Trending searches: what a phisher might get you to click
Intro Scammers are going to be furious at this video.Ā
I'm going to show you how just by yourself,Ā Ā you can shut down scam and phishing websitesĀ
potentially within minutes. In this video,Ā Ā I'll demonstrate using a real life scamĀ
phishing site that I found on TwitterĀ Ā designed to steal Steam accounts.Ā
This website had been up for 10 daysĀ Ā already and not a single antivirusĀ
security company had flagged it yet. But within minutes, I had it flagged by multipleĀ
security companies, within hours, nearly a dozen,Ā Ā and within 24 hours, the website was completelyĀ
blocked by Google Chrome and Edge by default. AndĀ Ā within two days, the domain registrar itselfĀ
had the domain name suspended and taken awayĀ Ā from the scammers completely, which is why I'mĀ
not worried about showing the domain name here. Still though, don't go to it. You never knowĀ
in the future. So if you didn't think youĀ Ā could make a difference as just one person,Ā
I'll show you how. All you need to do is knowĀ Ā the various pages that security companies haveĀ
for submitting malicious websites and reportĀ Ā them. And to be clear, I didn't use any kind ofĀ
special YouTuber connections to do any of this. I used the same exact public forms thatĀ
everyone else would, and within one day,Ā Ā a scam site was shut down. SoĀ
as an overview for this video,Ā Ā first I'll give you a quick explanation onĀ
how this particular scam website worked.Ā Ā Then I'll show you how to report a maliciousĀ
URL to over 15 security companies using theirĀ Ā pages for doing so, which will basicallyĀ
end up nuking the scam website from orbit. Then I'll give you the results for about howĀ
long it took each security company to startĀ Ā flagging the scam site. So for this scam, it'sĀ
actually getting pretty common recently on Steam,Ā Ā Today's Scam Example where you get a message from one ofĀ
your friends whose account has beenĀ Ā hijacked though. And the scammerĀ
will ask you to go to a websiteĀ Ā supposedly for some game tournamentĀ
and asks you to vote for their team. Again, still pretending to be your friend.Ā
But on that website, when you go to vote,Ā Ā it prompts you to log in with yourĀ
Steam account. But it's a fake SteamĀ Ā login window. And it looks prettyĀ
convincing. All the links on thisĀ Ā window go to the real Steam site, but if youĀ
type in any credentials, it will steal them. I've actually seen a couple varietiesĀ
of this type of website. On this site,Ā Ā it actually pops up a separate browser window,Ā
but the URL box just says "about:blank". OnĀ Ā another site, it brought up an entireĀ
fake browser window. So this apparentĀ Ā window with Steam as the URL showing isĀ
not even a separate browser window at all. Very tricky. Also apparently tricky is it willĀ
also steal your Steam Guard credentials. So IĀ Ā just put in a fake login credential and it knewĀ
that the login was incorrect. So I wasn't aboutĀ Ā to type in any real credentials, but I bet thatĀ
it was actually relaying the login and if itĀ Ā saw that it was asking for Steam Guard,Ā
it would have just asked for that too. And by then it had your login and yourĀ
Steam Guard code. And I have to say,Ā Ā as far as scam domain names go, fps league dot comĀ
actually seems pretty legit. Now obviously do notĀ Ā go to this website. Right now it's down anyways,Ā
but you still don't want to knowingly visit aĀ Ā potentially malicious site. As a pro tip, a lot ofĀ
scam websites use newly registered domain names. Pro Tip: Site Age They are not up for very long before they getĀ
caught and then they just go down. So a goodĀ Ā way to tell if a site is kind of suspiciousĀ
is to look up that registration date usingĀ Ā the so-called WHOIS registration data. If it'sĀ
a common domain extension like .com or.net,Ā Ā you can go to lookup.ican.org andĀ
it will tell you the created date. If it's an extension that that siteĀ
doesn't work on, you can just GoogleĀ Ā the top level domain extension like .ioĀ
and then "whois lookup" and you should beĀ Ā able to find something from there. And I wouldĀ
actually recommend if possible that you justĀ Ā automatically block newly registered domains ifĀ
you have some kind of service that allows that. Sometimes hardware firewalls use that,Ā
but one service I've been using recentlyĀ Ā that I just found out about, and thisĀ
