{"id":11988,"date":"2018-04-11T10:45:19","date_gmt":"2018-04-11T18:45:19","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/04\/11\/news-5757\/"},"modified":"2018-04-11T10:45:19","modified_gmt":"2018-04-11T18:45:19","slug":"news-5757","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/04\/11\/news-5757\/","title":{"rendered":"The &#8216;Despacito&#8217; YouTube Hack Was Probably Pretty Simple to Pull Off"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5accda3ff449e10bb3550e3f\/master\/pass\/VevoHack-866983146.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Wed, 11 Apr 2018 11:35:19 +0000<\/strong><\/p>\n<p><span class=\"lede\">Since it\u2019s not <\/span>summer 2017 anymore, you probably haven\u2019t watched the music video for Luis Fonsi and Daddy Yankee\u2019s hit \u201cDespacito\u201d recently. And that may be just as well. The reigning most-viewed YouTube video was vandalized and then taken off the platform for a few hours on Tuesday morning after hackers infiltrated the account that hosted it.<\/p>\n<p>Other well-known videos by artists like Drake, Katy Perry, Taylor Swift, and Shakira were defaced as well by attackers calling themselves \u201cProsox\u201d and \u201cKuroi\u2019sh,\u201d who threatened that they would go after other YouTube channels as well. The music video distribution partnership Vevo confirmed to WIRED that \u201ca number of videos in its catalogue were subject to a security breach today, which has now been contained. We are working to reinstate all videos affected and &#8230; are continuing to investigate the source of the breach.\u201d<\/p>\n<p class=\"paywall\">The attackers replaced some of the music videos with violent images, as with Despacito, which showed gang imagery from the Netflix series \u201cCasa de Papel\u201d before the attackers took the video down. It has since been reinstated, along with its 5 billion views.<\/p>\n<p class=\"paywall\">YouTube says that the platform itself wasn\u2019t breached. \u201cAfter seeing unusual upload activity on a handful of VEVO channels, we worked quickly with our partner to disable access while they investigate the issue,\u201d a spokesperson told WIRED. The attackers infiltrated one or more Vevo YouTube accounts rather than attacking the platform as a whole.<\/p>\n<p>&#x27;If someone had actually broken into the YouTube platform, that would be valuable.&#x27;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Chris Weber, Casaba Security<\/p>\n<p class=\"paywall\">How, then, did Despacito disappear? That&#x27;s still unclear. But it wouldn\u2019t be the first time a prominent account wasn\u2019t protected by two-factor authentication, allowing attackers to guess the password or obtain it through social engineering attacks like phishing. But <a href=\"https:\/\/www.wired.com\/2016\/06\/hey-stop-using-texts-two-factor-authentication\/\">even two-factor isn&#x27;t foolproof<\/a>. If an account is set up to deliver authentication codes via SMS, attackers <a href=\"https:\/\/www.wired.com\/2016\/06\/even-ftcs-lead-technologist-can-get-hacked\/\">can hijack the text messages<\/a> to receive the code. Or a clever phish can impersonate a service\u2019s login screen, not only tricking users into voluntarily entering their username and password, but also requesting their two-factor code like the legitimate login page would do. Once the malicious form captures these details, attackers can quickly use them to log in to the account they are targeting while the code is still active.<\/p>\n<p class=\"paywall\">Observers note that corporate accounts shared by multiple employees are less likely to employ two-factor authentication, because lots of people may need to be able to access them from different locations. Though this doesn&#x27;t make using two-factor impossible (or any less important), it can make it impractical. Either way, phishing seems like the likely way attackers penetrated Vevo YouTube accounts, analysts speculate, because of what the attackers did with their advantage.<\/p>\n<p class=\"paywall\">&quot;If you look at the economics of it, if someone had actually broken into the YouTube platform, that would be valuable,&quot; says Chris Weber, cofounder of the corporate security and penetration testing firm Casaba Security. &quot;Your first inclination wouldn\u2019t be to deface a few videos and run away. But that&#x27;s the problem with phishing, it\u2019s such a low-cost attack.&quot;<\/p>\n<p class=\"paywall\">If attackers had invested significant time and resources into compromising the accounts, they also might have taken the time to execute a more subtle attack, like redirecting ad payments from YouTube into their own bank account instead of Vevo&#x27;s.<\/p>\n<p class=\"paywall\">It&#x27;s a reminder for everyone\u2014from individuals, to YouTube stars, and corporations\u2014to lock down their account security. But if you&#x27;re a \u201cDespacito\u201d super-fan, you can at least rest assured that the video has been restored.<\/p>\n<p class=\"related-cne-video-component__dek\">Phishing scams are getting more and more sophisticated, to the point where they\u2019re fooling even security experts. Here&#39;s how to avoid them.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/despacito-hack-vevo-youtube\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5accda3ff449e10bb3550e3f\/master\/pass\/VevoHack-866983146.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Wed, 11 Apr 2018 11:35:19 +0000<\/strong><\/p>\n<p>The removal of YouTube&#8217;s most popular video this week was likely the result of a low-cost phishing scam rather than sophisticated hacking.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-11988","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11988","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11988"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11988\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11988"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11988"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}