Seite - 250 - in The Future of Software Quality Assurance
Bild der Seite - 250 -
Text der Seite - 250 -
250 K. Yorkston
count[email removed] was hacked, because I
sent message you from it.
Now I have access to you accounts!
For example, your password for [email re-
moved] is [password removed]
Within a period from July 7, 2018 to Septem-
ber 23, 2018, you were infected by the virus
we’ve created, through an adult website
you’ve visited.
So far, we have access to your messages, so-
cial media accounts, and messengers.
Moreover, we’ve gotten full damps of these
data.
We are aware of your little and big se-
crets...yeah, you do have them. We saw and
recorded your doings on porn websites. Your
tastes are so weird, you know..
But the key thing is that sometimes we rec-
orded you with your webcam, syncing the re-
cordings with what you watched!
I think you are not interested show this
video to your friends, relatives, and your
intimate one...
Transfer $700 to our Bitcoin wallet:
[Bitcoin wallet removed]
If you don’t know about Bitcoin please input
in Google “buy BTC”. It’s really easy.
I guarantee that after that, we’ll erase all
your “data” :D
A timer will start once you read this mes-
sage. You have 48 hours to pay the above-
mentioned amount.
I wonder if the author had a competitive salary and dental plan? Compromise
allows the attackers to control the situation. I have something you don’t want
released (your photos from your phone/compromising browsing history/bank
accountdetails)andforsomeconsideration(cash/aconfidentialreport fromyour
organisation) the problemmight goaway.
Ego—sometimes, the urge to be “the smartest person in the room” can take over.
It could be childhood dreams (such as reading of the exploits of Kevin Mitnick
or Kevin Poulsen, both security experts arrested for hacking) and imagining “If
only . . .”, or it could be the need to, like many conspiracy theorists, be the only
person“whoknows the truth”.
Some of the tools the attacker will use are fear, greed and even empathy.
Chris Hadnagy and Michelle Fincher wrote the book Phishing Dark Waters [1]
where they took an in-depth study of phishing. An attacker can use fear, such as
the example above, or the alert from “your bank” saying your account has been
hacked, and you should click the link below to “verify your password”. They can
use greed—the Spanish prisoner/Nigerian 419 scam—where the victim is asked
to “please make a small payment/give me access to your account to release the
zurĂĽck zum
Buch The Future of Software Quality Assurance"
The Future of Software Quality Assurance
- Titel
- The Future of Software Quality Assurance
- Autor
- Stephan Goericke
- Verlag
- Springer Nature Switzerland AG
- Ort
- Cham
- Datum
- 2020
- Sprache
- englisch
- Lizenz
- CC BY 4.0
- ISBN
- 978-3-030-29509-7
- Abmessungen
- 15.5 x 24.1 cm
- Seiten
- 276
- Kategorie
- Informatik