Phish For the Future



  • This report describes “Phish For The Future,” an advanced persistent spearphishing campaign targeting digital civil liberties activists at Free Press and Fight For the Future. Between July 7th and August 8th of 2017 we observed almost 70 spearphishing attempts against employees of internet freedom NGOs Fight for the Future and Free Press, all coming from the same attackers.

    This campaign appears to have been aimed at stealing credentials for various business services including Google, Dropbox, and LinkedIn. At least one account was compromised and was used to send out additional spearphishing emails to others in the organization. Because the compromised account had been neglected for years and contained no recent activity, we suspect the attackers were trying to leverage trust in order to compromise a more recent or high-value account. We were unable to determine what the secondary goal of the campaign was after the credentials were stolen. The attackers were remarkably persistent, switching up their attacks after each failed attempt and becoming increasingly creative with their targeting over time.

    An example of a google credential phishing page

    Some of the attacks were generic, such as a link to view a Gmail document supposedly sent by a co-worker or a LinkedIn notification message from a colleague. Other spearphishing attempts demonstrated quite a bit more ingenuity. One attempt, which targeted Evan Greer, Campaign Director of Fight For The Future, pretended to be a question about where to find the link to buy her music, which is available online. Evan replied with a link. The attacker replied with an email in which they complained that the link was not working correctly, having replaced the link with a phishing page made to look like a Gmail login. Another attack pretended to be from a target’s husband, sharing family photos; the email was forged to include the husband’s name. Yet another attack pretended to be a YouTube comment for a real YouTube video that the target had uploaded. As one might expect from a YouTube comment, the contents of the fake comment were quite aggressive and hateful.

    Other attacks involved sending clickbait headlines to try to get the targets’ interest. Some of the headlines are designed to appeal to the political interests of the targets, such as: “George W. Bush ON TRUMP’S TWEET: A FREE PRESS IS ‘INDISPENSABLE TO DEMOCRACY,’” “Chelsea Manning’s release is the inspiring proof: nothing is impossible,” and “Net Neutrality Activists ‘Rickroll’ FCC Chairman Ajit Pai.” While others are lurid clickbait, presumably designed to embarrass the recipient into clicking a fake unsubscribe link such as “Porn star Jessica Drake claims Donald Trump offered her $10G, use of his private jet for sex,”and “Reality show mom wants to hire a hooker for her autistic son.” The combination of headlines which would appeal to leftist activists and tabloid clickbait which is embarrassing to be found in one’s work email seems well designed to attract the attention of the targets. Each of the emails contained an “unsubscribe” link which lead the user to a gmail credential phishing page such as the one above.

    An example of the lurid headlines sent as clickbait

    At one point the attackers got extremely creative, preying on anxiety about pornographic content showing up in work email. The attackers sent emails titled “You have been successfully subscribed to Pornhub.com” and “You have been successfully subscribed to Redtube.com” to the victims. This was followed up minutes later with several emails all disguised as coming from Pornhub or Redtube with explicit subject lines. Each of the emails contained an unsubscribe link which directed the target to a Google credential phishing page.

    The sophistication of the targeting, the accuracy of the credential phishing pages, the working hours, and the persistent nature of the attacks seem to indicate that the attackers are professionals and had a budget for this campaign. The working hours, as determined by the times the emails were sent seem to indicate that the attackers are working for hire out of an office, they took Saturday and Sunday off. Their hours are consistent with working hours in the UTC+3-5:30 timezone. A login IP from the only account that was compromised successfully did not reveal the physical location of the attackers, as it belonged to AirVPN.

    We observed 16 separate top level domains used in this campaign. Using historical whois data from Passive Total, we were able to discover that some of the domains had been registered with the email address amandalovers@mail[.]com. Several other domains, apparently not used in this campaign, were also registered by amandalovers@mail[.]com1, many of which followed a similar naming pattern to domains used for this campaign. Some of the domains had previously shared servers with domains used in these attacks, increasing our confidence that all of these domains are owned by the same actor. We also discovered a group of domains which were located on what appears to be a dedicated server with transferdomain[.]my, one of the domains used by the attackers.

    Although this phishing campaign does not appear to have been carried out by a nation-state actor and does not involve malware, it serves as an important reminder that civil society is under attack. It is important for all activists, including those working on digital civil liberties issues in the United States, to be aware that they may be targeted by persistent actors who are well-informed about their targets’ personal and professional connections.

    The good news is that 2-factor authentication is an effective countermeasure against the kinds of phishing attacks we saw in this campaign. Even SMS-based 2FA, the least secure 2-factor solution, would have effectively prevented these account takeovers. In addition to becoming adept at spotting emails associated with this phishing campaign, both organizations implemented 2FA on all accounts, which significantly reduced their attack surface.

