this post was submitted on 20 Aug 2024
191 points (98.5% liked)

Ask Lemmy

26239 readers
1507 users here now

A Fediverse community for open-ended, thought provoking questions


Rules: (interactive)


1) Be nice and; have funDoxxing, trolling, sealioning, racism, and toxicity are not welcomed in AskLemmy. Remember what your mother said: if you can't say something nice, don't say anything at all. In addition, the site-wide Lemmy.world terms of service also apply here. Please familiarize yourself with them


2) All posts must end with a '?'This is sort of like Jeopardy. Please phrase all post titles in the form of a proper question ending with ?


3) No spamPlease do not flood the community with nonsense. Actual suspected spammers will be banned on site. No astroturfing.


4) NSFW is okay, within reasonJust remember to tag posts with either a content warning or a [NSFW] tag. Overtly sexual posts are not allowed, please direct them to either !asklemmyafterdark@lemmy.world or !asklemmynsfw@lemmynsfw.com. NSFW comments should be restricted to posts tagged [NSFW].


5) This is not a support community.
It is not a place for 'how do I?', type questions. If you have any questions regarding the site itself or would like to report a community, please direct them to Lemmy.world Support or email info@lemmy.world. For other questions check our partnered communities list, or use the search function.


Reminder: The terms of service apply here too.

Partnered Communities:

Tech Support

No Stupid Questions

You Should Know

Reddit

Jokes

Ask Ouija


Logo design credit goes to: tubbadu


founded 1 year ago
MODERATORS
 

I received a notification last night that someone changed my shipping address on Macys.com and when I visited the website, there was an open order for a PS5 with delivery to a NJ address.

After logging into Macy's I got 43 emails at once to seven different services like "Excalidraw" and "Sportograf" trying to login using a magic link.

At this point was was pretty nervous so I checked my main email security. Sure enough, there have been repeated login attempts under my account going on every few minutes for weeks.

I also saw there was an attempted login to my cellphone or home internet company.

I use 2FA, authenticators, etc. Basically what else should I be doing? Is there any way to be more preventative? I really don't wanna chuck this email but it is possible that may be the safest recourse. I do use this email for almost 300 different accounts to various things though.

8/23 update

So I received this suspicious email as a “note to self” from Microsoft in my junk folder. It says it’s from my address but additionally says it’s an “unverified server.” I am leery of it being legit but it is oddly timed.

I’ve added the opening text of the email: “Hello pervert, I've sent this message from your Microsoft account.

I want to inform you about a very bad situation for you.

However, you can benefit from it, if you will act wisely.

Have you heard of Pegasus? This is a spyware program that installs on computers and smartphones and allows hackers to monitor the activity of device owners. It provides access to your webcam, messengers, emails, call records, etc. It works well on Android, iOS, macOS and Windows. I guess, you already figured out where I'm getting at.”

I’ve received these emails in the past and nothing, but I figure it bears mentioning here cause I was legitimately in a less than secure situation a few days ago.

top 50 comments
sorted by: hot top controversial new old
[–] Cornflake_Dog@lemmy.wtf 126 points 3 weeks ago (2 children)

It goes without saying that you should change your passwords immediately. Do you use the same password for multiple things? If so, stop that.

[–] gregor@gregtech.eu 29 points 3 weeks ago (2 children)

And use a password manager like Bitwarden

[–] Boozilla@lemmy.world 5 points 3 weeks ago (1 children)

Bitwarden and Bitwarden Authenticator are the GOATs.

[–] gregor@gregtech.eu 3 points 3 weeks ago

If you pay for bitwarden or self-host the normal app can also be an authenticator, with the added ability to sync the codes.

