Stop Hackers With This!

แชร์
ฝัง
  • เผยแพร่เมื่อ 30 ก.ค. 2024
  • 👉 Free $100 Cloud Computing Credit seytonic.cc/linode
    0:00 Intro
    0:16 Stop Hackers With This
    3:36 Clipboard Hijacking Malware Evolves
    6:55 Silkroad Hacker Identified
    9:28 Linode
    10:07 Outro
    Sources:
    go.theregister.com/feed/www.t...
    therecord.media/could-a-digit...
    www.icrc.org/sites/default/fi...
    www.redcross.org.uk/about-us/...
    www.icrc.org/en/document/embl...
    www.bleepingcomputer.com/news...
    blog.cyble.com/2022/11/02/new...
    darknetlive.com/post/feds-sei...
    arstechnica.com/?p=1895826
    go.theregister.com/feed/www.t...
    www.hackread.com/us-seizes-bi...
    www.bleepingcomputer.com/news...
    www.wired.com/story/silk-road...
    therecord.media/doj-says-it-s...
    www.justice.gov/usao-sdny/pr/...
    ===============================================
    My Website: www.seytonic.com/
    Follow me on TWTR: / seytonic
    Follow me on INSTA: / jhonti
    ===============================================
  • บันเทิง

ความคิดเห็น • 297

  • @camjoo
    @camjoo ปีที่แล้ว +280

    I read my fair share of IT news on the nets and a lot of the info I see here I don't see anywhere else. Quality work. Much respect. Thanks Seytonic

    • @Seytonic
      @Seytonic  ปีที่แล้ว +50

      Thanks :) Pretty sure half the time I spend making videos is spent researching weird corners of the internet

    • @S_MAN_CHAN
      @S_MAN_CHAN ปีที่แล้ว

      @@Seytonic where do you do your research?

    • @ReFlexz0
      @ReFlexz0 ปีที่แล้ว +4

      @@S_MAN_CHAN Weird corners of the internet

    • @ProfessionalGasLighting
      @ProfessionalGasLighting ปีที่แล้ว

      @@Seytonic PLEASE PLEASE PLEASE do a segment on these recent Instagram hackings. I’ve had 3 personal close friends get their account taken, passwords, emails, and numbers are changed and then plants recovery methods to resteal the account even after they have changed the emails and logins to their original owners. So many people fall for this and don’t know what to do

    • @ProfessionalGasLighting
      @ProfessionalGasLighting ปีที่แล้ว

      @@Seytonic the spam bots are even only spamming in positive comments because TH-cam report buttons doesn’t have a “spam” button, the closest thing it has is misinformation which might not be enough to flag spam

  • @joesmith1810
    @joesmith1810 ปีที่แล้ว +80

    This is a good example of why pgp key IDs have been extended from 8 chars to 16 chars. With the advance of computing power, it is no longer infeasible to generate similar addresses. 4 chars is even easier.

  • @diobrando5976
    @diobrando5976 ปีที่แล้ว +184

    I've actually always had the habit of checking the first 4 and last 4 of my wallet address when copy+pasting. Never needed it, but glad I've done it.

    • @michaelvick2872
      @michaelvick2872 ปีที่แล้ว +1

      The apps I use show me the first and last 4 as standard and I have to tap to see the full string, makes my life a lot easier

    • @derrekvanee4567
      @derrekvanee4567 ปีที่แล้ว

      Hw wallet like ledger helps too.

    • @CU.SpaceCowboy
      @CU.SpaceCowboy ปีที่แล้ว

      dumb, cliploggers are usually run with keylogger in another thread so it wouldnt matter. create a new virtual desktop instead thats separated by the kernel so hooking malware wont have access to you

    • @michaelvick2872
      @michaelvick2872 ปีที่แล้ว +1

      @@CU.SpaceCowboy a keylogger wont change the keys you press?

    • @TheAechBomb
      @TheAechBomb หลายเดือนก่อน

      ​@@michaelvick2872clip logger, not key logger

  • @HarryBallsOnYa345
    @HarryBallsOnYa345 ปีที่แล้ว +59

    The Digital Red Cross would get abused by non Hospital organization that also want protection. This would result in Hackers just ignoring or bypassing these measures as well, unfortunately.

    • @thankarezos
      @thankarezos ปีที่แล้ว +11

      there should be a way to not allow non medical companies to use red crosses just like people are not allowed to use red crosses if they are not medical.

    • @HarryBallsOnYa345
      @HarryBallsOnYa345 ปีที่แล้ว +5

      @@thankarezos yes this is true. But this all just relies on the Honor System, you have to trust no one will misuse these protections.
      Likewise this only stops honorable bad actors as well, if someone still wanted to attack these systems they would.

    • @thankarezos
      @thankarezos ปีที่แล้ว +9

      @@HarryBallsOnYa345 with technology its actually easier. For example isps won't issue medical ips

    • @daniel4647
      @daniel4647 ปีที่แล้ว +2

      @@thankarezos There is, hospitals can prove who they are, that's how they can buy medical supplies that are otherwise restricted. So it could easily be done with a list of IPs, could just deny anyone who can't prove they're a hospital from getting on the list. Probably wouldn't even need a third party, hospitals could just maintain it themselves as they're the ones with the most to gain from not abusing the system. And hospitals being in charge of it would ensure it was strictly hospitals and not something like a drug researcher that sort of qualifies as medical but not really.

    • @herrlehrer1479
      @herrlehrer1479 3 หลายเดือนก่อน

      It would also make it even easier for evil hackers like like the conti group who specialized on targeting hospitals with ransomware. Because hospital are very desperate to get that data encrypted again

  • @spacemeter3001
    @spacemeter3001 ปีที่แล้ว +26

    So let me get this straight: This super hacker had 3 billion dollars worth of BTC but didn't get the idea of having a low profile and also keeping the private key on an ENCRYPTED drive?
    Get out of here

    • @ionixm3496
      @ionixm3496 ปีที่แล้ว +3

      prime example of intelligence and wisdom do not overlap

  • @bufordhighwater9872
    @bufordhighwater9872 ปีที่แล้ว +17

    So every source I've seen thus far says the federal statute of limitations on any cyber crime is only 5 years from when the crime took place, how could they still have gone after him? And not to feed into any conspiracy nonsense, but what are the odds they could have gone after him sooner, but wanted to wait for the bitcoin to increase in value (since asset forfeiture is a thing and incentivizes law enforcement to behave questionably when they stand to profit).

