Cyberattacks On YouTube High Profile Channels

by | Dec 11, 2022

Several famous YouTube channels have been attacked over the weekend in highly organized cyberattacks and the hackers tend to specifically target influencers across several different types of platforms. Many techs, music, gaming, and Disney YouTubers took to Twitter to complain about their accounts being hacked, and the attack looks like a planned Phishing operation.

Hackers got hold of a database, according to sources, and have been sending fake Google login pages to related email addresses. However, the pages gather address credentials, and those credentials are used to access YouTube accounts. The data is then passed to a new owner and the Channel’s URL address is changed, which makes the real owner and his subscribers believe their account has been deleted.

How this Cyberattack on YouTube happened?

It seems possible that it was not a “spray and pray” operation but a planned phishing campaign. Somebody seems to have gotten hold of a YouTuber database and sent them emails, luring them to a bogus Google login page. It has been used to gather information about their Google account, allowing the intruder access to their YouTube channels. When this is done, the hacker had reassign the famous account to new owners and had alter the page’s custom URL, leaving the original owner of the channel who believes the account has been deleted.

At least some of the accounts that were successfully compromised had employed two-factor authentication (2FA) for further security. This indicates that the attackers used a reverse proxy toolkit to intercept 2FA codes sent via SMS.

What’s YouTube saying about these cyberattacks?

Despite the facts, YouTube told that it had “not seen signs of a rise in hacking attempts over the weekend”. However, the reality remains that now is a good time to heed the alerts about account hijacking and the alleged coordinated hacking campaign.

How do you secure your YouTube account from cyberattacks?

In the spirit of World Password Day, Bitsys technologies encourage all creators to back up their Google accounts’ protection. Unfortunately, we’ve seen a spike in Cyberattacks on YouTube channels over the past few months. We take protection seriously and want to help creators keep their accounts secure by enabling them to take these five steps, in addition to constantly enhancing our monitoring and systems:

1. Build a strong password

Using a secure password is a crucial factor in stopping a phishing attack. This will contain a mixture of uppercase, lowercase, numbers, symbols, and the maximum possible number. It’s also suggested that you change your password every three months if you can. This way you will be able to make sure the cybercriminals are stopped in their paths.

2. Frequently change your password

As if it needs to be repeated but be careful with your password – don’t use the same one you use on other sites and don’t write it down. In the digital world, we must dress warmly but the real world can be just as dangerous.

3. Fill out a form on Google Recovery

It’s critical that you fill out your Google account with the recovery form. While you may not like the idea of giving the company your phone number, if you find that someone is trying to hack your account, it is a safe way to prevent bigger problems – you’re the only one who has access to the recovery code on your computer.

4. Be cautious with links

To begin with, be careful of any shortened link that reaches you, regardless of where it originates. Although most are secure, some conceal nasty surprises, like malware that is automatically downloaded to steal information from your computer. Make sure you know where the link will take you before clicking.

5. Don’t send your details through email

You should not trust emails that the password you access your YouTube account with will receive that request. In fact, if it comes from Google itself, be especially careful – an attack discovered a few months ago indicates that a malicious URL, in the guise of a corporate link, could get users to enter their information without knowing it.

In short, common sense and a bit of thoughtfulness will save you some huge headaches later when constructing your password. Simply search carefully where your personal details are entered, and that will avoid cybercriminals from getting their hands on them.

The only way to protect what you’ve worked hard to build is to be vigilant when it comes to cybersecurity. If you’d like to know more about how your business can benefit from managed services, just give us a call, we are here to help.

YouTube creators targeted in a series of coordinated cyber attacks. Phishing emails were sent out to a multitude of high-profile YouTube creators.

How to get Microsoft Defender Health on Mac Fleet

Managing Macs for multiple companies gives us the opportunity to work in various environment and detect issues where it occurs first & then implement a solution for all others at the same time. Recently there was a requirement to find if there are MDD instances...

Implementing Machine Learning in IT Support Setup

Machine learning has the potential to revolutionize the way IT support businesses operate. This cutting-edge technology can be applied in a number of ways to improve the efficiency, accuracy, and speed of IT support services. Here are some ways that machine learning...

Benefits of Apple Business Managers

Apple Business Manager is a web-based platform designed to streamline the process of purchasing, deploying, and managing Apple devices within a business organization. It allows IT administrators to manage and distribute Apple devices and apps to their employees,...

Adoption of Macs in Enterprise: A Growing Trend

This image belongs to In recent years, there has been a growing trend of enterprises adopting Macs as their primary desktop and laptop computers. This shift in technology can be attributed to several factors, including...

ESG as future of IT

ESG, or environmental, social, and governance, is becoming increasingly important in the field of IT. As technology continues to advance and play a larger role in our daily lives, companies are being held to higher standards in terms of their impact on the environment...

Secure Your Mac with FileVault

FileVault is a built-in encryption tool for Macs that helps protect your data from unauthorized access by encrypting your hard drive. Enabling FileVault is a simple process that only takes a few minutes, and it can give you peace of mind knowing that your data is safe...

Is outsourcing IT to India is better or keeping it inhouse?

There are pros and cons to both outsourcing IT services to India and keeping IT within the company. Ultimately, the decision to outsource or keep IT in-house will depend on the specific needs and goals of the company, as well as the resources and capabilities...

How to be a good SCRUM Master

In an Agile development team, the Scrum Master is a crucial role that helps the team to work effectively and efficiently. A Scrum Master is responsible for facilitating the team's use of the Scrum framework and ensuring that the team is able to deliver high-quality...

Basics of Enterprise Patch Management

Enterprise patch management is the process of ensuring that all the software and applications within an organization are kept up-to-date with the latest patches and updates. This is important because software and applications are constantly being improved and updated...

Cost saving for enterprises by choosing M1 Macs

The M1 Mac has had a significant impact on the enterprise market since its release. As a highly-efficient and powerful machine, the M1 Mac has proven to be a valuable asset to businesses in a variety of industries. One of the key benefits of the M1 Mac is its improved...

CRM Is A Process, Not A Product! How Can We Make CRM A Successful Tool?

CRM (Customer Relationship Management) is software that allows businesses to manage business relationships and information associated with them. It provides a platform that manages interactions with customers, stores information about them, and automates processes...


Digital Workplace Services

Automated Tasks

 Office IT Support

Intune for Win & Mac

Citrix Virtual Apps

Mac Win iOS Android

Mac & Win Trained