{"id":2375,"date":"2023-04-01T10:37:49","date_gmt":"2023-04-01T10:37:49","guid":{"rendered":"https:\/\/secry.me\/explore\/?p=2375"},"modified":"2023-04-11T01:10:40","modified_gmt":"2023-04-11T01:10:40","slug":"linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures","status":"publish","type":"post","link":"https:\/\/secry.me\/explore\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\/","title":{"rendered":"Linus Tech Tips YouTube Channel Hacked and Deleted: Malware Analyst Share Malware Analysis and Preventive Measures"},"content":{"rendered":"<div class=\"c7f5092f831f91fb6af859cc3a8052cc\" data-index=\"4\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/securepubads.g.doubleclick.net\/tag\/js\/gpt.js\"><\/script>\r\n<script>\r\n  window.googletag = window.googletag || {cmd: []};\r\n  googletag.cmd.push(function() {\r\n    googletag.defineSlot('\/22608490431\/iklan1', [[320, 100], [300, 50]], 'div-gpt-ad-1696178236578-0').addService(googletag.pubads());\r\n    googletag.pubads().enableSingleRequest();\r\n    googletag.enableServices();\r\n  });\r\n<\/script>\r\n<!-- \/22608490431\/iklan1 -->\r\n<div id='div-gpt-ad-1696178236578-0' style='min-width: 300px; min-height: 50px;'>\r\n  <script>\r\n    googletag.cmd.push(function() { googletag.display('div-gpt-ad-1696178236578-0'); });\r\n  <\/script>\r\n<\/div>\n<\/div>\n<h2><strong>A High-Profile Channel Hacked<\/strong><\/h2>\n<p><a href=\"https:\/\/secry.me\/explore\/z3yl\"><strong>Linus Tech Tips <\/strong><\/a>YouTube Channel Hacked and Deleted<strong>. <\/strong>Linus Tech Tips is\u00a0a tech YouTube channel with over 15 million subscribers, was recently hacked, which led to live streaming of Elon Musk crypto scams and eventually the channel being deleted.<\/p>\n<p>In this article, will explain the malware sample that caused the hack, discuss how it happened, and explain why it might not have been caught by the channel&#8217;s antivirus program. Furthermore, we&#8217;ll examine the entire attack chain, starting with the malicious emails.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>The Malicious Emails: A Common Starting Point<\/strong><\/h2>\n<p>The attack began with an email pretending to be a sponsorship offer from a person claiming to be a PR manager for the sponsor company. It is essential to mention that domain name mismatches with the company are not necessarily a red flag, as many big companies hire PR firms to manage their outreach and communications.<\/p>\n<figure id=\"attachment_2393\" aria-describedby=\"caption-attachment-2393\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-2393\" src=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/SS-EMAIL-1024x576.png\" alt=\"Malicious Email\" width=\"640\" height=\"360\" srcset=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/SS-EMAIL-1024x576.png 1024w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/SS-EMAIL-300x169.png 300w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/SS-EMAIL-768x432.png 768w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/SS-EMAIL-1536x864.png 1536w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/SS-EMAIL-1280x720.png 1280w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/SS-EMAIL.png 1920w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><figcaption id=\"caption-attachment-2393\" class=\"wp-caption-text\"><em><strong>Malicious Email<\/strong>, source: The PC Security Channel<\/em><\/figcaption><\/figure>\n<p>Attackers usually do not send malware attachments in the initial email. Instead, they wait until the recipient replies to their email before sending a zip file containing the malware.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>The Deceptive Malware: An Easily Overlooked Threat<\/strong><\/h2>\n<p>In this case, the malware was hidden in what appeared to be a PDF file. However, upon closer inspection, it turned out to be a .scr application, a type of file that can act as an application in Windows. Many people may not even know what a .scr file is, making this type of attack particularly deceptive.<\/p>\n<figure id=\"attachment_2400\" aria-describedby=\"caption-attachment-2400\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-2400\" src=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/scr-application-as-a-PDF-file-1024x576.png\" alt=\"scr application as a PDF file\" width=\"640\" height=\"360\" srcset=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/scr-application-as-a-PDF-file-1024x576.png 1024w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/scr-application-as-a-PDF-file-300x169.png 300w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/scr-application-as-a-PDF-file-768x432.png 768w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/scr-application-as-a-PDF-file-1536x864.png 1536w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/scr-application-as-a-PDF-file-1280x720.png 1280w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/scr-application-as-a-PDF-file.png 1920w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><figcaption id=\"caption-attachment-2400\" class=\"wp-caption-text\"><em>.scr application as a PDF file<\/em><\/figcaption><\/figure>\n<p>The file was over 700 MB in size, which likely caused many online scanners and traditional defense mechanisms to skip it, assuming it was too large to be a malware file.