    Online activism is not always very organized. It often involves a centralized organization and a large network of volunteers, which can pose a security challenge. We recommend an organization-wide requirement to enable two-factor authentication on all accounts with access to sensitive data such as emails, social media accounts, planning documents, github logins, CMS logins, or other credentials. It is our recommended best practice to secure all accounts with two-factor authentication so that trusted compromised accounts can’t be used in the service of more effective spearphishing attacks. For more information on how to set up two-factor authentication see our Surveillance Self Defense guide.

    Indicators of Compromise

    <table>

    <thead>

    <tr>

    <td>Indicator</td>

    <td>Type</td>

    <td>Notes</td>

    </tr>

    </thead>

    <tbody>

    <tr>

    <td>amandalovers@mail.com</td>

    <td>email</td>

    <td>whois information</td>

    </tr>

    <tr>

    <td>[redacted]@gmail.com.rcwnbkcoefuqxeh.mesvr.com</td>

    <td>email</td>

    <td>emails used in campaign</td>

    </tr>

    <tr>

    <td>[redacted]@gmail.com.vedvvyuvlhlvifk.mesvr.com</td>

    <td>email</td>

    <td>emails used in campaign</td>

    </tr>

    <tr>

    <td>n0replyn0tificati0nupdatemail@gmail.com</td>

    <td>email</td>

    <td>emails used in campaign</td>

    </tr>

    <tr>

    <td>n0reply.notificationexsasuve@gmail.com</td>

    <td>email</td>

    <td>emails used in campaign</td>

    </tr>

    <tr>

    <td>noreply.535466586you6585tubadh@gmail.com</td>

    <td>email</td>

    <td>emails used in campaign</td>

    </tr>

    <tr>

    <td>no.reply.n0tification.alsdkch@gmail.com</td>

    <td>email</td>

    <td>emails used in campaign</td>

    </tr>

    <tr>

    <td>noreply.notifications.gkejkdgj@gmail.com</td>

    <td>email</td>

    <td>emails used in campaign</td>

    </tr>

    <tr>

    <td>noreplynotification.updates@gmail.com</td>

    <td>email</td>

    <td>emails used in campaign</td>

    </tr>

    <tr>

    <td>no.reply.updates.asdfaffgh78jg@gmail.com</td>

    <td>email</td>

    <td>emails used in campaign</td>

    </tr>

    <tr>

    <td>no-reply.updates.mailtghtjhthtth@mail.com</td>

    <td>email</td>

    <td>emails used in campaign</td>

    </tr>

    <tr>

    <td>no-reply.updates.mailtghtjhthtth@mail.com.qcfhazrahkvspdi.mesvr.com</td>

    <td>email</td>

    <td>emails used in campaign</td>

    </tr>

    <tr>

    <td>scorpiobond4@gmail.com</td>

    <td>email</td>

    <td>emails used in campaign</td>

    </tr>

    <tr>

    <td>sophia.1johnson@mail.com</td>

    <td>email</td>

    <td>emails used in campaign</td>

    </tr>

    <tr>

    <td>[redacted]@freepress.net.ccfczucunupblvv.mesvr.com</td>

    <td>email</td>

    <td>emails used in campaign</td>

    </tr>

    <tr>

    <td>[redacted]@freepress.net.pyqdmoszioqnarv.mesvr.com</td>

    <td>email</td>

    <td>emails used in campaign</td>

    </tr>

    <tr>

    <td>[redacted]@freepress.net.uaflghqlqzjaxsi.mesvr.com</td>

    <td>email</td>

    <td>emails used in campaign</td>

    </tr>

    <tr>

    <td>[redacted]@freepress.net.urjkombsdfgsoui.mesvr.com</td>

    <td>email</td>

    <td>emails used in campaign</td>

    </tr>

    <tr>

    <td>[redacted]@freepress.net.vcrzowfhbqqwnlv.mesvr.com</td>

    <td>email</td>

    <td>emails used in campaign</td>

    </tr>

    <tr>

    <td>[redacted]@freepress.net.wpzrarbvxhjiacv.mesvr.com</td>

    <td>email</td>

    <td>emails used in campaign</td>

    </tr>

    <tr>

    <td>[redacted]@freepress.net.zzchltemoounvvi.mesvr.com</td>

    <td>email</td>

    <td>emails used in campaign</td>

    </tr>

    <tr>

    <td>tyc@anewwayforward.org</td>

    <td>email</td>

    <td>emails used in campaign</td>

    </tr>

    <tr>

    <td>rulinuxbasic.com</td>

    <td>domain</td>

    <td>phish for the future</td>

    </tr>

    <tr>

    <td>linuxbasicsg.com</td>

    <td>domain</td>

    <td>phish for the future</td>

    </tr>

    <tr>

    <td>optionalbloggingeu.com</td>

    <td>domain</td>

    <td>phish for the future</td>

    </tr>

    <tr>

    <td>shrinkthisurl.com</td>

    <td>domain</td>

    <td>phish for the future</td>

    </tr>

    <tr>

    <td>optionalblogginguk.com</td>

    <td>domain</td>

    <td>phish for the future</td>

    </tr>

    <tr>

    <td>linuxbasicsg1.com</td>

    <td>domain</td>

    <td>phish for the future</td>

    </tr>

    <tr>

    <td>shrinkandshareurl.com</td>

    <td>domain</td>

    <td>phish for the future</td>

    </tr>

    <tr>

    <td>transferdomainmy.com</td>

    <td>domain</td>

    <td>phish for the future</td>

    </tr>

    <tr>

    <td>shoponlinefreeuk.com</td>

    <td>domain</td>

    <td>phish for the future</td>

    </tr>

    <tr>

    <td>strngbltru.com</td>

    <td>domain</td>

    <td>phish for the future</td>

    </tr>

    <tr>

    <td>linuxbasichk.com</td>

    <td>domain</td>

    <td>phish for the future</td>

    </tr>

    <tr>

    <td>pushthisurl.com</td>

    <td>domain</td>

    <td>phish for the future</td>

    </tr>

    <tr>

    <td>linuxbasichk1.com</td>

    <td>domain</td>

    <td>phish for the future</td>

    </tr>

    <tr>

    <td>linuxbasicru.com</td>

    <td>domain</td>

    <td>phish for the future</td>

    </tr>

    <tr>

    <td>domainsfortechhelp.com</td>

    <td>domain</td>

    <td>phish for the future</td>

    </tr>

    <tr>

    <td>colnoygums.com</td>

    <td>domain</td>

    <td>associated with transferdomainmy.com</td>

    </tr>

    <tr>

    <td>habbo.support</td>

    <td>domain</td>

    <td>associated with transferdomainmy.com</td>

    </tr>

    <tr>

    <td>iofficedocx-sign.com</td>

    <td>domain</td>

    <td>associated with transferdomainmy.com</td>

    </tr>

    <tr>

    <td>weboffice-exceldocuments.com</td>

    <td>domain</td>

    <td>associated with transferdomainmy.com</td>

    </tr>

    <tr>

    <td>mehashwaree.com</td>