isn't sponsored or anything by the way,Ā Ā but it's called NextDNS and itĀ
lets you add a bunch of filters,Ā Ā including newly registered domains. I'm notĀ
going to get into how to do all that yourself. If you don't know how, maybe ask a friend who'sĀ
good with computers and they can probably helpĀ Ā you. But I just wanted to mention it. I've beenĀ
using it for about a week and I like it so far.Ā Ā Preparing to Report All right, so now let's get to how to actuallyĀ
report a malicious URL, assuming you come acrossĀ Ā one. So what you want to probably do is open upĀ
notepad and copy over the URL so you have it. And also what you want to do is make aĀ
note - a description, that you'll submitĀ Ā along with the report to describe what theĀ
scam is. So for example with this website,Ā Ā I wrote a quick thing that says, "It is aĀ
Steam phishing site. If you click on a linkĀ Ā such as sign in with Steam at the top, thenĀ
it will bring up a fake Steam login window." And something like that is detailed enough, justĀ
enough where if a human goes to review the site,Ā Ā they'll know why you actually reported itĀ
as malicious and they'll be able to easilyĀ Ā tell. If possible, you might also wantĀ
to take a screenshot of the scam part,Ā Ā like the fake pop-up window or something. ThatĀ
can sometimes be included with the report. And remember if you are visitingĀ
a known scam website, open it inĀ Ā a sandbox. Windows has a built-in sandboxĀ
now that you can open it with. You can alsoĀ Ā use some kind of virtual machine. AndĀ
there's also some websites like Anyrun,Ā Ā which you can use a virtual machine online. LikeĀ
you just type in the URL here and it'll give youĀ Ā a quick 60 second virtual machine where you canĀ
actually navigate around the site, click on stuff. So you can get a quick screenshot throughĀ
that. Just you want to be sure you're safe.Ā Ā Specific Sites for Reporting And now I can go through the individualĀ
pages for all the security websites,Ā Ā how to report each one. I'm going toĀ
go through them pretty quickly becauseĀ Ā there are several. And of course I willĀ
put all these links in the description. Google Safe Browsing Alright so the first big one you'll wantĀ
to report it to is Google Safe Browsing.Ā Ā This will get the website blocked on Chrome.Ā
And all you have to do is put in the URL andĀ Ā add a little note describing it. So I'llĀ
put that in that I showed you before. AndĀ Ā if it doesn't get auto detected, that noteĀ
will of course help them review it manually. And then you just submit it. The other big oneĀ
you'll want to report it to is Microsoft and theirĀ Ā Microsoft SmartScreen SmartScreen Filter. This will get it blockedĀ
on Edge and Windows and all that. Now you canĀ Ā either log in with your Microsoft account or as aĀ
guest. I don't think it really makes a difference.Ā Ā But either way, you'll just put in the URL andĀ
then choose phishing or the other one, dependingĀ Ā on the website, and then fill out the CAPTCHAĀ
if you're not logged in and then hit submit. Unfortunately there is no notes sectionĀ
on this site. I'm not sure why that is,Ā Ā but it is what it is. Also if you'reĀ
using an enterprise admin account,Ā Ā you can go into the Microsoft 365 DefenderĀ
dashboard and you can submit a URL throughĀ Ā that. And that does actually let you add a note,Ā
but you have to have like a business account. So most people won't be able to do that.Ā
Next, it's definitely worth trying toĀ Ā Contact the Registrar report the domain to the registrar and cut itĀ
off at the source. Right in the WHOIS info,Ā Ā there should be the registrar'sĀ
name and abuse contact email. IĀ Ā emailed this one and basically saidĀ
the same thing as in my other notes. But when you do go to type theĀ
domain, don't do it like this.Ā Ā Write it something like this withĀ
the dot spelled out or whatever,Ā Ā because the first email I tried to sendĀ
got blocked by Gmail, because I guess theĀ Ā domain was already flagged. So you want toĀ
write it out as not a link. In this case,Ā Ā they actually just sent an email back saying thatĀ
I actually had to fill out a form on their site. So I did that instead. And about two days later, IĀ
noticed the registrar had set the name servers toĀ Ā show that it was actually suspended. And thereĀ
were also some new domain statuses applied,Ā Ā which corroborate that. Though not every registrarĀ
may show suspended name servers like this. Also,Ā Ā not every registrar is very good at takingĀ