<\/p>\n<p>However, when examining the file with a hex editor, it was revealed that most of the file was empty space.<\/p>\n<figure id=\"attachment_2402\" aria-describedby=\"caption-attachment-2402\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-2402\" src=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/Empty-space-inside-the-PDF-File-1024x576.png\" alt=\"Empty ainside the PDF File\" width=\"640\" height=\"360\" srcset=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/Empty-space-inside-the-PDF-File-1024x576.png 1024w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/Empty-space-inside-the-PDF-File-300x169.png 300w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/Empty-space-inside-the-PDF-File-768x432.png 768w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/Empty-space-inside-the-PDF-File-1536x864.png 1536w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/Empty-space-inside-the-PDF-File-1280x720.png 1280w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/Empty-space-inside-the-PDF-File.png 1920w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><figcaption id=\"caption-attachment-2402\" class=\"wp-caption-text\"><em>Empty space inside the PDF File<\/em><\/figcaption><\/figure>\n<p>This is a common technique used by attackers to bypass scanners and make their files more challenging to analyze.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Redline Stealer Malware: Stealing Session Tokens<\/strong><\/h2>\n<p>The malware sample turned out to be a Redline Stealer, a popular info-stealer available for purchase on the black market. Once executed, it steals session tokens from YouTube and other popular websites, allowing attackers to access the victims&#8217; accounts.<\/p>\n<p>This malware even bypasses two-factor authentication and strong passwords, rendering them ineffective.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Preventing Future Attacks: Lessons from Linus Tech Tips<\/strong><\/h2>\n<p>To prevent such attacks in the future, it&#8217;s essential to practice the principle of least privilege, especially for large YouTube channels. Limiting management access to only a few senior staff members can reduce the risk of unauthorized access.<\/p>\n<p>Moreover, having a robust security program installed on the system is crucial, as common sense alone cannot protect against all threats.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>The Limits of Virus Total<\/strong><\/h3>\n<p>Relying solely on online tools like Virus Total for scanning suspicious files isn&#8217;t enough. These tools often provide superficial results and don&#8217;t analyze malicious behavior as effectively as an antivirus installed on the system would.<\/p>\n<p>Therefore, it&#8217;s essential to use a comprehensive security program to protect against malware attacks.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Conclusion: Stay Informed and Secure<\/strong><\/h2>\n<p>In conclusion, it&#8217;s crucial to be aware of the risks and take preventive measures to secure YouTube channels and other online accounts. Employing the principle of least privilege, using strong security programs, and being cautious with email attachments can significantly reduce the chances of falling victim to hacking attacks like the one that targeted Linus Tech Tips.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h4><strong>References:<\/strong><\/h4>\n<p><iframe loading=\"lazy\" title=\"Linus Tech Tips Hacked\" width=\"696\" height=\"392\" src=\"https:\/\/www.youtube.com\/embed\/yrGNgWu9eWo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/p>\n<p><iframe loading=\"lazy\" title=\"Linus Tech Tips Hack Explained\" width=\"696\" height=\"392\" src=\"https:\/\/www.youtube.com\/embed\/WjpIyu7IH74?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/p>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>A High-Profile Channel Hacked Linus Tech Tips YouTube Channel Hacked and Deleted. Linus Tech Tips is\u00a0a tech YouTube channel with over 15 million subscribers, was recently hacked, which led to live streaming of Elon Musk crypto scams and eventually the channel being deleted. In this article, will explain the malware sample that caused the hack, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2387,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[194,131,106],"tags":[209,208],"class_list":["post-2375","post","type-post","status-publish","format-standard","has-post-thumbnail","category-cyber-security","category-news","category-takeover","tag-linus-tech-tips","tag-redline-stealer"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.4 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Linus Tech Tips YouTube Channel Hacked and Deleted: Malware Analyst Share Malware Analysis and Preventive Measures | SECRY<\/title>\n<meta name=\"description\" content=\"Linus Tech Tips YouTube channel hacked, targeted by a sophisticated Redline Stealer malware attack. Discover how the email scam unfolded, the malware&#039;s tactics, and essential prevention measures to protect your accounts and systems from similar threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/secry.me\/explore\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Linus