Crazy Steam Phishing Page

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
How can you protect yourself from  phishing? I work as a security consultant,   I’m a “professional hacker”, and I wanted  to tell you what you have to look out for.   But before you listen to what I have to say,  why don’t you share in the comments what you   do to not get phished, and then after the  video you can check if you do it like me. Phishing describes an “attack” where somebody  tries to trick you, to enter your login   credentials on a fake website. The website  might look and feel like the real website,   but the actual domain is different. When entering  the password here you basically give it to the   attacker voluntarily. I mean, not voluntarily,  the attacker tricked you. But this is actually   extremely SIMPLE to do. Every beginner web  developer can do that within the first week   of learning programming. It’s very simple, but  extremely effective. Besides reusing the same   password on different websites, phishing is the  main risk of getting your account hacked. So how   can we make sure to not fall for those tricks? How can we know if we are on a trustworthy site   or a fake phishing site? I actually already mentioned the solution.   Look at this. What’s the difference between  the real website and the fake website? It’s   the domain. This is the most important security  indicator you have. In fact it’s the only security   indicator you have, to determine if this is the  real website, or if it is the phishing website. So you have to look at the URL to find the  domain. But understanding a URL is not simple.   It’s actually pretty hard. EVEN for computers it’s  hard and we expect at least them to understand it.   If you are curious I made a video once about  “HOW FRCKN' HARD IS IT TO UNDERSTAND A URL?”,   but it’s a very technical video. So no need to  watch it. But luckily as a user we don’t have   to go this deep into it. Even though this URL is  extremely long, the browser helps us to identify   the part that actually matters to us. It’s the  domain name here. You see that the browser is   highlighting the important part with a lighter  color, and shows the less important part in grey. As you can tell, this is the login page from  Google and I’m using the Google Chrome browser   on macOs. But you might be using a different  operating system and browser. So let’s look at   this page and URL bar in different environments.  Here for example is the Edge Browser on Windows,   and an older version of Edge. As you  can see, Edge does it similar to Chrome,   highlighting the important domain part. But  checkout firefox. They also highlight the domain,   but only the main top domain. It does not  include the subdomain when highlighting.   But that is fine, the subdomain, so the part  before this dot, is controlled by the company   who controls the top part. The top part  is google.com, so clearly that is safe.  Maybe firefox is helping us a bit more in this  case, because to verify that you are really   logging into google.com, and not a phishing site  like go0gle.com with a zero. So that kinda tells   you, to generally compare from the right.  This is the main and most important part.  So now that you know that the domain is  important for you to check if you are on   the correct website, let’s look at a browser on  an iPhone. Because here is something interesting.   Here is Chrome and Safari. Look at this! They are  completely hiding the full URL, and only show you   the important domain. Here you can clearly  see, without getting distracted or tricket,   that this is indeed google.com. So it’s safe. And  actually, this is what safari also does on macOS.   It also hides the URL path. I know, many technical  people, including me, like to see the whole URL,   for hacking it’s important, but to be fair, for  regular users who might be super confused by the   long complex URL, only focusing on the part that  matters for security, the domain, is pretty good.  Actually recently Google was running an  experiment on Chrome to also hide the URL path,   like safari, because they wanted to see if it  helps with security for the general public.   But after a while they concluded that it didn’t  improve important security metrics. So apparently   it didn’t really help to prevent more phishing.  And I can see why. I think people who understand   they have to look at the domain name, will  be fine with the highlighted version. And   for those who do not understand this, they won’t  magically learn this from just seeing the domain. So now I think you understand  where you have to look,   and which part of the URL is important. Thanks  to the browser highlighting parts of the URL,   you know what the domain is. So how do you  now use this knowledge to prevent phishing. It’s kinda simple, but you need to be vigilant.  Basically you have to do the following. Before you   type in your password, practice to always look at  the domain. It doesn’t matter how you got there,   maybe you clicked on a link a friend sent  you, maybe you clicked on a link on reddir,   or you clicked on a link in a phishing spam  email. But before you enter your credentials,   you need to look at the domain. And now you need  to ask yourself, is this the correct domain? Let’s do an example. So here is a login  to the popular game distributor “steam”.   And it looks very legit. This looks like the  steam page! And if you just glance at the URL,   maybe not really looking at it, it looks fine.  Steamcommunity, that is the correct domain.  