    <td>domain</td>

    <td>associated with transferdomainmy.com</td>

    </tr>

    <tr>

    <td>user-recover.com</td>

    <td>domain</td>

    <td>associated with transferdomainmy.com</td>

    </tr>

    <tr>

    <td>eofficedocx-websecure.com</td>

    <td>domain</td>

    <td>associated with transferdomainmy.com</td>

    </tr>

    <tr>

    <td>transferdomainmy.com</td>

    <td>domain</td>

    <td>associated with transferdomainmy.com</td>

    </tr>

    <tr>

    <td>unlqscan.com</td>

    <td>domain</td>

    <td>associated with transferdomainmy.com</td>

    </tr>

    <tr>

    <td>versandwelt-klingel.com</td>

    <td>domain</td>

    <td>associated with transferdomainmy.com</td>

    </tr>

    <tr>

    <td>active-life24.com</td>

    <td>domain</td>

    <td>associated with transferdomainmy.com</td>

    </tr>

    <tr>

    <td>planyourexoticvacation.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>russialinuxbasic.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>updatenameserver45.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>optionalblogginges.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>domainsforsupport.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>linuxbasicru1.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>domainsforfreehosting.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>linuxbasicmy.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>hostingserviceforall.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>hostingserviceclean.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>hostingservicesukit.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>hostingservicesloyal.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>standardofficeholland.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>standardofficeil.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>standardofficeuk.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>serverfornetworks.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>serverformailings.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>postserverem.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>serviceforneworder.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>serverforzapper.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>loginservicehelp.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>shortenurlservices.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>youranotherserver.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>linuxhostingplatformuk.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>hostusewithtech.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>serverforhiretech.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>serverfortechhelp.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>serverforhome.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>blogforpranks.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>usewithcareathome.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>optionsothego.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>anitmationworldnews.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>servicegoingfar.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>trusteventservices.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>hostserverrus.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>registrationonlineeurope.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>secureservereurope.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>secureserverasia.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>serverasiasap.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>serverloadbalance.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>mailservereurope.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>localserversa.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>serverdemoservice.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>frwrdrwr.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>fastserveruk.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>fastserverasia.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>fastservereurope.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>fastserverusa.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>chromeperfection.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>trustedserviceonline.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>browserdirectservice.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>browserredirect.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>optionalblogging.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>selectedmaxstores.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>auditionregistrationonline.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>knowledgebaseonlineuk.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>homeforallorphans.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>getreadytorunhalfmarathon.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>linuxserverfast.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>tinyurlshortner.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>economyservicesil.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>maxlaboratories.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>selectiveservicemax.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>portfoliofasinating.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>backwaterreservoir.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>bellsouthnetwork.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>homeremedytipntricks.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>economyfeeds.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>ecoserveraus.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>cyberserverusa.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>inrsrvrer.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>mrgrhr.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>com-nh-en-us.com</td>