Tech Tips YouTube Channel Hacked and Deleted: Malware Analyst Share Malware Analysis and Preventive Measures | SECRY\" \/>\n<meta property=\"og:description\" content=\"A High-Profile Channel Hacked Linus Tech Tips YouTube Channel Hacked and Deleted. Linus Tech Tips is\u00a0a tech YouTube channel with over 15 million\" \/>\n<meta property=\"og:url\" content=\"https:\/\/secry.me\/explore\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\/\" \/>\n<meta property=\"og:site_name\" content=\"SECRY\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/secry.me\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-01T10:37:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-11T01:10:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/secryweb.sirv.com\/WP_secry.me\/2023\/04\/Linus-Tech-Tips-YouTube-Channel-Hacked.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Christin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\\\/\"},\"author\":{\"name\":\"Christin\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/bf08de9f590b8968a1d054728257190f\"},\"headline\":\"Linus Tech Tips YouTube Channel Hacked and Deleted: Malware Analyst Share Malware Analysis and Preventive Measures\",\"datePublished\":\"2023-04-01T10:37:49+00:00\",\"dateModified\":\"2023-04-11T01:10:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\\\/\"},\"wordCount\":630,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Linus-Tech-Tips-YouTube-Channel-Hacked.png\",\"keywords\":[\"Linus Tech Tips\",\"RedLine Stealer\"],\"articleSection\":[\"Cyber Security\",\"Hacker News\",\"Takeover\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\\\/\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\\\/\",\"name\":\"Linus Tech Tips YouTube Channel Hacked and Deleted: Malware Analyst Share Malware Analysis and Preventive Measures | SECRY\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Linus-Tech-Tips-YouTube-Channel-Hacked.png\",\"datePublished\":\"2023-04-01T10:37:49+00:00\",\"dateModified\":\"2023-04-11T01:10:40+00:00\",\"description\":\"Linus Tech Tips YouTube channel hacked, targeted by a sophisticated Redline Stealer malware attack. Discover how the email scam unfolded, the malware's tactics, and essential prevention measures to protect your accounts and systems from similar threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\\\/#primaryimage\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Linus-Tech-Tips-YouTube-Channel-Hacked.png\",\"contentUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Linus-Tech-Tips-YouTube-Channel-Hacked.png\",\"width\":1280,\"height\":720,\"caption\":\"Linus Tech Tips YouTube Channel Hacked\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/secry.me\\\/explore\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Linus Tech Tips YouTube Channel Hacked and Deleted: Malware Analyst Share Malware Analysis and Preventive Measures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"name\":\"SECRY\",\"description\":\"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections\",\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"alternateName\":\"Security Story\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/secry.me\\\/explore\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\",\"name\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\",\"alternateName\":\"SECRY\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"contentUrl\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"width\":512,\"height\":512,\"caption\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/secry.me\",\"https:\\\/\\\/pinterest.com\\\/secry_me\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/bf08de9f590b8968a1d054728257190f\",\"name\":\"Christin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"caption\":\"Christin\"},\"description\":\"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.\",\"sameAs\":[\"https:\\\/\\\/secry.me\\\/explore\"],\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/author\\\/secry\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Linus Tech Tips YouTube Channel Hacked and Deleted: Malware Analyst Share Malware Analysis and Preventive Measures | SECRY","description":"Linus Tech Tips YouTube channel hacked, targeted by a sophisticated Redline Stealer malware attack. Discover how the email scam unfolded, the malware's tactics, and essential prevention measures to protect your accounts and systems from similar threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/secry.me\/explore\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\/","og_locale":"en_US","og_type":"article","og_title":"Linus Tech Tips YouTube Channel Hacked and Deleted: Malware Analyst Share Malware Analysis and Preventive Measures | SECRY","og_description":"A High-Profile Channel Hacked Linus Tech Tips YouTube Channel Hacked and Deleted. Linus Tech Tips is\u00a0a tech YouTube channel with over 15 