[Nulled] » Information security » Social Engineering » 💬 true story... Social Engineering.
January 20 2023

💬 true story... Social Engineering.

💬 true story... Social Engineering.

• Technical security measures practically do not reduce the risks from attacks by Social Engineering methods. "There is no device that prohibits people from being idiots." Two years before the Snowden incident, the US Department of Homeland Security (DHS) checked people who are responsible for preventing threats nationwide, and they behaved like small children.

• The Internal Security Service scattered several CDs in the parking lot near the government building. Some of them were unmarked, and others had the DHS logo on them. Sitting down at the monitors of the surveillance cameras, the officers began to observe the behavior of people.

• 60% of the disks without labels were picked up and inserted into the drives of the working PCs of employees of various departments. In the group of disks with the logo of the ministry, this was done with respect to 90% of the blanks. Almost everyone thought that they had found a valuable loss, and wanted to feel like a hero of a spy story.

• A similar story happened in the spring of 2018 with the Israeli Ministry of Defense. The IDF-linked computer networks were infected in a way first tested during the spread of the primitive worm ILOVEYOU in 2000.

• To bypass antiviruses, the authors used the method of obfuscation, but the main focus was on the manual method of distribution. Emails with the subject "Girls from the Israel Defense Forces" and variations similar in meaning were sent to all publicly available addresses of the Israeli Defense Ministry and its contractors. Curious employees launched an attachment through one, even despite warnings from embedded security systems about a suspicious attachment.

Information

Visitors who are in the group Guests they can't download files.
Log in to the site under your login and password or if you are a new user go through the process registrations on the website.

Comments:

This publication has no comments yet. You can be the first!

Information the publication:

  • Author of the publication: web3
  • Date of publication: 20 January 2023 13:20
  • Publication category(s): Information security»,Social Engineering
  • Number of views of the publication: 191
  • Number of comments to the publication: 0

Related News

20 January 2023
Social Engineering
💬 true story... Social

💬 true story... Social Engineering. The question is not "Will you be hacked or not?", but "How

Read more
20 January 2023
Social Engineering
💬 true story... Social

💬 true story... Social Engineering. • Today we are talking about social engineering, namely the hacking of the

Read more
20 January 2023
Social Engineering
💬 true story from Group

💬 true story from Group IB. Social Engineering. The main component of phishing is that this method of attack

Read more
20 January 2023
Social Engineering
💬 true story from Group

💬 true story from Group IB. Social Engineering. • Today I have prepared for you another and interesting story from

Read more
20 January 2023
Social Engineering
Social Engineering ​💬

Social Engineering ​💬 true story... 🖖🏻 Greetings to you user_name. • Today I want to share with you an interesting

Read more

Information

Users of 🆅🅸🆂🅸🆃🅾🆁 are not allowed to comment this publication.

Site Search

Site Menu


☑ Websites Scripts

Calendar

«    November 2024    »
MonTueWedThuFriSatSun
 123
45678910
11121314151617
18192021222324
252627282930 

Advertisement

Survey on the website

Evaluate the work of the site
 

Statistics

  • +12 Total articles 6747
  • +13 Comments 4077
  • +22 Users : 5841