down sites, but it's still worth it. But usually I found after Google and MicrosoftĀ
start blocking the site that the scammers oftenĀ Ā just shut the site down themselves anyway. NextĀ
up we have FortiGuard. And here you type in theĀ Ā Fortiguard URL for the site and hit enter or the search icon.Ā
And you'll see that here it lists the category asĀ Ā recently registered and a security risk group.Ā
But we want it flagged fully as phishing. So click request a review and then forĀ
suggest a category, choose "phishing" orĀ Ā whatever the site is. And if you're able, takeĀ
a screenshot of the site or the malicious part,Ā Ā like the fake login window. A lot of theseĀ
sites block scanners that are automatic. SoĀ Ā you'll notice VirusTotal actually returned aĀ
404 because it must have somehow blocked it. So putting in a screenshot, a lotĀ
of times it will help with a manualĀ Ā review. Then just put in your name andĀ
email, you'll get a notification on whatĀ Ā they do. And then for "company", you canĀ
just put "self". And then for comment,Ā Ā add that same note and then hit submit. And youĀ
should see a confirmation message at the top. Brightcloud Next we have BrightCloud. Just paste theĀ
site in the box that says "Look up URLĀ Ā or IP" and then hit look up. The reputationĀ
will probably be uncategorized or suspiciousĀ Ā because it's a new domain, but again we wantĀ
it fully flagged. So look on the left for theĀ Ā "Request a Change" section. Put in the URL, thenĀ
click on "I would like to suggest a category." In this case we want "phishing or otherĀ
frauds." Then click done and then put inĀ Ā your email and you can leave theĀ
product box empty. Then add yourĀ Ā note and then submit. And then you shouldĀ
see a confirmation message. Next is CRDFĀ Ā CRDF Threat Center Threat Lab Center. So at the top, hover overĀ
URLs and then click Submit Malicious URLs. This form is super basic. It just asks youĀ
for your email address and a list of URLs.Ā Ā So don't put anything except links in here, noĀ
notes or anything. And then agree to the terms,Ā Ā then submit the request and you'llĀ
see a confirmation number. Now I haveĀ Ā found this website often on the firstĀ
attempt might not catch a scam site. I guess it's automated. So in my case, I gotĀ
an email about 30 minutes after submittingĀ Ā it and it says no malicious sites were found.Ā
So what you'll want to do then is follow theĀ Ā link in the email to the report that they giveĀ
you. And then next to the URL you submitted,Ā Ā you can check the "misclassification" box andĀ
then click "Continue the reporting process." Then here, they finally do let you addĀ
an explanation in this box. So be sureĀ Ā to put your note and that it has enoughĀ
details for when they manually review it,Ā Ā then just hit submit and it'll say successfullyĀ
reported. In the two times I submitted a websiteĀ Ā and they didn't catch it at first, I appealedĀ
and both times they then caught it after that. So you might have to do that. Next up weĀ
have Netcraft. So just put in the URL ofĀ Ā Netcraft the site along with your email. And IĀ
actually forgot to do this, but be sureĀ Ā to select "add further details" and then addĀ
your explanation. And then hit Report MaliciousĀ Ā URL. Fortunately even without the details, itĀ
still caught it and flagged it automatically. But if they send you an emailĀ
that says no threats were found,Ā Ā just hit "Check Results" and then on the left,Ā
click "Report An Issue". And then next to the URL,Ā Ā select Misclassification and ideally uploadĀ
a screenshot for evidence. But then eitherĀ Ā put the same note you did before or maybe addĀ
a more detailed one in the misclassificationĀ Ā report reason, and then hit submit issueĀ
and they'll re-review it probably manually. And I did have to do this one time and they didĀ
catch it when re-reviewing it. As a cool side noteĀ Ā for this website, they actually have a leaderboardĀ
for who submits the most malicious URLs the firstĀ Ā time. And they even have some prizes ifĀ
you submit enough, which is kind of cool.Ā Ā Palo Alto Networks Moving on for Palo Alto Networks on the "Test aĀ
Site" page, just put in the URL and hit search. And it may have a few categories alreadyĀ
like newly registered, high risk,Ā Ā but nothing confirmed malicious or phishing.Ā
So click Request a Change, then put in yourĀ Ā note and then find the proper category and selectĀ
