{"id":21214,"date":"2023-06-06T20:59:08","date_gmt":"2023-06-06T16:59:08","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/youtubers-takeovers\/21214\/"},"modified":"2023-06-06T20:59:25","modified_gmt":"2023-06-06T16:59:25","slug":"youtubers-takeovers","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/youtubers-takeovers\/21214\/","title":{"rendered":"Hacking YouTube channels with stolen cookies"},"content":{"rendered":"<p>A couple of months ago, the popular tech blogger Linus Tech was <a href=\"https:\/\/www.theverge.com\/2023\/3\/24\/23654996\/linus-tech-tips-channel-hack-session-token-elon-musk-crypto-scam\" target=\"_blank\" rel=\"nofollow noopener\">hacked<\/a>. All three of his YouTube channels (the biggest of which boasts over 15 million subscribers) fell into the hands of cybercriminals, who began broadcasting streams with crypto-scam ads. How did the hackers manage to gain access to the channels? Didn\u2019t the famous tech-blogger protect his accounts with a strong password and two-factor authentication? Of course he did (at least, that\u2019s what he himself <a href=\"https:\/\/www.youtube.com\/watch?v=yGXaAWbzl5A\" target=\"_blank\" rel=\"nofollow noopener\">says<\/a>).<\/p>\n<p>Linus Tech fell victim to a <em>pass-the-cookie <\/em>attack, a common method for targeting YouTubers. In this post we take a closer look at the objectives and motives behind such attacks, how hackers can access channels without knowing password and second factor, what Google\u2019s doing about it, and how not to fall victim to this attack.<\/p>\n<h2>Why go after YouTube channels?<\/h2>\n<p>\nThe channels of well-known (and not so well-known) YouTubers are usually taken over either to <a href=\"https:\/\/www.youtube.com\/watch?v=kzHBJlMXlFc\" target=\"_blank\" rel=\"nofollow noopener\">demand a ransom<\/a> for their return, or to <a href=\"https:\/\/youtu.be\/xf9ERdBkM5M\" target=\"_blank\" rel=\"nofollow noopener\">gain access to their audience<\/a> (as in the hack on Linus Tech). In the latter case, after hacking the channel, the attackers change the name, profile picture, and content.<\/p>\n<p>Thus, instead of a blog, say, about tech innovation, there appears a channel that imitates the account of some large company (most often Tesla) with the corresponding profile picture. After that, the attackers use it to stream recordings of Elon Musk expressing his thoughts about cryptocurrency. All other blog content is often removed.<\/p>\n<div id=\"attachment_48376\" style=\"width: 3010px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-48376\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/06\/06205814\/youtubers-takeovers-1-scaled-1-scaled-scaled.jpg\" alt=\"Streams with Elon Musk on a hacked channel.\" width=\"3000\" height=\"1681\" class=\"size-full wp-image-48376\"><p id=\"caption-attachment-48376\" class=\"wp-caption-text\">Streams with Elon Musk on a hacked channel. <a href=\"https:\/\/youtu.be\/xf9ERdBkM5M\" target=\"_blank\" rel=\"noopener nofollow\">Source<\/a><\/p><\/div>\n<p>At the same time, a link to a site of a \u201cunique cryptocurrency promotion\u201d is dropped into the chat. For example, Musk himself is supposedly giving away cryptocurrency: to get their share, users are asked to transfer their coins to a certain wallet, after which they will get back twice as much.<\/p>\n<div id=\"attachment_48378\" style=\"width: 3010px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-48378\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/06\/06205835\/youtubers-takeovers-2-scaled-1-scaled-scaled.jpg\" alt=\"Streams with Elon Musk on a hacked channel.\" width=\"3000\" height=\"1495\" class=\"size-full wp-image-48378\"><p id=\"caption-attachment-48378\" class=\"wp-caption-text\">Streams with Elon Musk on a hacked channel. <a href=\"https:\/\/youtu.be\/xf9ERdBkM5M\" target=\"_blank\" rel=\"noopener nofollow\">Source<\/a><\/p><\/div>\n<p>A curious detail: scammers often have the foresight to set restrictions in the chat: only users who\u2019ve subscribed to the channel for more than 15 or even 20 years can post messages (and it doesn\u2019t matter that not only this channel didn\u2019t exist then, but YouTube itself only appeared in 2005).<\/p>\n<p>Sure, this is an example of a typical scam we\u2019ve analyzed <a href=\"https:\/\/www.kaspersky.com\/blog\/nvidia-giveaway-bitcoin-scam\/44844\/\" target=\"_blank\" rel=\"nofollow noopener\">once<\/a> or <a href=\"https:\/\/www.kaspersky.com\/blog\/youtube-bitcoin-scam\/44784\/\" target=\"_blank\" rel=\"nofollow noopener\">twice<\/a> before.<\/p>\n<div id=\"attachment_48379\" style=\"width: 3010px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-48379\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/06\/06205859\/youtubers-takeovers-3-scaled-1-scaled-scaled.jpg\" alt=\"Transfer your bitcoins to us and we'll give you back twice as many.