• RvTV95XBeo@sh.itjust.works
    link
    fedilink
    arrow-up
    2
    arrow-down
    1
    ·
    9 days ago

    Nasty stuff, stealer logs. I’ve written about them and loaded them into Have I Been Pwned (HIBP) before but just as a recap, we’re talking about the logs created by malware running on infected machines. You know that game cheat you downloaded? Or that crack for the pirated software product? Or the video of your colleague doing something that sounded crazy but you thought you’d better download and run that executable program showing it just to be sure? That’s just a few different ways you end up with malware on your machine that then watches what you’re doing and logs it, just like this:

    These logs all came from the same person and each time the poor bloke visited a website and logged in, the malware snared the URL, his email address and his password. It’s akin to a criminal looking over his shoulder and writing down the credentials for every service he’s using, except rather than it being one shoulder-surfing bad guy, it’s somewhat larger than that.

    Seriously, read the article you posted. YOU probably attempted to log in and the virus on YOUR computer you seem to be in HEAVY denial about captured your info. You’re lucky the 2FA probably prevented the people who are are logging activity from your PC from accessing your Steam account.

    The article you posted clearly defines stealer logs, and the email you screenshot clearly says your info is in a stealer log breach - I don’t know what more to say. You clearly have all the information you need, you just don’t want to process it.

    YOU LOGGED INTO STEAM ON AN INFECTED COMPUTER AND ARE PROBABLY STILL USING THAT SYSTEM. YOUR COMPUTER HAS A VIRUS.

      • RvTV95XBeo@sh.itjust.works
        link
        fedilink
        arrow-up
        1
        arrow-down
        1
        ·
        5 hours ago

        Man, the denial runs deep.

        HIBP works by finding big databases of stolen information on the dark web. Usually these databases are attributed to websites that have been breached.

        In the case of “stealer logs” though, the databases are full of logins to a bunch of different websites, instead indicating it comes from hacked computers.

        They, and I, can’t truly say for certain that your computer was hacked, so instead they have to make vague statements like “someone attempted to log into your account on a compromised computer”. That information went to the hackers who developed the virus, and they posted it online. They don’t know your computer is infected, just that your information ended up in a pile with a bunch of other people’s whose computers were infected.

        The person logging in could be you, could be anyone, they may not have even gotten in, but the #1 most likely scenario is you logged into your account on your computer while a virus was running in the background capturing information.

        Your computer being the one with the virus is made 1000x more likely because you mention in previous posts that you use pirated software.

        If you pirate software, and you get a HIBP stealer log notice, I’d wager there’s a 99.7% chance someone snuck a keylogger into one of the programs you downloaded.

        • kekmacska@lemmy.zip
          link
          fedilink
          English
          arrow-up
          1
          ·
          28 minutes ago

          i only download from dodi’s and fitgirl repacks official site. I barely log into steam once in 2 months.

          • RvTV95XBeo@sh.itjust.works
            link
            fedilink
            arrow-up
            1
            ·
            18 minutes ago

            Cool story bro. There was (and likely still is, because you clearly haven’t found it) a keylogger on your system when you logged into Steam at some point.

            You can continue in denial if you want, it literally makes no difference to me - I’m not the one getting HIBP Stealer Log emails. Just trying to warn you, I wouldn’t log into anything you care about getting hacked until you find out what caused the breach.