But we just learned that we need to carefully  look at the URL and upon closer inspection,   we see something phishy going on. It’s actually  not steaM, it’s steaRN. The small r and n looks   like an m at a glance! That is very tricky. Also  the letters are switched here. The community   is misspelled. So this of course is already  suspicious and reason enough to immediately   leave this site and not enter your password.  But the best check is to compare it to the   real trustworthy site. How do you do that?  Maybe you have the correct site bookmarked,   or you remember the URL, OR you can simply google  for steam. And then you just need to go to the   login page. And when we find the same login page  on the now clearly trustworthy site, and compare   the URL, you can now see that it differs. Simply  switching back and forth between the pages you   can CLEARLY see that the domain is different.  So now we know 100%, this is a phishing page.  And that’s it! This is basically what you have  to do. You simply look at the domain before   you enter your password, and then you just  need a way to quickly find the site you know   is the safe site, or you remember the  domain exactly, and then compare it. Unfortunately this seems a bit annoying to  do. And you probably have a hard time making   sure your parents learn to do this. So an  easier way is to actually let the browser   remember the passwords for a site. And you do  not ever type in your own passwords. Because   now the browser checks the domain for you. The  browser will only offer to autofill your password   if the domain matches. So this is  an easy way to never get phished. That’s it. That’s the only way you can figure  out if the site you want to enter your password,   is the site you expected. The safe real  site. Now I could end this video, but for   those people with a more technical interest,  I’d like to talk about a few other things. Checkout this super advanced steam phishing  page. It looks very professional and trustworthy,   but it asks us to login to steam in a new  window. So let’s apply what we just learned.   We know from earlier that the real steam login  page is steamcommunity.com, we can check the URL,   and It looks correct! So is this safe? No,  this is just a very clever phishing page.   This website is FAKING another window. It’s  very obvious here, because this is a typical   windows window, and I’m on a mac. But this could  be really confusing to a lot of users. You really   have to understand and know, that this is your  real browser window, this is the real URL bar.   And all of this here can be fake. You can test it  when you try to move the window around. It moves!   But only within the page. For example it cannot be  moved over the actual browser window. So this is   the actual URL of the site, which is obviously not  the expected steamcommunity.com. So it is fake! That was pretty crazy, right? Next, let’s tackle a technical question some of  you probably have. “Your defense technique depends   on going to the phishing site and comparing  the domain in the URL bar of the browser. So   that means, you already clicked and visited the  malicious site? Doesn’t that mean it’s too late?” Well… yes and no... a lot of anti-phishing  and security awareness training teaches that   clicking on links is already bad. They try to make  malicious URLs sound very scary. And instead of   clicking on them, you should do other checks. For  example check if the URL starts with https://. Or   look at the domain of the link before clicking.  Or in cases where the link is not shown, hover   over the link and check the URL there. But check  the URL how? Now it’s very difficult to know which   part is the domain, it’s not nicely highlighted,  and also links can be faked. For example in HTML   emails the displayed link can be different from  the one that is actually there. Or a seemingly   trustworthy URL is redirecting you to the phishing  site once you click. And when you do this hovering   test, you might be wrong anyway, for example  microsoft often sends mails with these weird   domains, they look cryptic and phishy, and in fact  some people online believe it’s phishing, but it’s   just a link tracker. It is microsoft.com so it’s  trustworthy and it redirects to a safe site.  But this advice is also not completly useless.  You can apply all of that. But it only helps   you to identify a phishing link early. IT DOES  NOT TELL YOU if it’s really trustworthy. There   are lots of indicators it’s phishing, and  it’s great if you can reject a link early   for being clearly phishing. But there is only ONE  test to be sure it's not phishing. To be sure it’s   a safe site. And that is to check the URL bar  in the browser, before typing in your password. Actually, there is one more small test you can do.  If you click on a link and it asks you to login,   you can open another browser tab, go to the real  website and make sure you are logged in. So if you   are not logged in, log in now to the site you know  is safe. And once you are clearly logged in, now   click on the original link again, and if it still  asks you for username and password, it could be a   phishing attempt and you should check the domain.  Sometimes websites ask for a password again for   additional security, so check the domain to make  the final decision. But if it takes you now to   some other content and doesn’t ask you to login  again, you know 100% the link was not phishing. “But… but… clicking on malicious links is  dangerous. Attackers could already hack you” Well… yes? But mostly no. Stop the fear mongering  about malicious websites please. Let me explain   why. First of all it is very important that  you use an up-to-date browser. In particular   that would be Firefox, Chrome or Chromium,  Safari or Edge. They should also automatically   update themselves, so you should not have to  worry about that. So why is this important?  