    <td>domain</td>

    <td>registered by amandalovers@mail.com</td>

    </tr>

    <tr>

    <td>101.99.75.22</td>

    <td>ipv4</td>

    <td>currently hosts domains owned by attackers</td>

    </tr>

    <tr>

    <td>101.99.75.6</td>

    <td>ipv4</td>

    <td>currently hosts domains owned by attackers</td>

    </tr>

    <tr>

    <td>104.27.134.250</td>

    <td>ipv4</td>

    <td>currently hosts domains owned by attackers</td>

    </tr>

    <tr>

    <td>111.90.149.149</td>

    <td>ipv4</td>

    <td>currently hosts domains owned by attackers</td>

    </tr>

    <tr>

    <td>111.90.157.22</td>

    <td>ipv4</td>

    <td>currently hosts domains owned by attackers</td>

    </tr>

    <tr>

    <td>111.90.157.26</td>

    <td>ipv4</td>

    <td>currently hosts domains owned by attackers</td>

    </tr>

    <tr>

    <td>78.128.92.144</td>

    <td>ipv4</td>

    <td>currently hosts domains owned by attackers</td>

    </tr>

    <tr>

    <td>78.128.92.223</td>

    <td>ipv4</td>

    <td>currently hosts domains owned by attackers</td>

    </tr>

    <tr>

    <td>78.128.92.242</td>

    <td>ipv4</td>

    <td>currently hosts domains owned by attackers</td>

    </tr>

    </tbody>

    </table>

    • 1. From this we can conclude that the attackers are bonded by their love of a woman or women named Amanda.




Tmux Commands

screen and tmux

A comparison of the features (or more-so just a table of notes for accessing some of those features) for GNU screen and BSD-licensed tmux.

The formatting here is simple enough to understand (I would hope). ^ means ctrl+, so ^x is ctrl+x. M- means meta (generally left-alt or escape)+, so M-x is left-alt+x

It should be noted that this is no where near a full feature-set of either group. This - being a cheat-sheet - is just to point out the most very basic features to get you on the road.

Trust the developers and manpage writers more than me. This document is originally from 2009 when tmux was still new - since then both of these programs have had many updates and features added (not all of which have been dutifully noted here).

Action tmux screen
start a new session tmux OR
tmux new OR
tmux new-session
screen
re-attach a detached session tmux attach OR
tmux attach-session
screen-r
re-attach an attached session (detaching it from elsewhere) tmux attach -d OR
tmux attach-session -d
screen -dr
re-attach an attached session (keeping it attached elsewhere) tmux attach OR
tmux attach-session
screen -x
detach from currently attached session ^b d OR
^b :detach
^a ^d OR
^a :detach
rename-window to newname ^b , <newname> OR
^b :rename-window <newn>
^a A <newname>
list windows ^b w ^a w
list windows in chooseable menu ^a "
go to window # ^b # ^a #
go to last-active window ^b l ^a ^a
go to next window ^b n ^a n
go to previous window ^b p ^a p
see keybindings ^b ? ^a ?
list sessions ^b s OR
tmux ls OR
tmux list-sessions
screen -ls
toggle visual bell ^a ^g
create another window ^b c ^a c
exit current shell/window ^d ^d
split window/pane horizontally ^b " ^a S
split window/pane vertically ^b % ^a |
switch to other pane ^b o ^a <tab>
kill the current pane ^b x OR (logout/^D)
collapse the current pane/split (but leave processes running) ^a X
cycle location of panes ^b ^o
swap current pane with previous ^b {
swap current pane with next ^b }
show time ^b t
show numeric values of panes ^b q
toggle zoom-state of current pane (maximize/return current pane) ^b z
break the current pane out of its window (to form new window) ^b !
re-arrange current panels within same window (different layouts) ^b [space]
Kill the current window (and all panes within) ^b killw [target-window]
  • Use the same script for updating/ upgrading

    Make sure to change the versions to the latest releases:

    #!/bin/bash set -e bpcver=4.2.1 bpcxsver=0.57 rsyncbpcver=3.0.9.12

    Scroll through the script, know what you are doing.

    Uncomment the upgrade section(s) and comment out the install section(s)

    read more
  • Again running smartctl after all is said and done:

    smartctl --all /dev/sda

    ddrescue-smartctl-after-rescue.png ddrescue-smartctl-2.png

    Yet an old drive in itself, I run the wheels off of them, and monitor regularly as anyone should.

    read more
});