[Youtube video]: Is it really that easy to hack someone's Discord? Is it the same with: Telegram, Twitter, facebook ...ect ? and does this work if I'm accessing Discord through Firefox ? (www.youtube.com)
from zaknenou@lemmy.dbzer0.com to privacy@lemmy.ml on 24 Aug 20:39
https://lemmy.dbzer0.com/post/26547520

#privacy

threaded - newest

refalo@programming.dev on 24 Aug 20:41 next collapse

if a relevant password of theirs has been leaked then yes and yes. otherwise things get a whole lot harder.

GolfNovemberUniform@lemmy.ml on 24 Aug 20:51 next collapse

Hacking Discord is easier than anything else because every account has a passcode that you can easily obtain using regular social engineering or remote access and it bypasses everything, even 2FA.

lud@lemm.ee on 25 Aug 17:59 collapse

What passcode? Are you referring to recovery codes?

GolfNovemberUniform@lemmy.ml on 25 Aug 18:07 collapse

Idk anything about any recovery codes. I was referring to a thing that’s called something like “security token”.

lud@lemm.ee on 27 Aug 08:43 collapse

Ah, alright. Like an API key.

GolfNovemberUniform@lemmy.ml on 27 Aug 10:12 collapse

No it’s not an API key. It’s changed every time you change your password so it’s basically an alternative one but it has an additional feature of bypassing 2FA.

Godort@lemm.ee on 24 Aug 20:59 next collapse

Typically, with scams like this, the attacker is using a tool like Evilginx.

The way this works is that Evilginx runs on a server that the hacker controls and will request the login page from whatever service they are targeting(Discord, Steam, Google, etc) and then serve it to you as a proxy. It looks entirely legitimate unless you make sure to very closely check the URL.

Once you login, it will take a copy of your Username, your password, and your session token(the thing that lets Discord know it’s you so you don’t need to login again after every refresh). and suddenly the attackers now have access to your account to do whatever they want with it.

Discord should absolutely prevent modifying links in this way specifically for this reason, but good practice as a user is to hover over every link and make sure it’s pointing where it’s supposed to. Don’t click on anything that looks suspicious.

ReversalHatchery@beehaw.org on 24 Aug 21:38 next collapse

Does this rely on the user typing in their password, or does somehow even the browser fall for it and autofill it?

Because in that case, to respond to OP: Firefox is not vulnerable to this, but most users themselves are. Using a password manager like Bitwarden would help, because if you add the website’s real URL to your password entey (happens automatically for the current URL at password entry creation), bitwarden will simply just not show your password entry when the URL does not match.

Also, install uBlock Origin and turn on it’s phising blocklists in the settings. It can be helpful.

Godort@lemm.ee on 25 Aug 05:06 collapse

An attack using this tool does require that the user actually logs in, but because they’re just acting as a proxy for the real login page, the only way you’d spot the difference is if the URL doesn’t match (or that your password manager doesn’t auto-fill)

However, it’s pretty easy to see that someone would be fooled by that as you’d expect to need to confirm your identity when adding a gift card to your steam account.

eager_eagle@lemmy.world on 24 Aug 22:13 next collapse

unless you make sure to very closely check the URL.

or you use random passwords + password manager, which auto-fill won’t work in the fake domain.

refalo@programming.dev on 24 Aug 22:48 next collapse

I struggle to call that hacking in the sense most people probably mean. Phishing is definitely a thing but they’re not ‘breaking’ anything to access a system, they’re just tricking you into giving it to them.

BearOfaTime@lemm.ee on 24 Aug 23:37 collapse

Yep, this is marginally hacking, and a bit more social engineering

zaknenou@lemmy.dbzer0.com on 24 Aug 23:05 next collapse

I don’t understand, as you said the hacker’s server requests my credits, so am I not supposed to be prompted to accept something by the browser or Discord app? Twitter and Google usually prompt you and require you to click “allow”

Godort@lemm.ee on 25 Aug 05:17 collapse

You’ve got half of it. The hacker’s server is acting as a middleman for the real login page. Everything appears legitimate except the URL will be wrong and if you use a password manager, it won’t auto-fill

They access the legit login page and forward it to you, but they’re in the middle capturing everything you send.