Browsers are a very very complex  piece of software. It seems simple,   just display a website here. But that is very  complex. And complex software will always have   programming mistakes, which an attacker might be  able to exploit to install malware on your device.  So to understand why people say that clicking on  links is bad, we have to go back in time in the   late 2000s to early 2010s, browser exploit  kits were very very widespread. It was not   uncommon that you visit a malicious website, and  it would exploit a vulnerability in your browser,   or an extension like ActiveX, Java applets or  Flash, to install malware on your computer.   This was also called drive-by download.  And once malware is on your computer,   they could steal all your passwords. This was  even a “business model”, as a blackhat criminal   hacker you could rent or buy a collection of these  vulnerabilities in so-called exploit kits. And it   was a business model because it was affordable. A  blackhat criminal could pay a few hundred dollars   per month to get access to an exploit kit that  contained dozens of vulnerabilities. And back   then, browsers were not automatically updated, new  vulnerabilities constantly were found and so this   was a real threat. Now over the years, browsers  got a lot more secure. Though vulnerabilities are   still constantly found,. But let me try to explain  why it’s different today. Here is for example the   website of Zerodium in July 2021. They are an  exploit broker, they buy vulnerabilities from   security researchers and sell them to for example  government agencies. And this is the price list of   what they pay for an exploit. For a remote code  execution including a local privilege escalation   in Safari, Edge or Firefox, they pay up to  100.000$. And for Chrome they even pay up to   500.000$. Now that Edge is also based on Chrome,  I suspect this kinda changes now as well. So this   means two things. First I can guarantee you that  there exists an exploit for your browser right   now. A very powerful attacker could theoretically  take over your device when you visit a malicious   website. But then, how does it make sense when  I say you shouldn’t be scared of clicking links?   Well, the economics are different now. These  exploits are very expensive. It’s not affordable   anymore by your random blackhat hacker who tries  to spread malware to thousands of people. So yes,   there are still people being targeted by it, but  you are probably not one of them. Let’s be fair,   you are too unimportant, so it’s a threat you  probably shouldn’t worry about. And keeping the   browser up to date is the most important defense  you can do, because it means older, cheaper   exploits are not usable against you anymore.  That’s probably the best defense you have.  But this also means if your company requires you  to use an older Browser like Internet Explorer   because you have to access some internal intranet  application, do not use this browser to visit   anything else. For any other website please use  an up-to-date Chrome, Firefox, Safari or Edge. Now before I end this video, I briefly  wanted to mention two-factor-authentication.   Oftentimes 2fa is hailed as the solution against  phishing. But this is not really the case. It is   true, two-factor-authentication is effective  against the most basic form of phishing. So   when you enter your password into a  phishing site, the password is stored,   and an attacker can use the password later to  login and take over your account. But a really   advanced phishing page, can still phish you. For example the advanced steam phishing site   from earlier, when you have an account  with two factor authentication enabled,   the site notices that, and simply also asks  you for the code. So how cann this work?  Well, it’s not different than  when a friend sits at the PC,   and you tell him your username, password and  authentication code. And they type it in for you.   that’s what the phishing website does too. When you enter your credentials, in the background   the site already tries to login to steam, sees  that a code is required, asks you for the code,   and then can supply it. Now the phishing site  is logged into your steam account and can do   anything. This is definitely more technically  advanced, and requires a lot more coding skills   than a basic phishing site. But it’s also  not magic. So two factor authentication   definitely can help against all the basic  phishing stuff, but it’s not bullet proof. So to summarize. It’s good to look at various indications   to recognize a phishing link early, hovering over  links, looking at the email it’s coming from,   looking at obvious spelling mistakes,  and so forth. BUT once you clicked,   always keep in mind to look at the browser  URL bar and make sure the domain, the part   the brower highlights for you, matches the safe  login site you know. And then you should be safe.
Info
Channel: LiveOverflow
Views: 139,714
Rating: undefined out of 5
Keywords: Live Overflow, liveoverflow, hacking tutorial, how to hack, exploit tutorial, phishing awarness, cyber security, ethical hacking, phishing attacks, spear phishing meaning, ethical hacking tutorial, phishing attack website, phishing awareness, phishing awareness training, security awareness phishing, steam, 2fa, two factor, authentication, password, url bar, chrome, firefox, safari
Id: NWtm4X6L_Cs
Channel Id: undefined
Length: 17min 19sec (1039 seconds)
Published: Sat Jul 17 2021
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.