• Godort@lemm.ee
    link
    fedilink
    arrow-up
    19
    ·
    4 months ago

    Typically, with scams like this, the attacker is using a tool like Evilginx.

    The way this works is that Evilginx runs on a server that the hacker controls and will request the login page from whatever service they are targeting(Discord, Steam, Google, etc) and then serve it to you as a proxy. It looks entirely legitimate unless you make sure to very closely check the URL.

    Once you login, it will take a copy of your Username, your password, and your session token(the thing that lets Discord know it’s you so you don’t need to login again after every refresh). and suddenly the attackers now have access to your account to do whatever they want with it.

    Discord should absolutely prevent modifying links in this way specifically for this reason, but good practice as a user is to hover over every link and make sure it’s pointing where it’s supposed to. Don’t click on anything that looks suspicious.

    • Eager Eagle@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      ·
      4 months ago

      unless you make sure to very closely check the URL.

      or you use random passwords + password manager, which auto-fill won’t work in the fake domain.

    • DumbAceDragon@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      4 months ago

      They do already prevent fake links. Their markdown doesn’t work if you have the http scheme in the url, which is why the link in the thumbnail says steamcommunity.com instead of https://steamcommunity.com

    • zaknenou@lemmy.dbzer0.comOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 months ago

      I don’t understand, as you said the hacker’s server requests my credits, so am I not supposed to be prompted to accept something by the browser or Discord app? Twitter and Google usually prompt you and require you to click “allow”

      • Godort@lemm.ee
        link
        fedilink
        arrow-up
        5
        ·
        4 months ago

        You’ve got half of it. The hacker’s server is acting as a middleman for the real login page. Everything appears legitimate except the URL will be wrong and if you use a password manager, it won’t auto-fill

        They access the legit login page and forward it to you, but they’re in the middle capturing everything you send.

        When you enter your login details, they will record them and then forward them to the real login window in near real time, effectively logging in as you. They then have a legitimate session token which they can use to access your account without needing to re-authenticate.

  • GolfNovemberUniform@lemmy.ml
    link
    fedilink
    arrow-up
    19
    arrow-down
    1
    ·
    4 months ago

    Hacking Discord is easier than anything else because every account has a passcode that you can easily obtain using regular social engineering or remote access and it bypasses everything, even 2FA.

      • GolfNovemberUniform@lemmy.ml
        link
        fedilink
        arrow-up
        1
        arrow-down
        1
        ·
        4 months ago

        Idk anything about any recovery codes. I was referring to a thing that’s called something like “security token”.

          • GolfNovemberUniform@lemmy.ml
            link
            fedilink
            arrow-up
            1
            ·
            4 months ago

            No it’s not an API key. It’s changed every time you change your password so it’s basically an alternative one but it has an additional feature of bypassing 2FA.

  • xylogx@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    4 months ago

    Passkey is resistant to these attacks, but user adoption is not widespread enough for Discord to be able to mandate it.

        • toastal@lemmy.ml
          link
          fedilink
          English
          arrow-up
          3
          ·
          4 months ago

          Based on FIDO Alliance and W3C standards, passkeys replace passwords with cryptographic key pairs. These key pairs profoundly improve security. – https://developer.apple.com/passkeys/

          Based on FIDO2/WebAuthn but unlike them, passkeys are those things Apple & Google have been pushing that live on their servers + one specific device in its secure enclave you as as a user aren’t allowed to look into. FIDO2 is usually tied to some USB security token.

    • _Atlas_@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      4 months ago

      Wtf, if it’s such a huge security bonus, why wait for user adoption, especially if token stealing is an issue?

      • xylogx@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        4 months ago

        Change is hard. It has been a long road to get where we are today: major OS and Browser vendor support. Users now need to change their behavior.

  • 11111one11111@lemmy.world
    link
    fedilink
    arrow-up
    1
    arrow-down
    2
    ·
    4 months ago

    Yes. Discord is the absolute worst fucking platform that was designed with mal-intent by a piece of shit company it’s absolutely amazing anyone still uses it.