[–] Cornflake_Dog@lemmy.wtf 4 points 3 weeks ago (2 children)

Bitwarden is awesome! I used it for like three years, but I recently moved everything to Keepass. Only thing with Keepass is having to manage your own backups

[–] thermal_shock@lemmy.world 2 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

why did you change? bitwarden is the best, what benefit did you gain? also sounds way cooler than keepass

[–] Cornflake_Dog@lemmy.wtf 4 points 3 weeks ago (4 children)

Bitwarden is great because they're convenient. However, I figure that becoming self-reliant on maintaining my own password database wouldn't be a bad idea. I believe storing everything locally gives me just a tad more security in case something were to happen with Bitwarden.

load more comments (4 replies)
[–] gregor@gregtech.eu 2 points 3 weeks ago (1 children)

Why did you move to KeePass? I host my own vaultwarden instance for myself and my friends.

[–] Cornflake_Dog@lemmy.wtf 4 points 3 weeks ago

I wanted to try something new and I also figure it's a bit more future-proof in case Bitwarden ever decides to change their pricing models such that the free tier loses any features.

I'm sure self-hosting your password manager gives you some awesome bonuses but I don't have the knowhow nor do I have control over the family internet router so I don't think I can work that out just yet.

[–] zanyllama52@infosec.pub 4 points 3 weeks ago

Password reuse is a real mother fucker. Good luck.

[–] TheBest@midwest.social 90 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

To add on, it sounds like you were phished. No shame, it happens to everyone. The best course of action when you get an email like that, DONT click the easy to press recover account button in the email. Always go directly to the site, even if the email looks legit.

From there you entered your password into, what im assuming, was a fake Macys website, where you gave the bad actors the exact info they needed to really activate it.

[–] BossDj@lemm.ee 24 points 3 weeks ago

This sounds like EXACTLY what happened.

[–] Euphorazine@lemmy.world 50 points 3 weeks ago

To add on to everyone else mentioning it, another benefit to password managers is that they auto filter themselves to the URL. So if you have a password saved for macys.com and get phished to macys-passwordreovery.com, the password manager won't know the URL and offer no filtering. Adding the extra step of having to manually find your password entry should be a flag itself that something might be wrong.

[–] savvywolf@pawb.social 35 points 3 weeks ago (2 children)

Firstly, probably remove the address from the OP. Don't want any Lemmy vigilantes getting involved and making a mess of things.

If you have 2fa enabled, you should be good. Even if they do guess your password, they shouldn't* be able to log in to your account. Although might still be worth making sure you have a nice strong password anyway. Also, if you have recovery phone numbers or email addresses attached to your email account, make sure they're secured as well.

* Assuming that your webmail provider is doing everything correctly, which isn't always a given if they're a small one.

[–] cheese_greater@lemmy.world 12 points 3 weeks ago (2 children)

I'm okay with the attacker's IP being public domain

[–] savvywolf@pawb.social 29 points 3 weeks ago

You're assuming that the attacker is using their own IP rather than a compromised system owned by someone else.

Likewise, they might be using someone else's address with the intent to steal a package from their porch or something.

It'd be rather silly for a theif to use their own details.

[–] brbposting@sh.itjust.works 2 points 3 weeks ago

These losers train each other to try to remote desktop into victims’ machines.

[–] otp@sh.itjust.works 8 points 3 weeks ago

OP probably also needs to secure their mobile account, since the attacker could redirect recovery or MFA SMSs to their own number.

[–] cyborganism@lemmy.ca 29 points 3 weeks ago (1 children)

Check if your email service has an option to log off from all devices first. This will close any active sessions and prevent anyone that might be already logged in to do anything without logging in again.

Then change your password.

If you have 2FA, try to use something like an authenticator app instead of a cell phone number to receive an SMS message. Sim cards can be cloned. Authenticator apps can't.

[–] some_guy@lemmy.sdf.org 2 points 3 weeks ago

It's worth noting that the option to log out all devices sometimes doesn't happen immediately. Microsoft's 365, for example, isn't immediate for all devices. If a massive player doesn't behave the way a user might expect, that's indicative of how chaotic the landscape can be. Good luck!

[–] chiliedogg@lemmy.world 25 points 3 weeks ago* (last edited 3 weeks ago) (2 children)

Are you also getting a bunch of random "confirm your email address" or thank you for signing up" emails?