    • @marc-andreservant201
      @marc-andreservant201 ปีที่แล้ว +12

      There's no statute of limitations on civil asset forfeiture. It only requires the property to be presently in the possession of someone suspected of having obtained it illegally. If I rob a bank and 5 years + 1 day later I get pulled over with $300,000 in sequential banknotes on the back seat, the police will gladly take it.

    • @anon_y_mousse
      @anon_y_mousse ปีที่แล้ว +3

      @@marc-andreservant201 True, but the law in its current form is abused, as in even if they suspect you of a crime, or claim they suspect, they will cite that as the reason and seize your assets, even if you are innocent, but proving such innocence in court and getting your property back is nearly impossible.

    • @Dysfunctionality15
      @Dysfunctionality15 ปีที่แล้ว +3

      @@anon_y_mousse Yep. In fact, the value of property seized in civil asset forfeiture actually exceeded the value of property stolen in burglaries in 2014, 2015, and 2019.

  • @im_a_blobfish
    @im_a_blobfish ปีที่แล้ว +47

    theres one large issue here.
    theres another difference between soldiers in war and cybercriminals - cybercriminals are criminals
    while soldiers are likely forced to be fighting and are normal people, cybercriminals are all criminals which are trying to achieve something malicious
    when all the hackers have a malicious intent, having a full list of medical devices ip addresses could cause larger issues, psychopaths could specifically target medical devices making their attack much more threatening.

    • @thankarezos
      @thankarezos ปีที่แล้ว

      hackers and cybercryminals are not psycopaths. they just criminals that want to profit from that, they dont do things just for giggles. also if you want to target hospitals ect you can easily find the ip you dont need the list. the list is so the malware knows not to. also in wars, soldiers dont want to kill but they 1. follow orders. 2. kill not to be killed.

  • @whtiequillBj
    @whtiequillBj ปีที่แล้ว +6

    I have an expensive solution. The medical industry needs to make it's own version of IP like IP Red. This is incompatible with IPv6 and IPv4.
    You then get every hospital in the world to migrate to IP Red and never allow traffic from the normal internet.
    Make it so you need to have signed International treaties to use IP Red.
    Okay, That is just me being cheaky but, you could make a protocol that runs on UDP like Google's QUIC. Make a new protocol that runs only on Medical devices.

  • @waldolemmer
    @waldolemmer ปีที่แล้ว +66

    Thanks for consistently producing good content

    • @Seytonic
      @Seytonic  ปีที่แล้ว +13

      I appreciate the comment my dude :)

  • @liarus
    @liarus ปีที่แล้ว +5

    6:17 okay, that's fucked up, i haven't been a victim of it, but i thought "surely checking the last few numbers is a way to avoid this", yeah, no it isn't

  • @ZephyrysBaum
    @ZephyrysBaum ปีที่แล้ว +4

    Scammers scamming scam victims, adding injury to more injury!

  • @salihtaysi
    @salihtaysi ปีที่แล้ว +28

    make servers specific for critical medical systems, leaving almost no reason to hack them

    • @exoticlol
      @exoticlol ปีที่แล้ว +6

      They "don't" want to hack them, they "accidentally hack them".

    • @salihtaysi
      @salihtaysi ปีที่แล้ว +1

      @@exoticlol yeah, im just offering an potential alternative long-term solution

    • @anteshell
      @anteshell ปีที่แล้ว +11

      @@salihtaysi As noted in the video, malware *_does not know_* what computer, server, domain, etc. it is in and will do it's work regardless of it. That is the reason they're trying to find a viable digital identifier for healthcare services. A single purpose physical server simply is not that and does not work as a valid identifier. Thus, your proposal does not work.
      Also, you're a tad arrogant to think that the researchers trying to solve this issue are do damn idiots that they didn't think about it. No, your idea is among the first ones that would come to anyone's mind even if they don't have any knowledge on digital security.

    • @reegyreegz
      @reegyreegz ปีที่แล้ว

      @@anteshell honestly this is like putting a sign outside a shop in a bad neighbourhood saying, please dont steal and thinking thats enough to work. If I or anyone else doesnt give a fk about you, we just ignore the "identifier" and burn your shit down anyways and rob you blind. People think most hackers care. Like calling them honest criminal.
      Hospitals should just use the usual it professionals to secure their shit, you know, the usual.
      This red cross nonsense honestly pisses me off and makes me want to exploit their system.

    • @anteshell
      @anteshell ปีที่แล้ว +2

      ​@@reegyreegz No, it's nothing alike. There are enough people who respect the boundaries on healthcare that this has much potential to make things a bit easier for them. It's quite different to be playing on the lives of tens, hundreds even thousands of people than burglaring a few TVs and jewelry. Not even criminals without a moral compass and the vast majority of them would not want to be responsible of killing people. Besides, no-one is saying that there still aren't any bad actors who'd ignore this stuff.
      Hospitals ARE using professional security measures. The digital red cross is NOT supposed to substitute for them.
      Also, what are you, three years old? At least you act like one. The best way to order them to do something is to say they should not do it. Besides, you don't even have any idea who you'd be attacking. You clearly imply hospitals, but they are not the ones behind this concept.
      Grow up a little, kid.

  • @Lrripper
    @Lrripper ปีที่แล้ว +22

    So you get charged with wire fraud if you scam a drugpin ???

    • @InternetRacks
      @InternetRacks ปีที่แล้ว +11

      if it's profitable for the feds, yes

    • @Dysfunctionality15
      @Dysfunctionality15 ปีที่แล้ว +5

      I mean, you're still a thief even if you only steal from other thieves. Just don't get caught! 🤷

    • @mrbanana6464
      @mrbanana6464 ปีที่แล้ว +2

      @@InternetRacks I wonder if the agents get to keep it for themselves or if it goes directly to the agency 🤔

    • @InternetRacks
      @InternetRacks ปีที่แล้ว +6

      @@mrbanana6464 I'm pretty sure it goes to the agency, but I wouldn't put it past them to be receiving a large bonus this year.

