newsletter banner

ISSUE 21.18.F • 2024-04-29 • Text Alerts!Gift Certificates
You’re reading the FREE newsletter

Susan Bradley

You’ll immediately gain access to the longer, better version of the newsletter when you make a donation and become a Plus Member. You’ll receive all the articles shown in the table of contents below, plus access to all our premium content for the next 12 months. And you’ll have access to our complete newsletter archive!

Upgrade to Plus membership today and enjoy all the Plus benefits!

In this issue

PUBLIC DEFENDER: Did hackers buy Roku devices — using your credit card?

Additional articles in the PLUS issue

OFFICE: Understanding Office document formats

FREEWARE SPOTLIGHT: SmartContextMenu — Computing for lazy people like me

PATCH WATCH: Time for 23H2


ADVERTISEMENT
1Password

Pricing for teams & businesses | 1Password

Review our team pricing and sign up for a Free Trial to get access to password manager, digital vault, password generator, digital wallet, and more.


PUBLIC DEFENDER

Did hackers buy Roku devices — using your credit card?

Brian Livingston

By Brian Livingston Comment about this article

In a pair of serious security breaches in the past two months, hackers tried username-password combinations found on the Dark Web. They attempted to log on to more than half a million accounts at Roku.

Hundreds of users who had unwisely stored their full credit-card numbers with Roku were exploited by the hackers. The victims’ credit-card numbers on file enabled the perps to buy anything in the Roku store.

Roku is a large enterprise. The company controls 51% of the global market for streaming-TV products and services, according to an Advanced Television article. With more than 80 million active Roku subscribers around the world, it’s likely that you or someone you know has been affected by the hack or the restrictive measures Roku has imposed to fight off future breaches.

A huge target, with hundreds or even thousands of credit cards at risk

Roku revealed the two exploits in a blog post on April 12, 2024. The company also released a data-breach notice that it mailed to the affected subscribers, as required by law (PDF).

Roku TV and remote control
Figure 1. The company announced on April 10, 2024, its new Roku Pro Series TV, a 4K display in 55″, 65″, and 75″ versions with a voice-activated remote control.Source: Roku product page

With that information — and other details I’ve pieced together from security sources — allow me to explain these two massive data breaches. They could easily affect you and any of your friends who subscribe to Roku or its streaming services:

  • In March 2024, Roku detected hacker exploits that attempted to sign in to approximately 15,000 user accounts. The hackers had not broken into Roku’s servers to discover the accounts’ username-password combinations. Instead, the perps were entering credentials that Roku users had entered at other websites. Those websites had been previously compromised and scraped.
  • Sign-in attempts on 576,000 additional user accounts were detected by Roku in April 2024. The hackers were not testing usernames and passwords at random, which is called a brute-force attack. Instead, the perps were using automated software to try their stolen combinations in a credential-stuffing exploit. More than 24 billion hacked username-password combos are currently available on the Dark Web, according to a Digital Shadows study.
  • The company says that “in less than 400 cases” the hackers had succeeded in signing in and making unauthorized purchases of hardware and services from Roku’s website. The intruders couldn’t see the victims’ full credit-card numbers — but they didn’t need to. The users had allowed Roku to store the CC numbers to make future purchases “more convenient.” (The number of misused cards may actually be larger, as we’ll see below.)
  • Roku reversed or refunded the illegitimate charges to the victimized subscribers. The firm also changed the affected users’ passwords.
  • All Roku subscribers must now use 2FA to sign in. Two-factor authentication, in this case, means Roku users will receive an email message containing a verification link. That link must be clicked to sign in, thereby proving that the owner of the email address is the legitimate subscriber. This move is controversial. For instance, as one commenter on Cord Cutters News points out: “You can’t use a token. It always sends to your email, which is not a good solution.” For instance, the intruders may have changed subscribers’ email addresses on file to addresses used by the perps, who could use the emailed verification link to continue their own, illegitimate use of Roku’s services.

(Disclosure: I myself used Roku’s streaming-TV operating system for several weeks in 2020. The service was included with my rental of an Airbnb apartment, where my family stayed in between selling one home and moving into another.)

Accounts with stored credit-card numbers were sold for 50 US cents

What did the hackers want with hundreds or thousands of accounts that had credit-card numbers stored in Roku’s servers? After all, the CC numbers on file could be used only to buy hardware and services from Roku’s own website. A perp could buy a Roku TV (see Figure 1) or a Streaming Stick 4K (see Figure 3). But you need only one TV to watch whatever you like.