\" width=\"3000\" height=\"1473\" class=\"size-full wp-image-48379\"><p id=\"caption-attachment-48379\" class=\"wp-caption-text\">Transfer your bitcoins to us and we\u2019ll give you back twice as many. <a href=\"https:\/\/www.youtube.com\/watch?v=yGXaAWbzl5A\" target=\"_blank\" rel=\"noopener nofollow\">Source<\/a><\/p><\/div>\n<p>The stream is quickly blocked by YouTube, along with the unfortunate blogger\u2019s channel, for \u201cviolating YouTube\u2019s Community Guidelines\u201d. And then the real owner faces the absorbing task of restoring their own channel and proving to the platform that it was not they who distributed links to fake sites and streamed scam ads.<\/p>\n<p>In the case of Linus Tech, with his 15 million subscribers, this was relatively easy to do. His channel was restored within hours, though he did lose that day\u2019s monetization. How long a YouTuber with a smaller audience would need to rectify the situation, and whether it would be possible at all, are questions you don\u2019t want to get an answer to from your personal experience.<\/p>\n<h2>Hijacking a channel without the password<\/h2>\n<p>\nTo hack a YouTube channel, there\u2019s no need for attackers to steal any credentials. Getting their hands on session tokens will suffice. But first things first\u2026<\/p>\n<p>A typical attack on a YouTube channel <a href=\"https:\/\/www.wired.com\/story\/youtube-bitcoin-scam-account-hijacking-google-phishing\/\" target=\"_blank\" rel=\"nofollow noopener\">begins<\/a> with an email to the blogger seemingly from a genuine company proposing collaboration; this can be a VPN service, a game developer or even an antivirus vendor. There\u2019s nothing suspicious in the first email, so the member of the blogger\u2019s team replies with a standard message detailing their product placement fees.<\/p>\n<p>The next email is far less innocent. In it, the scammers <a href=\"https:\/\/blog.google\/threat-analysis-group\/phishing-campaign-targets-youtube-creators-cookie-theft-malware\/\" target=\"_blank\" rel=\"nofollow noopener\">send<\/a> an archive supposedly containing a contract, or a link to a cloud service to download it, as well as the password for this archive. To make the email more convincing, the attackers often add a link to a website or social network account affiliated with the product they want the blogger to \u201cpromote\u201d. The link can point either to the site of a bona fide company, or to a <a href=\"https:\/\/blog.google\/threat-analysis-group\/phishing-campaign-targets-youtube-creators-cookie-theft-malware\/\" target=\"_blank\" rel=\"nofollow noopener\">fake page<\/a>.<\/p>\n<div id=\"attachment_48380\" style=\"width: 2570px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-48380\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/06\/06205918\/youtubers-takeovers-4-scaled-1.jpg\" alt='Email with a link to download an archive with a \"contract\".' width=\"2560\" height=\"1352\" class=\"size-full wp-image-48380\"><p id=\"caption-attachment-48380\" class=\"wp-caption-text\">Email with a link to download an archive with a \u201ccontract\u201d. <a href=\"https:\/\/www.youtube.com\/watch?v=5FzsM3V5xRo\" target=\"_blank\" rel=\"noopener nofollow\">Source<\/a><\/p><\/div>\n<p>If the blogger or their employee is not careful and unzips the archive, they\u2019ll find one or more documents that may look like regular Word or PDF files. The only odd thing is that all the files are quite large (more than 700MB), which makes it impossible to scan them for threats using a service like <a href=\"https:\/\/www.virustotal.com\/gui\/home\/upload\" target=\"_blank\" rel=\"nofollow noopener\">VirusTotal<\/a>. Many security solutions will skip them for the same reason. Opening the files with special tools for analyzing executables reveals the presence of very many empty spaces, which is what makes these documents so big.<\/p>\n<p>Of course, hiding inside the file that looks like an innocent contract is a whole host of malware. Aware of the problem, Google <a href=\"https:\/\/blog.google\/threat-analysis-group\/phishing-campaign-targets-youtube-creators-cookie-theft-malware\/\" target=\"_blank\" rel=\"nofollow noopener\">analyzed<\/a> such attacks and identified the various types of malware used. Among them was the <a href=\"https:\/\/www.kaspersky.com\/blog\/redline-stealer-self-propagates-on-youtube\/45528\/\" target=\"_blank\" rel=\"noopener nofollow\">RedLine Trojan stealer<\/a>, which has been <a href=\"https:\/\/youtu.be\/nYdS3FIu3rI\" target=\"_blank\" rel=\"nofollow noopener\">blamed<\/a> by many YouTubers for their misfortunes lately.<\/p>\n<p>Attackers use this malware to achieve their main aim of stealing session tokens from the victim\u2019s browser. With the help of session tokens or cookies, the browser \u201cremembers\u201d the user, allowing them to avoid going through the full authentication process each time with a password and second factor. That is, stolen tokens let cybercriminals impersonate authenticated victims and log in to their accounts without the credentials.<\/p>\n<h2>What about Google?