 856 М.
catch EVERY reverse shell while hacking! (VILLAIN)
19:03
John Hammond
Рет қаралды 219 М.
Free VPN Is Really DDoS Botnet in Disguise
11:08
Seytonic
Рет қаралды 234 М.
How do hackers hide themselves? - staying anonymous online
11:55
Grant Collins
Рет қаралды 1,4 МЛН
Linus Boycotts Anker After Security Disaster
10:46
Seytonic
Рет қаралды 630 М.
New Toy Phone Is Security Nightmare, Mobos On Fire
9:27
Seytonic
Рет қаралды 161 М.
Hacked From a Google Search
11:26
Seytonic
Рет қаралды 153 М.
A teacher captured the cutest moment at the nursery #shorts
00:33
Fabiosa Stories
Рет қаралды 61 МЛН