Upvote Upvoted 0 Downvote Downvoted
1 2
Scammer
31
#31
1 Frags +
MasterKuniStarkyou type in your username and password into the fields and then the website takes them
its not about downloading some dodgy .exe file

To be fair, the "explain these photos please" scam does in fact involve downloading a dodgy .exe file, although this isn't that.

Yup, and dealt with. - http://raxxpack.wordpress.com/2014/06/03/reverse-engineer-a-key-logger/

For this case however, they bypass steam guard by grabbing your SSFN file from your computer.
Don't underestimate updating your anti-virus folks.

[quote=MasterKuni][quote=Stark]
you type in your username and password into the fields and then the website takes them
its not about downloading some dodgy .exe file[/quote]

To be fair, the "explain these photos please" scam does in fact involve downloading a dodgy .exe file, although this isn't that.[/quote]

Yup, and dealt with. - http://raxxpack.wordpress.com/2014/06/03/reverse-engineer-a-key-logger/

For this case however, they bypass steam guard by grabbing your SSFN file from your computer.
Don't underestimate updating your anti-virus folks.
32
#32
2 Frags +

It's some website that's made to look exactly like the steam website so you enter your information thinking it's the real thing.

It's some website that's made to look exactly like the steam website so you enter your information thinking it's the real thing.
33
#33
-1 Frags +
MasterKuniThey don't use Steam Guard.

ur dum

they usually either mirror the steam guard confirmation box and get you to check your own email or ask you to upload a steam certificate that says you are who you are

[quote=MasterKuni]
They don't use Steam Guard.[/quote]
ur dum

they usually either mirror the steam guard confirmation box and get you to check your own email or ask you to upload a steam certificate that says you are who you are
34
#34
2 Frags +
eeeMasterKuniThey don't use Steam Guard.ur dum

they usually either mirror the steam guard confirmation box and get you to check your own email or ask you to upload a steam certificate that says you are who you are

Um, neither of those cases uses Steam Guard. In both cases, they are making fake login boxes using Steam Guard visual assets, and in the second one they have you download a phishy exe file to steal your Steam authentication certificate. My point still stands.

[quote=eee][quote=MasterKuni]
They don't use Steam Guard.[/quote]
ur dum

they usually either mirror the steam guard confirmation box and get you to check your own email or ask you to upload a steam certificate that says you are who you are[/quote]

Um, neither of those cases uses Steam Guard. In both cases, they are making fake login boxes using Steam Guard visual assets, and in the second one they have you download a phishy exe file to steal your Steam authentication certificate. My point still stands.
35
#35
1 Frags +
eeeMasterKuniThey don't use Steam Guard.ur dum

they usually either mirror the steam guard confirmation box and get you to check your own email or ask you to upload a steam certificate that says you are who you are

I guess those are amateurs. You can actually infect computers with malware from just visiting the webpage, aka drive-by-downloads.

Malware can be hidden inside invisible elements on the site, such as iframes or unobfuscated JavaScript code; it can even be embedded in multimedia files, such as images, videos, or Adobe Flash animations. When the page loads, the malware infects the visitor's computer using vulnerabilities in the browser or plug-ins.

[quote=eee][quote=MasterKuni]
They don't use Steam Guard.[/quote]
ur dum

they usually either mirror the steam guard confirmation box and get you to check your own email or ask you to upload a steam certificate that says you are who you are[/quote]

I guess those are amateurs. You can actually infect computers with malware from just visiting the webpage, aka drive-by-downloads.

Malware can be hidden inside invisible elements on the site, such as iframes or unobfuscated JavaScript code; it can even be embedded in multimedia files, such as images, videos, or Adobe Flash animations. When the page loads, the malware infects the visitor's computer using vulnerabilities in the browser or plug-ins.
36
#36
0 Frags +
elrahimoI guess those are amateurs. You can actually infect computers with malware from just visiting the webpage, aka drive-by-downloads.

How do they escape the browser sandbox without user interaction? I'm genuinely curious.

EDIT: Damn you already answered it :(

[quote=elrahimo]
I guess those are amateurs. You can actually infect computers with malware from just visiting the webpage, aka drive-by-downloads.[/quote]

How do they escape the browser sandbox without user interaction? I'm genuinely curious.

EDIT: Damn you already answered it :(
37
#37
0 Frags +

I got added by some dude who sent me the exact same message. I just removed him either way once he sent me that link.

I got added by some dude who sent me the exact same message. I just removed him either way once he sent me that link.
38
#38
3 Frags +

http://puu.sh/b0B4x/c407607a23.png

He doesnt want to give me his items

[img]http://puu.sh/b0B4x/c407607a23.png[/img]
He doesnt want to give me his items
39
#39
0 Frags +

Yea, the BEST thing to do is update update update.
- Browser
- Windows/OSX security updates
- Anti-virus

Hackers use browser exploits to install the crime ware, but these exploits get patched very quickly.

Yea, the BEST thing to do is update update update.
- Browser
- Windows/OSX security updates
- Anti-virus

Hackers use browser exploits to install the crime ware, but these exploits get patched very quickly.
40
#40
1 Frags +
elrahimoYea, the BEST thing to do is update update update.
- Browser
- Windows/OSX security updates
- Anti-virus

Hackers use browser exploits to install the crime ware, but these exploits get patched very quickly.

To add on to this:

[*] Don't skip Flash/Java updates. These are huge vectors for exploits.
[*] Consider running Flashblock/ScriptBlock plugins on your browser and whitelist trusted sites.

[quote=elrahimo]Yea, the BEST thing to do is update update update.
- Browser
- Windows/OSX security updates
- Anti-virus

Hackers use browser exploits to install the crime ware, but these exploits get patched very quickly.[/quote]

To add on to this:

[*] Don't skip Flash/Java updates. These are huge vectors for exploits.
[*] Consider running Flashblock/ScriptBlock plugins on your browser and whitelist trusted sites.
41
#41
-4 Frags +

Report, Remove, Block, Repeat

ayy lmao

Report, Remove, Block, Repeat

ayy lmao
1 2
Please sign in through STEAM to post a comment.