  • @gangsterism
    @gangsterism ปีที่แล้ว +5

    sending crypto you always check the address and amount sent 10 times, if you dont youre doing it wrong

  • @siddiki9778
    @siddiki9778 ปีที่แล้ว +13

    You can counter the clipboard-hijacking malware by simply dragging & dropping addresses from one tab to another or from one application to another. I do this with my password manager so that nothing gets sent into the clipboard. Hope that helps!

    • @ppDomino
      @ppDomino ปีที่แล้ว +1

      What password manager if you don't mind?

    • @siddiki9778
      @siddiki9778 ปีที่แล้ว +4

      @@ppDomino Bitwarden

  • @midimusicforever
    @midimusicforever ปีที่แล้ว +16

    How convenient that the feds could just appropriate the funds...

    • @santiagoeltoma5122
      @santiagoeltoma5122 ปีที่แล้ว

      You just HAVE to hate feds no matter what your ideology or backgound is, its just natural

  • @Alkaris
    @Alkaris ปีที่แล้ว +44

    It's funny how the government thinks that crypto that guy took from Silk Road is now theirs, when clearly, it belongs to that guy who discovered this little exploit in the first place. Plus I probably would of done a better job of concealing it instead of inside some container in the bathroom. Put it where nobody would ever consider looking, even if they scan through the entire house top to bottom.

    • @anon_y_mousse
      @anon_y_mousse ปีที่แล้ว +16

      Agreed. I think the US government has a massive amount of overreach.

    • @Xmw92ba3oenalfk9
      @Xmw92ba3oenalfk9 ปีที่แล้ว

      I’m just glad that James Zhong is getting fucked. I hope gets the maximum time possible and that he ends up homeless after he gets out.

    • @josh_d_k
      @josh_d_k ปีที่แล้ว +12

      And on top of that they wanna jail him for up to 20 years? Seems way overkill if you ask me.

    • @RedOneM
      @RedOneM ปีที่แล้ว +8

      @@josh_d_k Especially when he targeted a three to four digit haul, not nine to ten. Feds always overreach when it comes to their personal interest.

    • @user-kh1es5gg9m
      @user-kh1es5gg9m ปีที่แล้ว +11

      So stupid to stay in the US. He could've moved anywhere in the world with thak kind of money. Especially if he had bought an unkown amount of XMR

  • @8BitShadow
    @8BitShadow ปีที่แล้ว +20

    for the clipboard hijacking (specifically in this case) you could honestly just write a tampermonkey script (quick sudo-code):
    //start script into a sleep-loop
    // if(e.key == "c" && e.ctrlKey)
    // clip = ...
    // if(e.key == "v" && e.ctrlKey && clip != clipboard...)
    // alert("Sumthin' funky with that clipboard there chief.")
    Basically; monitors what you copy, doesn't store anything past the current copy, and just simply checks if your clipboard has suddenly changed by *also* watching what you paste.
    If what you paste is different from what you copied then some 3rd party software has copied to the clipboard or manipulated it.
    Then just pop up a warning with 'alert()' and done. No need to do any more than that.

    • @Michelino_M5
      @Michelino_M5 ปีที่แล้ว

      very nice, but pseudo-code*

    • @saddish2816
      @saddish2816 ปีที่แล้ว +1

      This is very easy to bypass

    • @jabster286
      @jabster286 ปีที่แล้ว

      works perfectly*
      * if the hacker doesn't just, i dunno, wait 30ms before pasting, or replaces the clipboard before and after the paste

    • @8BitShadow
      @8BitShadow ปีที่แล้ว

      ​ @Jabster28 The e.key (and CTRL equivalent) only fires when the keys are pressed *in the browser*. Hell I could even throw in 'document.oncopy = (event)...' as even this only fires within the user agent.
      Unless the external program simulates a CTRL and C keypress/event in the users browser after changing the clipboard; just 'replacing the clipbaord before and after' wouldn't work - I'm sure even windows defender would find simulated keypresses or forced event fires onto a browser highly suspicious.
      The hack program would have to manage to perfectly time it so the changed clipboard pastes and changes the clipboard back all before my script
      Even if the program directly changed the pasted input in the browser; it would def get flagged by an AV either way.
      The entire point of clipboard jacking *is so that the hack does not have to interact with the browser at all to seem as mundane to an AV as possible*.
      I fail to see how waiting any time prior to or after the user pasting would do much of anything, the script would still be checking the clipboard for changes, not the input - it doesn't update the 'clip' variable *at all until* CTRL+C is pressed, the script would still spot the tampering.
      This isn't a 'one shot' script, it loops forever using sleep.
      The only real issue with the code is that, on the copy of the address when pressing the 'copy' button instead of doing CTRL+C, it wont trigger the CTRL+C check ever as the 'copy' button just copies directly to the clipboard and does not simulate a keypress, something the script wasn't made for anyway - but even then that's an easy fix, again just add a 'document.oncopy = (event)...' second and you're all good.

  • @banocean
    @banocean ปีที่แล้ว +9

    Very good idea to show where is the critical infrastructure, it will only bring problems XD

  • @erin1569
    @erin1569 ปีที่แล้ว +14

    The redcross is so important for the future and the present of hacking. There aren't many hacker groups willing to go for healthcare providers or powerplants. I hope a transparent solution will be found asap.

  • @nomore-constipation
    @nomore-constipation ปีที่แล้ว +11

    Pure genius, keep your stolen assets in the same building or property you own. What could go wrong? 🤑

    • @tips1483
      @tips1483 ปีที่แล้ว

      I'd at least take apart a blender or something and hide it in there :D

    • @nomore-constipation
      @nomore-constipation ปีที่แล้ว

      @@tips1483 Do what my alcoholic relative did. Put it in a Ziploc bag in the toilet tank. I gotta hand it to them.
      It at least will be colder than in the open on hot summer days. 😂

    • @tips1483
      @tips1483 ปีที่แล้ว +1

      @@nomore-constipation yeah, only issue is I’ve heard of that too many times they must check that

    • @nomore-constipation
      @nomore-constipation ปีที่แล้ว

      @@tips1483 Well if you really want to go all spy games. Then might I suggest off-site bugout bags. Hollow out a tree or something similar close to the property but not all in your property. Gotta give them the illusion they found your stashes 😏
      When I lived on the school campus we used fake floor & wall trim panels with magnetic locks.
      So it's basically it's setup like the retail tags on clothes. Get a strong magnet on the right spot and it can easily pull open.
      It's where we hid our contraband. 😐

  • @xiaowong6651
    @xiaowong6651 ปีที่แล้ว +8

    4:16 imagine someone's editing their registry and the malware's just replacing the values and ruining their system (more than it already is by having the malware on it)

    • @B0wser998
      @B0wser998 ปีที่แล้ว +3

      Honestly, by "ruining" their system it could save them money in the future if they had to reinstall because of it, getting rid of the malware in the process.