When you enter your login details, they will record them and then forward them to the real login window in near real time, effectively logging in as you. They then have a legitimate session token which they can use to access your account without needing to re-authenticate.

zaknenou@lemmy.dbzer0.com on 25 Aug 12:22 collapse

aah, so in this trick I have to enter my creditentials again,

DumbAceDragon@sh.itjust.works on 25 Aug 03:58 collapse

They do already prevent fake links. Their markdown doesn’t work if you have the http scheme in the url, which is why the link in the thumbnail says steamcommunity.com instead of https://steamcommunity.com

Godort@lemm.ee on 25 Aug 05:21 collapse

Sure, but an average user is not going to know to check for the URL protocol. It’s still incredibly effective for phishing

DumbAceDragon@sh.itjust.works on 25 Aug 06:25 collapse

Yeah that’s fair.

ElectroLisa@lemmy.blahaj.zone on 25 Aug 03:01 next collapse

Someone in the comments raised a good question: how clicking a link to a third party website, exposes a discord auth token?

zaknenou@lemmy.dbzer0.com on 25 Aug 15:34 collapse

so, he just over-exaggerated things here, actually when you click there is a page that asks you for your creditentials and kids get tricked to enter them

HATEFISH@midwest.social on 25 Aug 16:12 collapse

So really it’s a phishing attack? Maybe he should say that instead instead of being an alarmist that clicking a link will get your credentials stolen.

Every video I see of this guy is filled with disingenuous bs.

zaknenou@lemmy.dbzer0.com on 25 Aug 16:16 collapse

hmm yeah most likely. I forgot to add a question mark at the end of my reply, maybe it’s not the case, maybe

xylogx@lemmy.world on 25 Aug 15:56 next collapse

Passkey is resistant to these attacks, but user adoption is not widespread enough for Discord to be able to mandate it.

_Atlas_@lemmy.world on 25 Aug 16:49 next collapse

Wtf, if it’s such a huge security bonus, why wait for user adoption, especially if token stealing is an issue?

xylogx@lemmy.world on 26 Aug 13:26 collapse

Change is hard. It has been a long road to get where we are today: major OS and Browser vendor support. Users now need to change their behavior.

toastal@lemmy.ml on 26 Aug 13:35 collapse

What is wrong with good ol’ TOTP & FIDO2?

xylogx@lemmy.world on 26 Aug 15:09 collapse

Passkey is FIDO2.

toastal@lemmy.ml on 26 Aug 16:43 collapse

Based on FIDO Alliance and W3C standards, passkeys replace passwords with cryptographic key pairs. These key pairs profoundly improve security. – developer.apple.com/passkeys/

Based on FIDO2/WebAuthn but unlike them, passkeys are those things Apple & Google have been pushing that live on their servers + one specific device in its secure enclave you as as a user aren’t allowed to look into. FIDO2 is usually tied to some USB security token.

gibson@sopuli.xyz on 27 Aug 04:41 collapse

you can still use a yubikey or even a password manager like keepassxc with passkeys, no need for any google/apple or even secure enclave.

toastal@lemmy.ml on 27 Aug 06:48 collapse

These passkeys want to be unique per site/services & many hardware tokens only have a handful of slots for storage which means such dedicated don’t really work & storing them on say your laptop with your other passwords probably isn’t ideal with Keypass. Many security experts don’t see the advantage over a good hardware token + unique password. Like Big Tech trying to reinvent XMPP with RCS, I feel they are trying to do the same with passkeys so they benefit them.

LodeMike@lemmy.today on 25 Aug 20:01 next collapse

that steals your discord auth token

How???

zaknenou@lemmy.dbzer0.com on 27 Aug 17:04 collapse

that steals your discord auth token

the general census on this thread is that he war over-exaggerating, he meant that it tricks you into inserting you Credential

LodeMike@lemmy.today on 27 Aug 17:40 collapse

So this is just “HTML link hiding in emails” but all over again?

11111one11111@lemmy.world on 25 Aug 21:50 next collapse

Yes. Discord is the absolute worst fucking platform that was designed with mal-intent by a piece of shit company it’s absolutely amazing anyone still uses it.

refalo@programming.dev on 25 Aug 22:13 collapse

Why do you think it’s “amazing” that people use it?

Upstream7564@discuss.tchncs.de on 26 Aug 02:12 collapse

TL;DR: No.

You won’t get hack by only clicking on this link (except if their is a critical exploit in your browser which makes it possible).

zaknenou@lemmy.dbzer0.com on 27 Aug 13:44 collapse

phew