[Nulled] » Information security » Social Engineering. Cheating bloggers and hijacking channels.
January 20 2023

Social Engineering. Cheating bloggers and hijacking channels.

Social Engineering. Cheating bloggers and hijacking channels.

• Yesterday, a video message was published from a well-known blogger (AICHI Beard), who covers the topic of programming and publishes interesting interviews with developers. The fact is that with the help of social engineering methods, the author was forced to enter data on a phishing resource, after which the account was hacked, and the Telegram * channel was hijacked. After the successful hacking, various binary options, which are a scam, began to be published in the TG channel.

• I don't know all the nuances and details of the technical component of hacking, but that's not the point at all. Just imagine, a person with such experience in programming and IT in general, could be deceived and hijacked by the simplest methods of #SI and phishing. Presented? And now think about how many administrators or ordinary users are subject to similar attacks. Many people are not connected with IT in any way and it is common for them to enter their 2FA password on a phishing resource.

• If we take a situation when scammers write to the channel administrator and offer to buy 10 advertising posts for $ 3000, but for this you need to register on a phishing resource with an entry form via Telegram, what do you think, what percentage of administrators will refuse such a deal?

• As already mentioned, the foundations of social engineering have not undergone significant changes over the centuries — only the forms and details of techniques have changed. That is why always try to think with your head, do not enter data on third-party resources and read S.E. by the hashtag #SI, I often try to publish current methods of divorce of admins (and not only) in Telegram and share interesting information from the world of Social Engineering.

* The channel was eventually restored through TG support. I hope that the author will learn from his mistakes and will no longer get into such a situation.

Information

Visitors who are in the group Guests they can't download files.
Log in to the site under your login and password or if you are a new user go through the process registrations on the website.

Comments:

This publication has no comments yet. You can be the first!

Information the publication:

Related News

20 January 2023
Social Engineering
💬 true story... Social

💬 true story... Social Engineering. • Today we are talking about social engineering, namely the hacking of the

Read more
20 January 2023
OSINT
Social Engineering.

🫠 Social Engineering. MFA-fatigue (MFA Fatigue). • MFA Fatigue is one of the social engineering methods used by

Read more
20 January 2023
Social Engineering
🧠 S.E. Note. Classical

🧠 S.E. Note. Classical social engineering. • To carry out a successful attack, attackers need three components:

Read more
20 January 2023
Social Engineering
💬 true story... Social

💬 true story... Social Engineering. • Technical security measures practically do not reduce the risks from attacks

Read more
19 January 2023
OSINT
Social Engineering:

Social Engineering: registration for a hundred bucks. • A fan of the TV series "Breaking Bad" created 20

Read more

Information

Users of visitor are not allowed to comment this publication.

Site Search

Site Menu


☑ Scripts Software

Calendar

«    May 2024    »
MonTueWedThuFriSatSun
 12345
6789101112
13141516171819
20212223242526
2728293031 

Advertisement

Survey on the website

Evaluate the work of the site
 

Statistics

  • +4 Total articles 5578
  • +14 Comments 3149
  • +34 Users : 4128