    • @edgay
      @edgay ปีที่แล้ว +3

      Why would the malware wait for the user to edit their registry.. instead of doing it itself xd?

    • @B0wser998
      @B0wser998 ปีที่แล้ว +2

      @@edgay What they meant is the user editing registry by themselves and copy & pasting something from somewhere and the malware editing the string that was copy & pasted in the clipboard. But yeah, unless you are pasting crypto wallets directly into the registry, I don't see this happening. :D

    • @Jeff-ss6qt
      @Jeff-ss6qt ปีที่แล้ว

      @@B0wser998 There are application UUIDs. Maybe they could be slightly similar.

  • @louis-philippesavard742
    @louis-philippesavard742 ปีที่แล้ว +1

    I always thought that checking the 4 last number, was lazy but did it anyway, thanks for confirming it is a bad practice. I'll check the whole number next time.

  • @mrlildylchillin
    @mrlildylchillin ปีที่แล้ว +9

    I wonder how the feds caught that silkroad bitcoin theif. Either they got lucky or thats some incredible/shady detective work

    • @vitolapinta
      @vitolapinta ปีที่แล้ว +1

      Disregard my other comments. I was dumb lol

    • @jamlike1222
      @jamlike1222 ปีที่แล้ว +4

      I mean he probably didn't have a job and was spending thousands of dollars

    • @JustinMumma
      @JustinMumma ปีที่แล้ว +9

      I think luck. I don’t know how true this is, but I read that he called to report a break-in a while back and mentioned having “a lot of bitcoin” which triggered investigation for tax evasion, escalating into this.

  • @there_can_only_be_one__unicorn
    @there_can_only_be_one__unicorn ปีที่แล้ว

    Thanks 👍

  • @ZyDoxx
    @ZyDoxx ปีที่แล้ว +4

    I know a guy that ran these types of malware for a while years ago. The malware compared a crypto wallet to its 200.000 wallets database and took the one that had a nearly identical beginning and end.

  • @jakadirnbek7141
    @jakadirnbek7141 ปีที่แล้ว +5

    To match all 4 last characters they would only need to store 16^4=65536 addresses. As for generating them it would probably be connected with coupon collector problem in probability since each unique 4 hex-letter ending could be a coupon and each address is generated at random. Expected number of "draws"/trials would be n*H_n, where H_n is the n-th harmonic number. H_65536=~11.67, 65536*11.67=~764805 .. which is completely doable.

  • @Beknown107
    @Beknown107 ปีที่แล้ว +17

    I’m confused what zhong actually did, I mean back then there were 0 laws to do with crypto and it was obviously an almost untraceable medium. I bet he talked after they threatened him even though they had nothing in actuality

    • @TheGTP1995
      @TheGTP1995 ปีที่แล้ว +10

      >it was obviously an almost untraceable medium
      Bitcoin's blockchain is, and has always been, public. Anyone can see the transactions. What can be hard to do, is to link a Bitcoin address to a specific person. But as he purchased many things with his Bitcoins, I guess this is how he got caught.

    • @NotKewl
      @NotKewl ปีที่แล้ว +7

      Every BTC transaction can be viewed on the blockchain. It is not untraceable.

    • @Beknown107
      @Beknown107 ปีที่แล้ว +4

      @@TheGTP1995 back then there were almost no parties logging or tracing IP addresses to specific transactions, anonymity was reasonable as long as he mixed the coins

    • @Beknown107
      @Beknown107 ปีที่แล้ว +4

      @@TheGTP1995 that’s a good point though maybe they found the man not the crypto

    • @TheGTP1995
      @TheGTP1995 ปีที่แล้ว +8

      @@Beknown107 This has little to nothing to do with IP addresses. You can link an identity in many other ways. E.g. in the video it is said that he purchased gold and silver bars. How did those end up in his home? If these were shipped to him, he must have given an address. Maybe not his home address, but still some physical location where he had to go to get them. So they could have got him on some camera nearby. Or if he went to a physical store to collect them, police could have gained information on him by talking with people working there.

  • @philippes.42069
    @philippes.42069 ปีที่แล้ว +1

    Lol the thing about hospitals not being targeted by ransomware is pretty strange because in france it happened like 3 times over the past year...

  • @danser_theplayer01
    @danser_theplayer01 ปีที่แล้ว +3

    6:20 can't you write a function on your website that automatically will check every time you pasted something in that specific window if it is equal to the thing you last copied? Or is it inaccessible?

    • @ZoeyMikol
      @ZoeyMikol หลายเดือนก่อน

      How will it check what you last copied? By reading the clipboard. This malware changes your clipboard. You're better off writing your own program that keeps track of your clipboard and makes sure nothing changes it, alerting you if something does.

  • @CU.SpaceCowboy
    @CU.SpaceCowboy ปีที่แล้ว +3

    if tour that paranoid create a new virtual workspace, its separated by the kernel. this means hooking from loggers etc wont have access to your new desktop. you can add hot keys to the program to allow you to switch back and forth.

    • @Jeff-ss6qt
      @Jeff-ss6qt ปีที่แล้ว +1

      That won't work if you're infected with malware. Usually if one is running on your system the rest will follow, since they come in bundles and even download more stuff.
      In the case of a rootkit, your kernel is compromised. So, everything running on top of it is compromised. In the case of a malicious filter-driver, everything can be changed, hidden, and stolen from you. If you have a RAT or Remote Access Trojan then everything you do is compromised and you even have a human creeping on you for extra horror. A worm, worst-case-scenario everything you own is compromised now. A persistent malware that infects your UEFI, safe mode in Windows and even likely Linux won't keep you safe. A persistent malware that infects a firmware chip on your motherboard, Optical Media drives, hard drives, USB Flash drive controller firmwares, etc., God can't even help you there.
      If you're PWNED, you're BONED. So don't think a virtual workspace will save you if your main one is now untrusted. Everything on the top layers are untrusted as well.