This sounds like it may be part of a registration bomb attack. I woke up to over 4,000 similar messages a little while back. What they were doing is hiding their actual activity by flooding my inbox. Among the thousands of emails was a notification about the new user added to my PayPal account that had been compromised. That user was trying to empty my bank account.

I caught it before any damage could be done, and the registration bomb ended shortly afterwards.

[–] Gointhefridge@lemm.ee 5 points 3 weeks ago

Actually that did happen at the same time now that you mention it. I managed to catch it quick though. It did happen shortly after midnight. Luckily I’m a night owl and was awake.

[–] intensely_human@lemm.ee 2 points 3 weeks ago (1 children)

How did you find that one email among 4000 sign up confirmations?

[–] chiliedogg@lemmy.world 2 points 3 weeks ago

It was in the first couple hundred, and I was being selective in what I read. Newsletter and verification emails could be safely ignored, while services I actually have that are attached to my bank accounts get a closer look.

[–] nichtburningturtle 19 points 3 weeks ago* (last edited 3 weeks ago) (2 children)

I would contact support and report that address to the police. Other than that check https://haveibeenpwned.com/ and change your password to something unreasonable with >1000 characters or close to the limit of what they allow.

[–] Eheran@lemmy.world 11 points 3 weeks ago (1 children)

How are that many characters useful? Where is the benefit of 1000, let alone more than that, compared to 50?

load more comments (1 replies)
[–] YaDownWitCPP@lemmy.world 8 points 3 weeks ago

There are much better ways of creating strong passwords than just adding a ton of characters.

[–] OrgunDonor@lemmy.world 16 points 3 weeks ago (1 children)

With hotmail/outlook, you can tighten up the security a bit, and stop the login attempts.

You can add an alias to you account, and then remove the permission to log in(dont actually remove it completely) from your original email. You will still recieve all the e-mails, and will work like normal, but your sign in will be different.

https://support.microsoft.com/en-us/office/add-or-remove-an-email-alias-in-outlook-com-459b1989-356d-40fa-a689-8f285b13f1f2

[–] Cyberkillen@infosec.pub 6 points 3 weeks ago

I had the exact same problem, doing this stopped all the login attempts.

[–] brbposting@sh.itjust.works 16 points 3 weeks ago

May not apply here but

Note sometimes fraudsters use email bombing when they place orders on an account of yours. They want you to miss the order confirmation/shipping/pickup notifications.

Imagine if they put their brainpower to real jobs

[–] jemikwa@lemmy.blahaj.zone 10 points 3 weeks ago* (last edited 3 weeks ago)

There is nothing you can do about the unsuccessful logins to your email address. My original email address has been in so many hacks and it's always being brute forced by hackers outside the US.

You already have MFA, so the only other thing I can think of is to have an incredibly long random password on your account and make sure the "forgot my password" recovery flows don't have any easy way to bypass. Things like another email address as a backup that's less secure, being able to guess your personal details based on past hacks, easily guessable/researchable security questions (make these random or nonsensical if possible, or don't put details from security questions in social media) could be used to gain access, even with MFA. And finally, secure your password manager in a similar manner.

[–] DarkThoughts@fedia.io 8 points 3 weeks ago (3 children)

Password managers such as Bitwarden have password generators that you can use to make on the fly secure passwords (example: gnb*a&2$d9Uzej). You should ideally make the max length that the individual sites supports. Use that for every important account, especially your main email address, especially the one you use for your phone if you are on Android.

[–] HelixDab2@lemm.ee 5 points 3 weeks ago

Add to this: make sure that your Bitwarden password--or passphrase--is also strong enough to resist attacks. Especially if the email account linked to it is the one that they're trying to break into.

[–] tiefling@lemmy.blahaj.zone 3 points 3 weeks ago (1 children)

Hey, that's the same code I use for my luggage!

[–] WindyRebel@lemmy.world 1 points 3 weeks ago

Hail, Skroob!

[–] intensely_human@lemm.ee 1 points 3 weeks ago

Okay I’ve now switched all my passwords for all my accounts to gnb*a&2$d9Uzej

What now?