<\/h2>\n<p>\nGoogle has been aware of the problem since 2019. In 2021, the company published a major study entitled <a href=\"https:\/\/blog.google\/threat-analysis-group\/phishing-campaign-targets-youtube-creators-cookie-theft-malware\/\" target=\"_blank\" rel=\"nofollow noopener\">Phishing campaign targets YouTube creators with cookie theft malware<\/a>. Google\u2019s Threat Analysis Group investigated the social engineering techniques and malware deployed in such attacks.<\/p>\n<p>Following the study, the company announced it had taken a number of steps to protect users:\n<\/p>\n<ul>\n<li>Extra heuristic guidelines were implemented to identify and prevent phishing and social engineering emails, cookie theft hijacking, and fraudulent cryptocurrency livestreams.<\/li>\n<li>Safe Browsing now includes enhanced capabilities to identify and block malicious webpages and downloads.<\/li>\n<li>YouTube has strengthened the processes involved in transferring channels, and successfully detecting and automatically recovering more than 99% of compromised channels.<\/li>\n<li>Account Security has reinforced the authentication procedures to prevent and alert users about potentially risky activities.<\/li>\n<\/ul>\n<p>Are these measures working? Judging by the <a href=\"https:\/\/youtu.be\/xf9ERdBkM5M\" target=\"_blank\" rel=\"nofollow noopener\">comments<\/a> of YouTubers themselves, and the fact that such hacks continue to occur regularly (when writing this post, I myself found Elon Musk streams on three evidently stolen channels) \u2014 not really. That same Linus Tech was <a href=\"https:\/\/www.youtube.com\/watch?v=yGXaAWbzl5A\" target=\"_blank\" rel=\"nofollow noopener\">outraged<\/a> that, in order to change the name of the channel and its profile picture and also remove all videos from the channel, YouTube does not ask the user to enter a password or second factor code.<\/p>\n<h2>Protect your channel yourself<\/h2>\n<p>\nIn order not to lose control over your own channel, it\u2019s wise to take a number of precautions. First of all, install <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security\/cloud?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kescloud___\" target=\"_blank\" rel=\"noopener\">reliable protection<\/a> on all work devices and hold regular team trainings in cybersecurity. Everyone with access to business accounts must:<\/p>\n<ul>\n<li>Know the typical signs of phishing<\/li>\n<li>Be able to identify social engineering<\/li>\n<li>Never follow suspicious links<\/li>\n<li>Never download or open archived attachments from untrusted sources.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kes-cloud\">\n","protected":false},"excerpt":{"rendered":"<p>How scammers can hack your YouTube channel without knowing a password and second factor.<\/p>\n","protected":false},"author":2684,"featured_media":21217,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1917],"tags":[2540,22,695,1663],"class_list":{"0":"post-21214","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cookie","10":"tag-google","11":"tag-scam","12":"tag-youtube"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/youtubers-takeovers\/21214\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/youtubers-takeovers\/25774\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/youtubers-takeovers\/28469\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/youtubers-takeovers\/26073\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/youtubers-takeovers\/26413\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/youtubers-takeovers\/28893\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/youtubers-takeovers\/35499\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/youtubers-takeovers\/48375\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/youtubers-takeovers\/20708\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/youtubers-takeovers\/21395\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/youtubers-takeovers\/30231\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/youtubers-takeovers\/34043\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/youtubers-takeovers\/26380\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/youtubers-takeovers\/32084\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/youtubers-takeovers\/31767\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/scam\/","name":"scam"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2684"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=21214"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21214\/revisions"}],"predecessor-version":[{"id":21216,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21214\/revisions\/21216"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/21217"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=21214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=21214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=21214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}