    • @CU.SpaceCowboy
      @CU.SpaceCowboy ปีที่แล้ว +1

      @@Jeff-ss6qt agreed, a shell is a shell and it really wouldnt matter. it would only be practical on a company computer that might monitor your activity

  • @LOGoltem4682
    @LOGoltem4682 ปีที่แล้ว +10

    2:07 Or to troll keep accessing the file for no reason and the staff needs to work over time to keep the systems locked down.

  • @1337h3x
    @1337h3x ปีที่แล้ว

    @6:36
    Not an expert on quantum computing but I think there is a specific bridge you can use to do this

  • @chrisjinks5414
    @chrisjinks5414 ปีที่แล้ว +8

    I hope he encrypted the shiz out of that SD, then he might have a bargining chip becuase my guess is they want the crypto more than they want him.

    • @DRSDavidSoft
      @DRSDavidSoft ปีที่แล้ว +6

      Yes, it would be very stupid of a multi-billion worth SD card owner to just hide it without any encryption in a bathroom cabinet. You'd think that no one is going to look for it there, but the "good old-fashioned police work" is exactly this. Once the person's a suspect, they're going to inspect every possible hiding place in their home, and not just for SD cards.

    • @DarkGT
      @DarkGT ปีที่แล้ว +3

      For the amount of money it is, I bet they will use some supper computer to crack in few days.

    • @anon_y_mousse
      @anon_y_mousse ปีที่แล้ว +2

      @@DRSDavidSoft They would even smash through the walls too.

    • @chri-k
      @chri-k ปีที่แล้ว +3

      @@DarkGT that is infeasible, no matter how big a server room you have.

    • @DRSDavidSoft
      @DRSDavidSoft ปีที่แล้ว +1

      @@chri-k That's correct if you use a proper encryption scheme with large keys, which is what the owner should have done.

  • @Squeeekii
    @Squeeekii ปีที่แล้ว +2

    much love my dude, have a great weekend + chat too :)

  • @iUUkk
    @iUUkk ปีที่แล้ว

    An extra checksum next to a crypto address would do wonders :)

  • @ZentaBon
    @ZentaBon ปีที่แล้ว

    I love this so much

  • @Paco1337
    @Paco1337 ปีที่แล้ว +2

    I had a similar malware with pasting wrong address.

  • @ThourCS2
    @ThourCS2 ปีที่แล้ว +1

    I lost $5000 with the Clipboard Hijacking where the address was exactly similar to my address. 5 digits front and 4 digits on the back.
    It sucks man. :/

    • @ZoeyMikol
      @ZoeyMikol หลายเดือนก่อน

      Holy shit, 9 digits of similarity? That's over 68 billion possible private keys you'd have to convert. Even at some crazy, modern GPU speed, like 1000 Mkeys/s, it would have to run at max processing speed for over a minute. And that's over 5 terabytes of pre-computed keys. Even if you got unlucky and one of the digits was just randomly correct, it'd still be several seconds of processing, or hundreds of gigs of pre-computed keys. I really wonder how they manage to do something like that.

  • @cajunfox
    @cajunfox ปีที่แล้ว

    Oooo the double dip 🍦🍦

  • @enkephalin07
    @enkephalin07 11 หลายเดือนก่อน +1

    No one could mistakenly hack Red Cross, and intentionally attempting would be a worse mistake than abusing cats on 4chan.

  • @EmM-ko7mu
    @EmM-ko7mu ปีที่แล้ว

    I had something like this but it was just a bad/invalid QR code and copy paste worked

  • @johnkx9496
    @johnkx9496 ปีที่แล้ว +1

    Can’t they make a bitcoin stealer that acts as a request proxy , so even if the address is right , when you send the payment it will intercept the request and change the address ?

    • @raresandrei7205
      @raresandrei7205 ปีที่แล้ว +1

      Only if they hijack the wallet/payment app. If you have a webwallet is a bit harder to do and a core wallet needs to be hooked in and modified before the data reaches the chain

  • @jeffbrownstain
    @jeffbrownstain ปีที่แล้ว +1

    This video makes me think the internet is getting stupider. Again.

  • @corners1733
    @corners1733 ปีที่แล้ว

    Epic

  • @OfficialPooYT
    @OfficialPooYT ปีที่แล้ว +3

    For a seizure of maybe 3billion dollars how are you the only person mentioning this? Thanks 🙏 ❤ your work bro

  • @hurtjonnegut
    @hurtjonnegut ปีที่แล้ว

    Why would hackers respect these do-not-call lists? Why wouldn’t they target them knowing how valuable they are?

  • @felixschndr
    @felixschndr ปีที่แล้ว +9

    Now I am curious, what would your ideas of storing and hifing such an SD card be? Maybe put themicro SD card INTO a normal size SD card (so that the normal one still works)? Hide it in the case of some device such as TV or wifi repeater? Hide it in the earth of a pottet plant?

    • @DRSDavidSoft
      @DRSDavidSoft ปีที่แล้ว +7

      Store it in cloud with an additional recovery key that could be remembered instead of written down? I think some special opsec and/or transfer mechanism should be developed and used for anyone having such wallets.
      Any cryptocurrency wallet containing >1B$ should be stored with careful considerations, as it's similar to an account containing unlimited amounts of funds for a regular person, during the lifetime of that wallet use.
      You can't just put it without any encryption in a bathroom cabinet, lol

    • @hhvhhvcz
      @hhvhhvcz ปีที่แล้ว +7

      not to mention SDcards are like the worst forms of storage - they constantly fail on when i play with my RPi, would never there to store there a wallet with one coin, let alone exceeding billion dollar
      he should have generated a private key through some mnemonic and then use that to encrypt the private key of the wallet and distribute that into multiple places both online and offline, no wonder certain anon orange crypto is better than shitcoin

    • @anon_y_mousse
      @anon_y_mousse ปีที่แล้ว

      @@DRSDavidSoft I don't know if you've ever thought about it this way before, but 1 million seconds takes 11.57 days to elapse, while 1 billion seconds takes 31.71 years to elapse. If you had a billion dollars you could spend a dollar a second for decades and not go broke.

