this post was submitted on 24 Aug 2024
53 points (87.3% liked)

Privacy

32165 readers
177 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 37 points 3 months ago (4 children)

Typically, with scams like this, the attacker is using a tool like Evilginx.

The way this works is that Evilginx runs on a server that the hacker controls and will request the login page from whatever service they are targeting(Discord, Steam, Google, etc) and then serve it to you as a proxy. It looks entirely legitimate unless you make sure to very closely check the URL.

Once you login, it will take a copy of your Username, your password, and your session token(the thing that lets Discord know it's you so you don't need to login again after every refresh). and suddenly the attackers now have access to your account to do whatever they want with it.

Discord should absolutely prevent modifying links in this way specifically for this reason, but good practice as a user is to hover over every link and make sure it's pointing where it's supposed to. Don't click on anything that looks suspicious.

[–] [email protected] 28 points 3 months ago (1 children)

I struggle to call that hacking in the sense most people probably mean. Phishing is definitely a thing but they're not 'breaking' anything to access a system, they're just tricking you into giving it to them.

[–] [email protected] 15 points 3 months ago

Yep, this is marginally hacking, and a bit more social engineering

[–] eager_eagle 15 points 3 months ago

unless you make sure to very closely check the URL.

or you use random passwords + password manager, which auto-fill won't work in the fake domain.

[–] [email protected] 3 points 3 months ago* (last edited 3 months ago) (1 children)

They do already prevent fake links. Their markdown doesn't work if you have the http scheme in the url, which is why the link in the thumbnail says steamcommunity.com instead of https://steamcommunity.com

[–] [email protected] 5 points 3 months ago (1 children)

Sure, but an average user is not going to know to check for the URL protocol. It's still incredibly effective for phishing

[–] [email protected] 3 points 3 months ago

Yeah that's fair.

[–] [email protected] 1 points 3 months ago (1 children)

I don't understand, as you said the hacker's server requests my credits, so am I not supposed to be prompted to accept something by the browser or Discord app? Twitter and Google usually prompt you and require you to click "allow"

[–] [email protected] 5 points 3 months ago (1 children)

You've got half of it. The hacker's server is acting as a middleman for the real login page. Everything appears legitimate except the URL will be wrong and if you use a password manager, it won't auto-fill

They access the legit login page and forward it to you, but they're in the middle capturing everything you send.

When you enter your login details, they will record them and then forward them to the real login window in near real time, effectively logging in as you. They then have a legitimate session token which they can use to access your account without needing to re-authenticate.

[–] [email protected] 3 points 3 months ago

aah, so in this trick I have to enter my creditentials again,