It turns out that there are many people around the world who would love to get a free-use credit card. With it, they could buy Roku TVs, streaming sticks, and premium channels such as Netflix, Peacock, and many others. Ethically challenged persons could purchase from the hackers a credential with credit-card privileges for as little as 50 US cents (see Figure 2).

Stolen Roku accounts offered for sale for 50 cents each
Figure 2. The usernames and passwords of Roku subscribers who had stored their credit-card numbers were sold on the Dark Web for as little as 50 US cents. The purchasers of the stolen credentials didn’t need to know the 16-digit number of any credit card. The legitimate users had already authorized Roku to bill their credit cards for whatever devices or services the “subscriber” subsequently ordered via the site’s cart.See larger image at BleepingComputer

The image in Figure 2 was copied from a Dark Web marketplace that offered stolen Roku CC-enabled credentials and much more. For your purchase price of $0.50, the hackers included a helpful set of instructions on the best way to buy stuff from the Roku store without revealing yourself or alerting the victimized user.

Below, I paraphrase the instructions shown in small type in Figure 3. I’ve lightly edited the wording for readability, while retaining some of the hackers’ grammatical errors:

Sign in on the Roku website to the account you’ve purchased.

Change the user’s email, password & phone number after you order everything and finish doing what you’re doing.

DON’T change the information beforehand, or else the site is going to ask you to re-enter the credit card information. Change the info afterwards, when you’re done.

Add Roku items to your cart & go to checkout.

Review & purchase your items.

After you’re done burning through the credit card, delete the person’s account OR stay logged in until you get your orders. It’s your choice.

In the second, the hacker’s exhortation to change the legitimate user’s email address, password, and phone number is intended to prevent the victim from receiving any confirmation emails about the bogus purchases.

In the final paragraph, the instruction to delete a victim’s entire account after maxing out the stored credit card is pure maliciousness. However, the buyer of the stolen credentials may have purchased several Roku streaming-TV services and wanted to prevent the legitimate subscriber from streaming at the same time.

Interestingly, Roku claims that fewer than 400 subscribers were the victims of bogus credit-card charges. But the Dark Web promotion shown in Figure 2 boasts that 439 CC-enabled sign-ins were “in stock.” We may never know the total number of misused accounts.

How to protect yourself from credential-stuffing exploits

It’s obvious that weak passwords — and poor security at the websites that allowed their passwords to be hacked — make us vulnerable to hacker sign-in attempts at many sites, not just Roku’s.

Roku Streamiong Stick 4K and remote control
Figure 3. For TV screens with no Roku services built in, the company has for years sold set-top boxes and the Roku Streaming Stick+ dongle, which plugs into a TV’s HDMI port. The latter product was discontinued in September 2021, but the company sells in its place the upgraded Streaming Stick 4K (shown) with a remote control.Source: Roku product page

To insulate yourself as much as possible from hackers discovering your username and password and signing in as you at various websites, take the following steps:

  • If you received a Roku email, visit your sign-in page immediately and change your password to a unique and long string.
  • Long passwords are strong passwords. It isn’t necessary to invent random, hard-to-pronounce passwords, such as Q6j*Psw^kjqW5m. Passwords just need to be sufficiently long and include “mixed” upper- and lowercase letters, numbers, and symbols, such as @ and #.
  • Make it longer than eight characters. A password with eight mixed characters takes just eight hours for a hacker to discover by brute force, using today’s processing power. By contrast, if you insert merely one additional character into such a password — making it nine characters long — cracking it would take three weeks. That’s more GPU time than any perp is likely to spend trying to guess one password. (These statistics are from a fascinating Hive Systems article.) Ideally, make up a passphrase by combining two long words and including numbers and symbols.
  • Don’t use the same password on multiple sites. No matter how strong your password may be, it’s useless if you enter the same string at different websites. If one site gets compromised, your “secret” goes straight to the Dark Web.
  • Enable two-factor authentication, if possible. A confirmation sent from a website to you via email or via SMS to your smartphone is better than using only a password. But best of all are systems that implement passkeys. These techniques require that someone pretending to be you must also possess your authentication token or other trusted device. A hacker won’t have any such verification. I described passkeys — and Windows 11’s new support for them — in my AskWoody column on November 20, 2023.
  • Use a password manager to keep track. It’s impossible for our analog human brains to remember dozens of different credentials. That’s why I published a four-part analysis of the best password managers in AskWoody on February 5 and 19 and March 4 and 18, 2024. Bottom line: Bitwarden is highly rated by numerous reviewers, offers both a free and a paid version, and allows you to store your credentials in the cloud or locally on your own server offline. See Part 1, Part 2, Part 3, and Part 4 of my series.
Our passwords don’t all have to be ‘123456’

It’s a fact of our modern, silicon lifestyles that hackers are assembling faster and faster computers to crack our credentials. Unfortunately, more and more of our accounts are protected only by a username and a password, which can be broken by determined criminals.