million","og_url":"https:\/\/secry.me\/explore\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\/","og_site_name":"SECRY","article_publisher":"https:\/\/www.facebook.com\/secry.me","article_published_time":"2023-04-01T10:37:49+00:00","article_modified_time":"2023-04-11T01:10:40+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2023\/04\/Linus-Tech-Tips-YouTube-Channel-Hacked.png","type":"image\/png"}],"author":"Christin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Christin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/secry.me\/explore\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\/#article","isPartOf":{"@id":"https:\/\/secry.me\/explore\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\/"},"author":{"name":"Christin","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/bf08de9f590b8968a1d054728257190f"},"headline":"Linus Tech Tips YouTube Channel Hacked and Deleted: Malware Analyst Share Malware Analysis and Preventive Measures","datePublished":"2023-04-01T10:37:49+00:00","dateModified":"2023-04-11T01:10:40+00:00","mainEntityOfPage":{"@id":"https:\/\/secry.me\/explore\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\/"},"wordCount":630,"commentCount":0,"publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"image":{"@id":"https:\/\/secry.me\/explore\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/Linus-Tech-Tips-YouTube-Channel-Hacked.png","keywords":["Linus Tech Tips","RedLine Stealer"],"articleSection":["Cyber Security","Hacker News","Takeover"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/secry.me\/explore\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/secry.me\/explore\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\/","url":"https:\/\/secry.me\/explore\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\/","name":"Linus Tech Tips YouTube Channel Hacked and Deleted: Malware Analyst Share Malware Analysis and Preventive Measures | SECRY","isPartOf":{"@id":"https:\/\/secry.me\/explore\/#website"},"primaryImageOfPage":{"@id":"https:\/\/secry.me\/explore\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\/#primaryimage"},"image":{"@id":"https:\/\/secry.me\/explore\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/Linus-Tech-Tips-YouTube-Channel-Hacked.png","datePublished":"2023-04-01T10:37:49+00:00","dateModified":"2023-04-11T01:10:40+00:00","description":"Linus Tech Tips YouTube channel hacked, targeted by a sophisticated Redline Stealer malware attack. Discover how the email scam unfolded, the malware's tactics, and essential prevention measures to protect your accounts and systems from similar threats.","breadcrumb":{"@id":"https:\/\/secry.me\/explore\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/secry.me\/explore\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\/#primaryimage","url":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/Linus-Tech-Tips-YouTube-Channel-Hacked.png","contentUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/04\/Linus-Tech-Tips-YouTube-Channel-Hacked.png","width":1280,"height":720,"caption":"Linus Tech Tips YouTube Channel Hacked"},{"@type":"BreadcrumbList","@id":"https:\/\/secry.me\/explore\/linus-tech-tips-youtube-channel-hacked-and-deleted-malware-analyst-share-malware-analysis-and-preventive-measures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/secry.me\/explore\/"},{"@type":"ListItem","position":2,"name":"Linus Tech Tips YouTube Channel Hacked and Deleted: Malware Analyst Share Malware Analysis and Preventive Measures"}]},{"@type":"WebSite","@id":"https:\/\/secry.me\/explore\/#website","url":"https:\/\/secry.me\/explore\/","name":"SECRY","description":"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections","publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"alternateName":"Security Story","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/secry.me\/explore\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/secry.me\/explore\/#organization","name":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections","alternateName":"SECRY","url":"https:\/\/secry.me\/explore\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/","url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","contentUrl":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","width":512,"height":512,"caption":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections"},"image":{"@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/secry.me","https:\/\/pinterest.com\/secry_me"]},{"@type":"Person","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/bf08de9f590b8968a1d054728257190f","name":"Christin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","caption":"Christin"},"description":"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.","sameAs":["https:\/\/secry.me\/explore"],"url":"https:\/\/secry.me\/explore\/author\/secry\/"}]}},"_links":{"self":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/2375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/comments?post=2375"}],"version-history":[{"count":25,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/2375\/revisions"}],"predecessor-version":[{"id":2509,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/2375\/revisions\/2509"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media\/2387"}],"wp:attachment":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media?parent=2375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/categories?post=2375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/tags?post=2375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}