I am not a super code-literate person so bare with me on this… But. Still please becareful. There appears to be a vulnerability.

Users are posting images like the following:

https://imgur.com/a/RS4iAeI

And inside hidden is JavaScript code that when executed can take cookie information and send it to a URL address.

Among other things. At this time if you see an image please click the icon circled before clicking the link. DO NOT CLICK THE IMAGE. If you see anything suspicious, please report it immediately. It is better a false report than a missed one.

  • Saigonauticon@voltage.vn
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    1 year ago

    In the interests of being wholesome and helpful, I used a secure method to retrieve the contents of that URL without providing my own cookie info.

    I accessed and extracted the .png image directly using a similar method, then dug through it with a hex editor. As best I can tell, there’s nothing particularly weird about the image itself or its metadata.

    The HTML file pointing to the image contains a bunch of trackers from imgur. Google analytics, Facebook, scorecard research, etc. Those are certainly things to be concerned about, but I didn’t specifically notice anything unusual beyond the ordinary corporate-surveillance crudware (which was indeed written in JavaScript). None of these were in the image itself though.

    Obviously it’s impossible to prove that anything is safe, and I only spent 10 minutes looking into this, so you should still follow the OP’s advice about not clicking on random links without thinking. However my quick analysis did not find anything particularly alarming.

      • Saigonauticon@voltage.vn
        link
        fedilink
        English
        arrow-up
        0
        arrow-down
        1
        ·
        edit-2
        1 year ago

        That looks like something Imgur is doing then. Which is not surprising at all. If it’s a free service, you’re the product, right?

        Honestly the sketchiest thing I found was the use of BTLoader, a self-described ‘adblock revenue recovery service’.