Roku headquarters in San Jose, California
Figure 4. Roku manages its 80-million subscriber base from this headquarters building in San Jose, California.Photo by Michael Vi

The most common password people choose is 123456, according to a Wikipedia article. We’re far past the point that such trivial strings will defend our finances against intruders.

In this column, I’ve tried to give you the armor you need to protect yourself and your loved ones — and your credit cards.

Stay safe out there!

Talk Bubbles Contribute your thoughts
in this article’s forum!
Do you know something we all should know?
Send your story to Brian in confidence!

The PUBLIC DEFENDER column is Brian Livingston’s campaign to give you consumer protection from tech. If it’s irritating you, and it has an “on” switch, he’ll take the case! Brian is a successful dot-com entrepreneur, author or co-author of 11 Windows Secrets books, and author of the fintech book Muscular Portfolios.


ADVERTISEMENT


Here are the other stories in this week’s Plus Newsletter

OFFICE

Author

Understanding Office document formats

By Mary Branscombe

Inside every Office file is a hierarchy of formats and XML markup.

If you understand these structures, you can use that knowledge to extract information directly from most Office app files.

When Word, Excel, and PowerPoint first came out, they stored documents in proprietary binary file formats, with text, styles, page layout, and multimedia all encoded in the same file. That was fairly efficient: the binary file is compact, and there’s only one file to copy per document when you want to move it around or share it with someone.

FREEWARE SPOTLIGHT

Deanna McElveen

SmartContextMenu — Computing for lazy people like me

By Deanna McElveen

If you want me to use your fancy new feature in Windows, it better be fewer than three clicks away. Two is better. It’s not that I’m being difficult. I’m just very conscious of how many clicks I’m using.

SmartContextMenu is an enhanced version of author Alexander Illarionov’s other popular program, SmartSystemMenu. With the latter garnering nearly 4,000 downloads on our website, I think SmartContextMenu will become even more popular.

PATCH WATCH

Susan Bradley

Time for 23H2

By Susan Bradley

The Professional and Home editions of Windows 11 22H2 reach end of life on October 14, 2024.

Between now and then, those of you on Windows 11 22H2 should begin the process of moving to 23H2. For users with Windows 11 Education and Enterprise editions, their demise arrives a year later, on October 14, 2025.

If you run Windows 10 22H2, you don’t have to worry about upgrading — Windows 10 will no longer receive feature releases, even though Microsoft is still dribbling out changes to that platform.


Know anyone who would benefit from this information? Please share!
Forward the email and encourage them to sign up via the online form — our public newsletter is free!


Enjoying the newsletter?

Become a PLUS member and get it all!

RoboForm box

Don’t miss any of our great content about Windows, Microsoft, Office, 365, PCs, hardware, software, privacy, security, safety, useful and safe freeware, important news, analysis, and Susan Bradley’s popular and sought-after patch advice.

PLUS, these exclusive benefits:

  • Every article, delivered to your inbox
  • Four bonus issues per year, with original content
  • MS-DEFCON Alerts, delivered to your inbox
  • MS-DEFCON Alerts available via TEXT message
  • Special Plus Alerts, delivered to your inbox
  • Access to the complete archive of nearly two decades of newsletters
  • Identification as a Plus member in our popular forums
  • No ads

We’re supported by donations — choose any amount of $6 or more for a one-year membership.

Join Today buttonGift Certificate button

The AskWoody Newsletters are published by AskWoody Tech LLC, Fresno, CA USA.

Your subscription:

Microsoft and Windows are registered trademarks of Microsoft Corporation. AskWoody, AskWoody.com, Windows Secrets Newsletter, WindowsSecrets.com, WinFind, Windows Gizmos, Security Baseline, Perimeter Scan, Wacky Web Week, the Windows Secrets Logo Design (W, S or road, and Star), and the slogan Everything Microsoft Forgot to Mention all are trademarks and service marks of AskWoody Tech LLC. All other marks are the trademarks or service marks of their respective owners.

Copyright ©2024 AskWoody Tech LLC. All rights reserved.