    • @DRSDavidSoft
      @DRSDavidSoft ปีที่แล้ว +1

      @@anon_y_mousse Exactly my point, there should be a system in place that's developed exactly for spending huge amounts of cryptocurrency from anywhere, without ever needing to retrieve a key from a SD card in a bathroom cabinet.

  • @menjolno
    @menjolno ปีที่แล้ว

    Zhong tried to brag by storing everything unsecured. He's cringe.

  • @RedOneM
    @RedOneM ปีที่แล้ว +4

    Vanity adress generation isn't worth $59 🤣 Hackers scamming other hackers. Hacker with even basic knowledge can easily run a vanity adress generation code or even write own.

    • @user-xz1ur8us5p
      @user-xz1ur8us5p ปีที่แล้ว +3

      Lets be honest, the majority of low level cyber criminals are likely script kiddies who don't probably know how to code at all.

    • @seanfaherty
      @seanfaherty ปีที่แล้ว +2

      Yup,
      Malware by subscription and these idiots will be surprised when the malware hides other malware.

    • @Jeff-ss6qt
      @Jeff-ss6qt ปีที่แล้ว

      I think they might be paying for the computer power needed to brute-force it.

  • @Nontoxicz
    @Nontoxicz ปีที่แล้ว +1

    Just lost nearly $10k crypto yesterday to a clipboard hijacker. It was my own fault. I used that laptop to watch some sketchy UFC streams which was dumb. Trying to be grateful for the things i do have

  • @isheamongus811
    @isheamongus811 4 หลายเดือนก่อน

    Spam the emblem anywhere. Each traffic/communication.

  • @dark-webmysterious4922
    @dark-webmysterious4922 ปีที่แล้ว

    can you make a video on FTX crash? please.

  • @fiecylick3981
    @fiecylick3981 ปีที่แล้ว

    On PC use Ctrl+f and paste into the highlight. This would validate if that exact key is the same. If not then it is malware. Best advice I have for it. Phone users Idk

    • @Nontoxicz
      @Nontoxicz 11 หลายเดือนก่อน

      I just check the whole address side by side. Unfortunately I had to pay $10k to learn how necessary that was 😅

  • @alejandroalzatesanchez
    @alejandroalzatesanchez ปีที่แล้ว +3

    ME: But how i make the red cross work?
    Seytonic: That's the neat part you don't

  • @username4755
    @username4755 ปีที่แล้ว

    Dude in thumbnail looks like it could be Chamillionaire

  • @soggamer6974
    @soggamer6974 ปีที่แล้ว +5

    Bruh why something implement if hospitals could use their own local servers (without internet connection) which could be used with 2 functions only to upload that data to medical gov site or smh and read from there thats it, really simple soliution, you dont need no DNS or Redcross just server blocking all connections with just 2 allowed rules

    • @anon_y_mousse
      @anon_y_mousse ปีที่แล้ว

      You're right, hospitals shouldn't be connected to the internet.

  • @In_swedish_the_jam_means_sylt
    @In_swedish_the_jam_means_sylt 11 หลายเดือนก่อน

    An honour based system is the only one hackers will honour for sure

  • @zigafide
    @zigafide ปีที่แล้ว +1

    the silk road hacker story is so lame. i feel like that was his BTC fair and square especially since the site has been shut down forever now

  • @xntumrfo9ivrnwf
    @xntumrfo9ivrnwf ปีที่แล้ว +10

    I almost fell prey to clipboard hijacking ~a year ago. I was about to make a (relatively small) crypto payment, and very luckily, I double checked the address I copy-pasted before sending. It was completely different. At first I was super confused, but once I figured out what was going on, I wiped and reinstalled everything

    • @DRSDavidSoft
      @DRSDavidSoft ปีที่แล้ว +10

      Makes you wonder how such a malware gets installed on your machine in the first place, I would take an image of all executables for further inspection.

    • @takipsizad
      @takipsizad ปีที่แล้ว +2

      @@DRSDavidSoft yeah

  • @raiden72
    @raiden72 ปีที่แล้ว +5

    Wouldn't this work just about as good as Joe Biden giving Putin a list of things not to attack

    • @Quacking-duck
      @Quacking-duck ปีที่แล้ว +2

      Most cyber criminals have already pledged and not too we just need something that doesn't blow the cover so they will actually use it

    • @raiden72
      @raiden72 ปีที่แล้ว +1

      @@Quacking-duck keyword being most... Now that will just leave our medical establishments more vulnerable to nation state hacking... Especially during wartime. Does anyone think that the Geneva convention actually matters?? Come on people you need to build a real wall not just a fence that says keep out!!!

    • @Quacking-duck
      @Quacking-duck ปีที่แล้ว

      If somebody doesn't follow the Geneva Convention they going straight to prison and if you can't take it to prison they're gonna give you a huge debt

    • @raiden72
      @raiden72 ปีที่แล้ว

      @@Quacking-duck tell that to Russia who has been committing atrocities in Ukraine yet the sanctions aren't working worth a crap. Where's your GENEVA convention now huh?!!!

    • @chri-k
      @chri-k ปีที่แล้ว +4

      The difference is that cyber criminals want to avoid attacking hospitals.

  • @MintyFarts
    @MintyFarts ปีที่แล้ว +4

    I'm not sure that would protect healthcare networks... I mean, some hackers WANT to target those systems..

    • @ZentaBon
      @ZentaBon ปีที่แล้ว +1

      Some people want to target Red Cross, however your concern is valid. A hacker is disconnected emotionally from their actions as they don't see the people they're affecting unless they go out of their way to consider it consciously. A soldier in a battlefield has to choose to kill someone they see with their own eyes. They can't unsee the "human" they're hurting unlike how someone staring at a screen can.

