STEAM GROUP
TF2 Outpost by Fanbyte
Membership by invitation only
STEAM GROUP
TF2 Outpost by Fanbyte
3,672
IN-GAME
23,244
ONLINE
Founded
7 August, 2011
Language
English
Showing 231-240 of 368 entries
1
SEARCH ISSUE
44
New Layout Discussion
64
Phishing links
23
New Search Layout?
3
Number of trades
23
New Search Layout?
13
Is it against the rules to..
64
Phishing links
Originally posted by Zemnmez:
Greetings all, my job on TF2OP is to find and advise on securing 0days and other exploits, as such this is very relevant to what I do. I'm considering making a post with advice on these things, but I don't really know what people want to know, so ask away if you have any questions.

I take it you want to make a post about giving guidelines / help on how one can protect himself from attacks.

I don't have any questions about that, but maybe some answers that may help you out with what should be covered, in my opinion.

- keep your OS up-to-date
- keep your Browser up-to-date
- keep your Browser plugins and add-ons up-to-date and to a minimum required
- update especially Flash and Java regularly
- maybe disable the Java Plugin if you don't know you need it
- consider Flash block as browser add-on (but that might hurt TF2OP Ads)
- consider a (free) Virus protection, (e.g Avira)
- if you see a post / link offering anything for free, ignore it and don't click any links.
- if you did use a link and are prompted to download anything, do not accept the download
- if you did use a link and are prompted accept executing anything by your browser, do not accept
- you should not get a steam login page after visiting a link
- make sure you only enter your Steam password at steamhost.cn/steamcommunity_com or steampowered.com
- use a different password for your e-mail and steam account
- do not click any links that someone sends you in your trade /chat window while trading.
e.g. do not click any links that someone claims you need to visit while trading to prove you item is not duped
(don't know if that vulnerability has been fixed by valve yet)

That's all I can think of for now...


What I would love to know though, is a few technical things.

It was Regen that pointed out many phishing links got posted from one location (IP), but with different accounts.

Then there seem to be more and more victims that claim they never got any e-mail about Steam Guard, had a different e-mail password than Steam password, never visited a phishing site and yet got hijacked without them knowing anything.

It seems that the hijackers have a way to hijack not the entire account, but instead only the session, I suspect.

They do not seem to be able to alter the password (even before the new e-mail confirmation) but can steal the items and use an existing TF2OP authentication to distribute phishing links.
That I suppose is only possible by downloading a "FreeHat.exe".
Or 0-day, but I highly doubt 0-day exploits are used in Steam Account hijacking, especially not by the ones that specifically target TF2OP as well to distribute their phishing links.

I would be interested in if the attacker just stole the TF2OP session and if TF2OP has safeguards like checking the IP address to validate the session?
Is there a log where one could see if a session of such an hijacked account has been used from 2 different IP addresses within a short period of time?
How long is the TF2OP session valid without refresh?
11
Some questions.
Showing 231-240 of 368 entries