it, put in your email and hit submit. For ESET,Ā Ā ESET they have a "report a phishing page"Ā
form. So put in the URL, then the note. And it also asks you for the organizationĀ
being targeted. So in this case, the siteĀ Ā is stealing Steam logins, so I put Steam.Ā
Also, some sites like this one may requireĀ Ā you to add the HTTPS to the beginning of theĀ
URL. So just be aware of that and then hitĀ Ā submit. And they don't ask you for email, soĀ
you won't get a notification if they flag it. Trend Micro For Trend Micro, you put the URL in the box thatĀ
says, "Is It safe?" And then hit Check Now. AndĀ Ā here it just says untested and newly observedĀ
as the category. So hit Reclassify Request. AndĀ Ā then here are two options. So just click theĀ
button under where it says "For Home Users",Ā Ā etc. And then on this page for safety rating,Ā Ā select the Dangerous option under content,Ā
select "suggest a different category." Then under Internet Security, choose phishing orĀ
whatever it is. Then you can just leave these twoĀ Ā check boxes alone, but in the box for comments,Ā
add your note to explain it and then enterĀ Ā email address and hit OK. Now hold on becauseĀ
there's one more step. For this one you need toĀ Ā actually go to the email they send you and clickĀ
a confirmation link before they actually scan it. And also check your spam box. In my case,Ā
it was in there. So then once you go to theĀ Ā confirmation link, it will actually submitĀ
for a scan. For Bitdefender on this page,Ā Ā Bitdefender you'll want to scroll down to theĀ
submission form and then for category,Ā Ā select False Negative. Then put in your name, yourĀ
email, in our case select URL and paste it in. Then for description as usual put theĀ
note and hit submit. And you should seeĀ Ā a green confirmation message show up. ForĀ
McAfee, this page is for checking a singleĀ Ā McAfee URL. This box will ask you what productĀ
you're using. Just select the Real-TimeĀ Ā Database option. Here it's at the top. AndĀ
then put in the link and hit Check URL. You can see it says it's currently uncategorized.Ā
So down lower for Category 1, select Phishing andĀ Ā you don't need to select all the categories, justĀ
one is fine. Then put in your note and hit submitĀ Ā URL for review and it should show a confirmationĀ
page. For the company Forcepoint, in this boxĀ Ā Forcepoint we put the URL. And I guess you can only reportĀ
five a day or something, but anyway hit analyze. Currently it says the threat level isĀ
low and is only classified as a newlyĀ Ā registered website. So hit suggest a differentĀ
classification. In the suggest dropdown,Ā Ā the phishing option is actually called "Security:Ā Ā Phishing and Other Frauds". So select that thenĀ
put in your note. Then click submit and thereĀ Ā doesn't seem to be any kind of confirmationĀ
message, but it still should have worked. For Symantec on their site review request page,Ā Ā first put in the URL and thenĀ
hit check category. In this case,Ā Ā Symantec it just says the URL has not been rated and letsĀ
you fill out a form. For "Filtering Service",Ā Ā there are a bunch here. I wasn't even sure whichĀ
one, so I just picked Norton Safe Web, but I kindĀ Ā of assume that they're going to propagate theĀ
malicious URLs to all their products anyway. For category, it's just Phishing and then put inĀ
your email address and then in the comment box,Ā Ā your note and hit submit for review. To submitĀ
to Spam404, this one is very simple. Just putĀ Ā in the URL and the explanation note and that'sĀ
it, hit submit. For Kaspersky on their ThreatĀ Ā Spam404 Intelligence portal, go to the Lookup tab,Ā
then put in the URL and hit enter to search. Kaspersky We can see it is not categorized. So on the right,Ā
hit the submit to reanalyze button and here justĀ Ā put in your email address and then it lets youĀ
put in a comment to explain. So then hit submitĀ Ā and you should see a little confirmationĀ
message. Next up we have Cisco's TalosĀ Ā Intelligence service. This one actually requiresĀ
signing up for a free account to report a URL,Ā Ā Cisco Talos but it is actually probably worth it because CiscoĀ
is such a big company with so many customers. Anyway, on the reputation center page,Ā
you can put in a URL or even just an IPĀ Ā and then hit the search icon. And here itĀ
says unknown reputation and no category,Ā Ā but if you have an account, you can clickĀ