  • @kamlong7358
    @kamlong7358 ปีที่แล้ว +8

    My guess is that since most hospitals nowadays use digital charting software like Epic, which I assume has to talk to Epic servers, or specialised programs (That probably cant/won't run on standard and up-to-date computers) to operate medical machinery, maybe hackers could check/monitor for healthcare specific traffic,

  • @trolly4233
    @trolly4233 ปีที่แล้ว +3

    I have a revolutionary idea, it’s called unplugging. You disconnect literally everything, from everything. It’s so effective not even you can access your computer while you put in such measures.

    • @achannel9598
      @achannel9598 ปีที่แล้ว +1

      Air gap the ultimate defense

  • @ironknightgaming5706
    @ironknightgaming5706 ปีที่แล้ว

    there is a big difference between a hacker and a scammer.

  • @SocialistDog
    @SocialistDog ปีที่แล้ว

    How you feeling about steamdeck?

    • @Hyperboid
      @Hyperboid ปีที่แล้ว

      probably something like "great as long as you don't unlock the file system"

    • @SocialistDog
      @SocialistDog ปีที่แล้ว

      @@Hyperboid oh think that's where I missed up. Lol

  • @Kuratius
    @Kuratius ปีที่แล้ว +4

    What was the attack vector for the customers on your site that got infected by the clipboard malware?

    • @chri-k
      @chri-k ปีที่แล้ว

      how would he know

    • @Jeff-ss6qt
      @Jeff-ss6qt ปีที่แล้ว

      Anything that has access to the clipboard could do it. So, probably a lot of different things.
      Chrome and other modern browsers don't give access to your clipboard by default and you have to explicitly allow it for each site, for example. But, otherwise, everything running on your computer under your current account can.

  • @Charkel
    @Charkel ปีที่แล้ว

    Trust me, if i had a SD card worth billions no one would find it.

  • @Elliott.Revell
    @Elliott.Revell ปีที่แล้ว

    Was expecting lockbit coverage mate!

  • @ZephyrysBaum
    @ZephyrysBaum ปีที่แล้ว +5

    Question: Do you think it is morally right to use LibGen or other similar services to get old books?

    • @Skaos87
      @Skaos87 ปีที่แล้ว +5

      While gaining access to good old fiction books etc. is potentially problematic, I don't have any problems downloading scientific publications (books or papers). Paywalling "knowledge" is fucked up, especially when a single textbook could run you hundreds of ~money~. Fuck that system. Again, downloading "normal books" is likely not as black and white, but contrary to scientific publications, these texts/books often drop significantly in value - especially on the secondhand market. Here it very much depends on the author/publishing house imo. Do I care about people ripping the new Stephen King book? No, not at all. What about a indie-publication? Yes, as long as you have the funds you ought to give to the author. Don't have the money or no (convenient) way to buy the book? Find the author's patreon or alternative to give that way. Also not a thing? Fuck it, download and don't look back.

    • @BeHappyTo
      @BeHappyTo ปีที่แล้ว +3

      Yes. For all books.

    • @nohs8776
      @nohs8776 ปีที่แล้ว +4

      is it morally right to use the internet archive to get old books? or going to the library?

    • @hhvhhvcz
      @hhvhhvcz ปีที่แล้ว +5

      piracy is always morally alright

    • @Cookiekeks
      @Cookiekeks ปีที่แล้ว

      Who cares, just do it

  • @Hyraethian
    @Hyraethian ปีที่แล้ว +1

    If places want to lock down their systems, that's a wonderful headache for IT staff at least. I think this is a good idea. It also generally ups the level of entry for heists. Were going to see major hacks, like set for two dozen lives hacks. It sort of works out for both sides well in the long term. I see this as a benefit to society, both its civil side and its underworld. Plus it will be cool to see how this unfolds. Humans have a way of taking things and using things in ways you wouldn't have thought they would misuse it. Humans are a wonderful level of creative.

  • @ThePlacehole
    @ThePlacehole ปีที่แล้ว

    Storing $1B on an SD card is brave!

  • @ThePowerRanger
    @ThePowerRanger ปีที่แล้ว

    Man these are come clever hacks.

  • @joez.2794
    @joez.2794 ปีที่แล้ว +15

    "It's pretty hard to explain away a multi-billion dollar crypto fortune..."

    • @Lrripper
      @Lrripper ปีที่แล้ว +5

      Yeah cause everybody had 600k to spend in 2012...

    • @joez.2794
      @joez.2794 ปีที่แล้ว +6

      ​@@Lrripper Merely having $600K in 2012 does not automatically make you sussy baka. In the USA anyway...

    • @Jeff-ss6qt
      @Jeff-ss6qt ปีที่แล้ว

      @@joez.2794 They'd probably look into his tax records. If he lied about having $600k he'd be in even more hot water, especially with the IRS. They'd want their cut of the money from something he never actually had to start with.

  • @slickrickcm
    @slickrickcm ปีที่แล้ว

    Copy and paste somewhere else and just type it out instead of pasting it.

  • @mx338
    @mx338 ปีที่แล้ว +8

    Why are criminals so stupid and stay in the country where they made their robbery, even though they could live like a king together with their friends in another country.

    • @user-wi1ep6cm9l
      @user-wi1ep6cm9l ปีที่แล้ว +8

      The criminals which are intelligent and do that do not get caught or attract public attention, meaning that we only get to see reporting on the stupid ones.

    • @RedOneM
      @RedOneM ปีที่แล้ว +5

      In this billion dollar heist, he was probably scared. He likely felt like a wanted #1 criminal when the haul became worth millions, hunderds of millions and then a billion. His original goal was to scam a illegal platform for couple of hunderds - thousands of dollars, not 9 to 10 digits.
      In his shoes, I would have planned months long a out of the country route, once it hit $million+, cuz that's getting real heavy in the eyes of the local laws.
      Transparent chains are toxic, this is why everyone should use Monero, nobodys business what you're doing. Obviously don't commit illegal activities like wire fraud though.

    • @mx338
      @mx338 ปีที่แล้ว +1

      @@RedOneM I am very pro-privacy but financial privacy is a case where I do not think you should not have full privacy.
      Money is power and money is involved in the majority of criminal dealings. The current banking system has issues but the experience for normal people really is fine.

    • @RedOneM
      @RedOneM ปีที่แล้ว +1

      @@mx338 So you never pay with cash?

