by finnigja on 11/3/22, 2:02 AM with 70 comments
by mamborambo on 11/3/22, 5:42 AM
In this era of online ubiquity there should be another layer of opt-in validation, ring of trust, p2p feedback and rating, that can all be plugged into the consumer web experience.
by lovingCranberry on 11/3/22, 3:16 PM
These sites are literally made to steal my grandma's money when she's buying presents for Christmas and what not.
by mfonda on 11/3/22, 5:07 PM
It's inspiring to see you follow up like this and help out a wonderful mountain shop. A great reminder and inspiration to be more involved in my community.
by aww_dang on 11/3/22, 2:51 PM
by steve_taylor on 11/3/22, 8:49 AM
by asdadsdad on 11/3/22, 1:55 PM
by langsoul-com on 11/3/22, 10:21 AM
Fairly sure you could do a HTML search with Google, 7 stores having extremely similar HTML and images seems rather unlikely.
Effectively, it's virus total but for copycat sites.
by bashcoder on 11/3/22, 4:15 AM
by 10g1k on 11/3/22, 4:39 AM
by napsterbr on 11/3/22, 3:48 AM
If I go to urlscan.io and look at the recently scanned sites (which are live-updated), every now and then I can find links with potentially sensitive information.
I found OneDrive and SharePoint links. I was unable to actually access the documents in them (it asked me to login), but I could see their content (or metadata) with UrlScan's "live screenshot" feature.
At one point, it scanned a "reset password" link with the authentication token in the query string (!). I was able to access that link and I would likely be able to reset the password for that specific user. I won't share the underlying website so others don't go ahead looking for it, but it was for a non-US government service.
The impression I have is that some email provider (or perhaps some antivirus software?) is automatically scanning user emails and the links are being shared publicly, alongside a "live screenshot".
I might be missing something, but this is weird.
by zinckiwi on 11/3/22, 4:02 AM
by quickthrower2 on 11/3/22, 4:23 AM