the buttons to submit a reputation orĀ Ā categorization ticket. However, one thingĀ
to note is for the categorization option,Ā Ā very strangely, there is no optionĀ
for phishing or malware or anything. It's just regular website categories,Ā
which I thought was weird. So insteadĀ Ā what you have to do is go to the reputationĀ
change option and then in the dropdown here,Ā Ā select "Suggest Threat Category", and thenĀ
it lets you select stuff like phishing andĀ Ā malware. So do that and then you set the platformĀ
to Talos Intelligence, which is the only option. Then in the comments, put the usual note andĀ
click submit. Finally I want to mention thisĀ Ā one called PhishTank. Now this wouldĀ
be a good one to submit to becauseĀ Ā PhishTank it's used by so many other services. However,Ā Ā they require a account to submit and for someĀ
reason they have registrations closed right now. So I guess just check back on this one, orĀ
if anyone knows a guy who knows a guy soĀ Ā I can get an account, maybe just send me anĀ
email or DM me on Twitter or something. Oh,Ā Ā and one final thing though, you canĀ
actually sign up for a VirusTotalĀ Ā account and that will let you vote onĀ
a website and also leave a comment. VirusTotal Community So if anyone scans it, maybe even if it isn'tĀ
detected yet, they can still see your commentĀ Ā about it. So now after reporting all of these,Ā
we can get into the results for what happened.Ā Ā I'll show you the VirusTotal scan resultsĀ
and then I'll show you as accurate as I canĀ Ā The Reporting Results the exact amount of time that each of theseĀ
security vendors took to actually flag it. So I re-scanned on VirusTotalĀ
after about an hour. And awesome,Ā Ā there were already four vendors thatĀ
were flagging it. But surprisingly,Ā Ā even though VirusTotal had Google Safe BrowsingĀ
showing it as clean, on the actual Google siteĀ Ā to check a domain status, it does say it hadĀ
flagged it as unsafe and it was the same day. So I'm sure it was from when I submitted.Ā
And this was even the case six hours laterĀ Ā and even the next day, VirusTotal isĀ
still saying it was clean. So good toĀ Ā know that VirusTotal can be prettyĀ
delayed with some vendors. And doĀ Ā realize that VirusTotal won't actually showĀ
the latest results unless you hit re-scan. You can see here that it'll say it wasĀ
scanned hours ago and it'll just showĀ Ā you those results. Also if you doĀ
a scan and it flags something new,Ā Ā be sure to also re-scan it on both the HTTPĀ
and HTTPS version of the URL. For some reason,Ā Ā VirusTotal shows these as separate and you willĀ
want people to see the flagged results whetherĀ Ā they look on the HTTP or HTTPS version. And theyĀ
might not know they have to actually re-scan it. After re-scanning a couple hours later,Ā
eight vendors were now flagging it. AndĀ Ā after about six hours, 10 of them wereĀ
flagging it. Now I do want to mentionĀ Ā something that I just learned, that evenĀ
if Google Safe Browsing flags a website,Ā Ā which apparently it did very shortly afterĀ
I submitted it, it won't be blocked inĀ Ā Google Chrome right away unless you haveĀ
Enhanced Protection on in the settings. I just had Standard Protection on and you'llĀ
notice it says "Chrome may send URLs" to SafeĀ Ā Browsing and checks if the malicious URL isĀ
stored locally. But for enhanced protectionĀ Ā it checks all URLs I guess. So you mightĀ
want to enable that. I will say however,Ā Ā that by the next day within 24 hours, it wasĀ
blocking with standard protection by default. And also Microsoft Edge was blocking it withĀ
their smart screen. I'm not sure exactly howĀ Ā long this took because I was asleep, butĀ
it was within 24 hours. But I will noteĀ Ā that even though both Google and MicrosoftĀ
were blocking these, VirusTotal still wasĀ Ā not showing them as being flagged when IĀ
re-scanned it, which was kind of weird. Anyway, I was doing my best to keep track ofĀ
exactly how long each security company wouldĀ Ā Company Response Times take to flag it, whether by sending an emailĀ
or just showing up on VirusTotal. And hereĀ Ā are the results. Though I will point out thatĀ
it seems that for this site, fortunately a lotĀ Ā of the companies were able to automaticallyĀ
detect it, I guess with an automated scan. Other times it may take longer if it hadĀ
to be manually reviewed to confirm. SoĀ Ā don't necessarily expect some of these instantĀ