[–] irotsoma@lemmy.world 6 points 3 weeks ago* (last edited 3 weeks ago)

Likely that email or a previous email you clicked on was a phishing attack and when you logged in you gave them your password. And if you used that password anywhere else, you let them into those accounts as well. Make sure to check the links in emails are actually pointing to the expected web address and never click through warnings about SSL certificates being invalid. Better yet, never click on email links. Go into your web browser and type in the address manually. And use a password manager with unique, random passwords for every website and use a strong password and a 2FA method that requires access to a physical object or biometrics (cell phone text messages don't count as a physical object). If you still have trouble then it could be that your 2FA method is compromised. If you're using a cell phone, for example, it's possible your neighborhood is the target of a stingray or similar device that mimics a cell tower. Turn off 2G if you can. But even then, that only eliminates a subset of the devices. Get a yubikey or use other, more secure, 2FA methods and be sure to disable the less secure 2FA methods, because you're only as secure as the least secure one.

[–] DemBoSain@midwest.social 5 points 3 weeks ago (2 children)

Like others have said, change your passwords, activate 2FA if available, never reuse passwords etc, etc, etc.

I have been getting repeated warnings for unsuccessful logins to my Microsoft account for some time now. I'm guessing some bad actors are just throwing whatever leaked passwords they have hoping for hits. I have 2FA turned on and a password complex enough to deter dictionary attacks, so I'm not really concerned.

[–] sweetviolentblush@sh.itjust.works 3 points 3 weeks ago (1 children)

Whats a dictionary attack? I've never heard that term before

[–] Rolando@lemmy.world 6 points 3 weeks ago (1 children)

Basically, guessing lots of passwords from a list (dictionary): https://en.wikipedia.org/wiki/Dictionary_attack

[–] sweetviolentblush@sh.itjust.works 3 points 3 weeks ago (1 children)

Well I feel dumb, lol it seems obvious now that you said it

[–] Rolando@lemmy.world 6 points 3 weeks ago

Don't feel dumb, asking questions and reading is how we learn.

I've had the same Microsoft ones for years now. At least once a week there'll be a block of 10 - 20 of those emails. Guess they still haven't succeeded!

[–] mp3@lemmy.ca 4 points 3 weeks ago

After logging into Macy’s I got 43 emails at once to seven different services like “Excalidraw” and “Sportograf” trying to login using a magic link.

If you never use this kind of signin method, I'd make a rule to automatically delete those emails with the magic link so that you don't accidentally use them.

Other than that, a secure password and 2FA are your best defenses.

[–] Gointhefridge@lemm.ee 4 points 3 weeks ago (2 children)

I am currently using the iOS password manager. I have my qualms with it but it’s been mostly pretty solid. I was an android user for years and used a fair share of password managers, I like the iOS one the best but I know some of the new managers are much better. I don’t know any other iOS compatible password managers. I’m open to suggestions.

Also every account that uses 2FA has either an Authenticator code or email to an authentication secured email address.

[–] thermal_shock@lemmy.world 2 points 3 weeks ago

bitwarden. don't repeat passwords. setup mfa on things you haven't already. that's about it. new, random password for each account.

sounds like one was compromised so they're doing a password spray on everything they can find. passwords like BD!CzuX0$Wemt2 will never be brute forced or randomly guessed, they're usually stolen in data breaches, but if all passwords are different and not repeated, you're doing everything you can.

"hacks" happen, you can minimize by using different passwords on each account, use bitwarden to generate and save them.

[–] x00z@lemmy.world 1 points 3 weeks ago (1 children)

Was the password on macys randomly generated? Or do you think that could have been the same password as another website?

load more comments (1 replies)
[–] cadekat@pawb.social 3 points 3 weeks ago

First, same advice as everyone else. Change your passwords. Password managers are great. I like keepass.

Regarding the email, this looks like a Hotmail/Microsoft/Outlook account. Their security page sucks ass. It lists every time someone unsuccessfully tries to log in. "Unsuccessfully" as in they tried your email with an incorrect password. Of course hackers are going to try to break into your account. You really only need to worry about successful logins that aren't you.

load more comments
view more: next ›