    • @mx338
      @mx338 ปีที่แล้ว

      @@RedOneM I do but there's limits on how much you can pay with cash, without ID. So I don't see a problem with cash.
      You also can't just send cash with a click of a button to the other side of the world.

  • @brucesmith9682
    @brucesmith9682 ปีที่แล้ว

    "Healthcare identifier found. Better find someone else to hack." said by no bad actor. More like, "Healthcare identifier found. B-I-N-G-O-$$$$$." Great concept with well intentions but would be as useful as "Gun Free Zone" signs that have yet to stop any bad actor from inflicting harm.

  • @insane101hawken7
    @insane101hawken7 ปีที่แล้ว +1

    I MADE IT IN THE FIRST HOUR FINALLY!!!

  • @smartbusinessltd
    @smartbusinessltd ปีที่แล้ว

    Finally… being waiting for an upload

  • @ZephyrysBaum
    @ZephyrysBaum ปีที่แล้ว +1

    omg! that spike!

  • @2OXX
    @2OXX ปีที่แล้ว +4

    Yo I actually feel bad for the last guy

  • @Novers
    @Novers ปีที่แล้ว

    Check for an epic install

  • @USBEN.
    @USBEN. ปีที่แล้ว

    Damn Zhong what a lame ending my dude. Of all the possibilities.

  • @fsdfgasgfisd
    @fsdfgasgfisd ปีที่แล้ว +2

    At least the Silk Road hacker was diversified in assets 😂.

  • @Littlefighter1911
    @Littlefighter1911 ปีที่แล้ว

    Underwhelming.
    That's like banning someone on an Anarchy server.

  • @fathertimegaming17
    @fathertimegaming17 27 วันที่ผ่านมา

    Based on stupid false equivalencies. Anyone can wear an armband but not anyone is in an active warzone. All computers are.

  • @andreujuanc
    @andreujuanc ปีที่แล้ว +2

    Sobeys has a ramsomware issue since last week. Check it out.

  • @dan2800
    @dan2800 ปีที่แล้ว

    Would have been smart move to just destroy the sdcard withdraw few milions of $ and destroy it to dust if someone can't have nobody can

    • @vgamesx1
      @vgamesx1 ปีที่แล้ว +2

      You can fix an sdcard to a degree, you would have to make sure the NAND itself was destroyed for it to be unrecoverable, the smart move would be to not store a billion dollars on a single, relatively unreliable piece of flash and not even fully encrypt its contents.
      I mean seriously, this guy was loaded and was too cheap to buy 3 or 4 encrypted hardware wallets or even several sdards, to split the money and store each separately apart from each other? This must have been hubris, because I don't get how you can steal so much money and still be so stupid to think you won't get caught or anything happen.

    • @dan2800
      @dan2800 ปีที่แล้ว +1

      @@vgamesx1 I sat that destroy the sd card till it's pile of dust

  • @mrhappytroll
    @mrhappytroll ปีที่แล้ว

    Why was he just sitting on the bitcoin? isnt the whole point that its untraceable, just cash out or however the fuck it works. even if he didnt wait till it hit 1b, would still have been hundreds of millions of dollars

  • @amysilver4864
    @amysilver4864 2 หลายเดือนก่อน

    Funny I was exploiting the last vulnerability on crypto gambling websites years ago.

  • @OfficialJuggaloJesus
    @OfficialJuggaloJesus ปีที่แล้ว +2

    The digital Red Cross needs to be embedded into the O.S. upon purchase and the computers with said embedded Red Cross OSes need to only be purchased from licensed sellers of Digital Red Cross O.S. machines.
    The only issue is that eventually the O.S. will leak and allow for all computers to become the Digital Red Cross.
    I agree it's a VERY tricky issue but the issue is that we don't need to be caring about protecting the bad actors. Bad actors are bad actors and we need to be more worried about cyber security on a national security level which we are not because our nuclear arsenals are not connected to the internet and they don't care about the general populace the way they say they do which is why we are seeing hack attacks against water departments poisoning the water supplies.

    • @OfficialJuggaloJesus
      @OfficialJuggaloJesus ปีที่แล้ว +2

      NEVER TAKE A GREEDY BAD ACTOR BLACK HAT HACKER AT THEIR WORD THAT THEY WILL NOT TARGET YOU FOR ANY REASON. THAT IS GULLIBILITY WHICH IS EXACTLY WHAT HACKERS EXPLOIT THROUGH SOCIAL ENGINEERING.

    • @diablominero
      @diablominero ปีที่แล้ว

      If you don't protect bad actors, they have no reason to cooperate with your digital red cross. It's the same as the reason why medics aren't supposed to shoot enemy soldiers.

    • @OfficialJuggaloJesus
      @OfficialJuggaloJesus ปีที่แล้ว

      @@diablominero they have no reason to cooperate, they're bad actors. They act like they have a reason to cooperate but all is fair in love in war. I don't know one man who would pick the Geneva Convention over being handed $1,000,000 tomorrow to break the rules of engagement.

  • @sprtwlf9314
    @sprtwlf9314 ปีที่แล้ว

    Your videos are fantastic.

  • @purenationalistlucasrajput6160
    @purenationalistlucasrajput6160 ปีที่แล้ว

    ok

  • @sookmaideek
    @sookmaideek ปีที่แล้ว

    pls no hack

  • @tamertamertamer4874
    @tamertamertamer4874 ปีที่แล้ว

    Thé concept of a digital Red Cross is stupid. Like the fbi would have the digital Red Cross to not be targeted which would make the entire system useless

  • @bottleogames
    @bottleogames ปีที่แล้ว

    here

  • @TheGrzybon
    @TheGrzybon ปีที่แล้ว +6

    bro, faking a red cross armband is a warcrime you know

  • @ifur
    @ifur ปีที่แล้ว

    Stealing from dark web still a crime ✍🏻

  • @mycelia_ow
    @mycelia_ow ปีที่แล้ว

    Billion dollar microSD card

  • @Stuntman5701
    @Stuntman5701 ปีที่แล้ว +1

    i mean, since medical is important. it would even make more senese to just hack medical related servers?? more important = bigger ransom.

    • @Seytonic
      @Seytonic  ปีที่แล้ว +1

      Yes, but it gets the attention of the media/government, which leads to ransomware becoming more of a hot topic - which is bad for cybercriminals'' business.