results, but it could be. So now hopefully youĀ Ā all are scam website destroying machines.Ā
And the next time you see a scam websiteĀ Ā and it just fills you with rage, you canĀ
do something about it and take them down. Definitely give this video a big thumbsĀ
up if you enjoyed it. I put quite a bitĀ Ā of testing and work into this one, so I'dĀ
really appreciate it. Also let me know downĀ Ā in the comments if there's maybe other servicesĀ
that let you submit to it that I didn't mention,Ā Ā that it would be good. Or you can let meĀ
know if you did this and it worked out. And if you want to subscribe, I try to makeĀ
videos about twice a week, Wednesday and Saturday,Ā Ā so it should be worth it. If you want to keepĀ
watching, the next video I'd recommend is oneĀ Ā where I was talking about some new scams thisĀ
year. So I'll put that link right here if youĀ Ā want to click on it. So thanks so much forĀ
watching and I'll see you in the next one.
Morning for my side my name is takovski and it's a pleasure to present to you the preliminary work that we are working on mess with respect to disability and user experience this is joint work with my supervisor gabriela lancini and we are from the center for security reliability trust at the university... Read more
Ages ago i made this video which was about phishing emails how to recognize them and what not to do specifically do not open attachments from them and do not click links in them i said i would follow up with the description of what happens if you do that it's taken me a really long time to get back... Read more
You clicked a phishing link panic! i clicked on a
phishing link...or did i? i can't tell. as these attacks
get more sophisticated, sometimes it's hard to be
a hundred percent sure. whether it's a link in a text
message or a downloaded email attachment, the important thing is that
you take action immediately.... Read more
The resurgence of ddos: microsoft's outage highlights persistent cyber threat the resurgence of dos microsoft's outage highlights persistent cyber threat by sator news in an era where cyber threats morph with the advancement of technology an old nemesis in the form of distributed denial of service dos... Read more
Hold on to your keyboards microsoft and at&t are experiencing major service disruptions today on the morning of september 12th users across the globe woke up to connectivity chaos microsoft teams has surged to over 4,000 reported outages by 9:00 a.m. eastern time a dramatic spike from fewer than 300... Read more
Stop it huh [music] [music] [music] huh lollipop [music] hello hello there [music] no woo w [music] huh nope [music] [music] wow damn [music] [music] [music] sp for you thank you hey play for bo [music] hi [music] hi ready what [music] happened mommy [music] tr to f daddy hey what happened daddy he... Read more
Well there are more questions than answers at the stage about the arrest of dv and to shed some light on this story i'm pleased to be joined on the program now by dr melanie garon she works on cyber policy at the tony blair institute for global change and at university college london good afternoon... Read more
We got an update on last week's national public data breach you can check out that video right down below so if you remember there was reported that 2.9 million social security numbers were pilfered from the npd database npd has now publicly confirmed that a number of records were stolen but they're... Read more
Last friday the world finally got the y2k experience it deserved when millions of windows machines went down thanks to a bad update from cyber security firm crowd strike 8.5 million to be exact but now the plot is thickened and multiple theories for why this actually happened have emerged a was it just... Read more
Nbc coverage of britney mahomes slammed after donald trump endorsement nbc's coverage of britney mahomes during the kansas city chief's nfl opener has been slammed after she endorsed donald trump nbc's coverage of britney mahomes during the kansas city chief's nfl opener has been slammed following her... Read more
Six months after pledging support to the kenyan le mission in haiti jamaica is sending a first wave of troops the jamaican president announced that only 24 military and police personnel would land in haiti on thursday and lay the groundwork for further deployments haiti is the example of what could... Read more