4 points

Inspired by this post, I just created a phishing test for my staff with a malicious URL in a “report this as spam” link, complete with a required training for those who click the link.

permalink
report
reply
35 points

Our IT sent out a test once that was a fake “someone sent you this document on teams” link and I fell for it assuming it was another stupid microsoft workflow for sharing documents. The only reason I didn’t actually hit the log in part that would have got me reported was because I didn’t care enough about whatever it was that was supposedly sent to me.

permalink
report
reply
4 points

I send anything that isn’t plain text or something I requested straight to security to keep those fucks sharp, I wish they summarized emails I sent them instead of complaining that I keep doing it though.

permalink
report
parent
reply
4 points

yeah the only phishing tests that got me were that and an invite to a Teams team because i get added to a new team every week or so lol

permalink
report
parent
reply
53 points

permalink
report
parent
reply
2 points

If it’s not in slack, it doesn’t exist

permalink
report
parent
reply
59 points

I heard once that the reason that those phishing emails are (usually) pretty obvious is because the phisher doesn’t want to accidentally catch a more attentive and careful victim, spend time trying to wire money from them, only for the victim to realize that it’s a scam before following through, therefore wasting the phishers time. The type of person to fall for the Nigerian prince stuff is not common, but they exist and the odds of them paying out are much higher.

permalink
report
reply
4 points

Depends on what the end goal is. Wire fraud? Sure. Typically a Business Email Compromise will try and compromise the account credentials to use it as a location to send other mass phishing attacks to their contacts, gain access to sensitive information the user had, or laterally move between systems and further compromise the organization. In that case, you would want the message to appear as legitimate as possible to gain access to the highest privileged accounts.

permalink
report
parent
reply
13 points
*

I’ve heard that too. But, super-realistic scams exist, so if that’s right it’s just splitting the difference between the two that’s a bad strategy.

permalink
report
parent
reply
14 points

It’s mass phishing versus spear phishing. I believe anyone would fall for a highly specific spear phishing campaign from dedicated individuals, but I don’t believe most people are important enough to be victims of it nor do most people need to really do it.

permalink
report
parent
reply
2 points
*

The cost of people to run the scams is also a big factor. If poor quality can actually be an asset, slave labour from Myanmar or similar is going to be very competitive. You can have a small center full of those unfortunate people for the price of one Western cracker to do spear phishing.

permalink
report
parent
reply
3 points

Right and the motives are likely going to be different too. Mass phishers are just out to make a quick buck, but targeted phishing could be for money, intelligence, disruption, making a statement, or even just clout.

permalink
report
parent
reply
48 points

wow I hate this meme format

permalink
report
reply
95 points
*

privacy policy

look inside

sells your data

permalink
report
reply
35 points

The policy is that you don’t have privacy and that they sell your data.

permalink
report
parent
reply

Programmer Humor

!programmer_humor@programming.dev

Create post

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

  • Keep content in english
  • No advertisements
  • Posts must be related to programming or programmer topics

Community stats

  • 8.7K

    Monthly active users

  • 1.2K

    Posts

  • 25K

    Comments