shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

288
active users

#vishing

0 posts0 participants0 posts today
Scripter :verified_flashing:<p>Smishing, Vishing und mehr: 9 Phishing-Angriffe, die ihr unbedingt kennen solltet - t3n – digital pioneers<br><a href="https://t3n.de/news/smishing-vishing-und-mehr-9-pishing-angriffe-die-ihr-kennen-solltet-1679869/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">t3n.de/news/smishing-vishing-u</span><span class="invisible">nd-mehr-9-pishing-angriffe-die-ihr-kennen-solltet-1679869/</span></a> <a href="https://social.tchncs.de/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybercrime</span></a> <a href="https://social.tchncs.de/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://social.tchncs.de/tags/Whaling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Whaling</span></a> <a href="https://social.tchncs.de/tags/Vishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vishing</span></a> <a href="https://social.tchncs.de/tags/Smishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Smishing</span></a> <a href="https://social.tchncs.de/tags/Pharming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pharming</span></a></p>
Prof. Dr. Dennis-Kenji Kipker<p>Gezielte Umgehung der Zwei-Faktor-Authentisierung (<a href="https://chaos.social/tags/2FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2FA</span></a>) durch Voice Phishing (<a href="https://chaos.social/tags/Vishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vishing</span></a>) - <a href="https://chaos.social/tags/Telekom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Telekom</span></a> und <a href="https://chaos.social/tags/DHL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DHL</span></a> warnen aktuell, der Angriffsvektor gilt aber generell für alle Online-Konten mit schwacher SMS-Absicherung:</p><p>"Betrüger geben sich derzeit am Telefon als Mitarbeitende der Telekom oder von DHL aus und versuchen die Angerufenen dazu zu bringen, empfangene SMS-Codes durchzugeben."</p><p><a href="https://chaos.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p><p><a href="https://www.sueddeutsche.de/wissen/vishing-fake-anrufe-von-telekom-und-dhl-hier-droht-konten-klau-dpa.urn-newsml-dpa-com-20090101-250319-930-407878" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">sueddeutsche.de/wissen/vishing</span><span class="invisible">-fake-anrufe-von-telekom-und-dhl-hier-droht-konten-klau-dpa.urn-newsml-dpa-com-20090101-250319-930-407878</span></a></p>
NO NAME<p>So? </p><p>Does everyone remember <a href="https://soapbox.hackdefendr.com/tags/LastPass" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LastPass</span></a>? </p><p>Welp!?</p><p>It happened again, but this time on the user side of the house. LastPass users targeted by <a href="https://soapbox.hackdefendr.com/tags/vishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vishing</span></a> attackers. </p><p>VISHING: the fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers.</p><p><a href="https://www.helpnetsecurity.com/2024/04/19/lastpass-vishing/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2024/04/19</span><span class="invisible">/lastpass-vishing/</span></a></p>
Tinker ☀️<p>So some of you might remember this post (and the subsequent demonstration on national news) of using a voice cloning tool (AI, Audio Deep Fake) by <span class="h-card" translate="no"><a href="https://infosec.exchange/@racheltobac" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>racheltobac</span></a></span> </p><p>Link to post: <a href="https://infosec.exchange/@racheltobac/110963070495263373" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@racheltobac/</span><span class="invisible">110963070495263373</span></a></p><p>(If you haven't seen it, go watch it. Rachel is amazing.)</p><p>I'd never needed to do a similar attack before, but! I was just tasked yesterday with researching it.</p><p>Asked some friends for a turn-key solution to clone voices. Got pointed to a website. Signed up for $1 a month (first month... then it goes to $5 a month thereafter).</p><p>Pulled some audio of my target's voice down from a youtube interview (a podcast works great too). </p><p>Only needed a minute's worth of audio.</p><p>Uploaded it to the website for cloning.</p><p>Typed out a quick script for the voice to read.</p><p>30 seconds later, I had my cloned audio.</p><p>It was so good, that it even included natural voice inflections AND!!! verbal pauses like umm's and uhh's that matched the target's original presentation. I can't tell the difference between the cloned voice and the original person.</p><p>Y'all... voice cloning and audio deep fakes are well past the ease of "script-kiddy" level. Anyone can do it.</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/socialEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>socialEngineering</span></a> <a href="https://infosec.exchange/tags/scams" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scams</span></a> <a href="https://infosec.exchange/tags/deepfake" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deepfake</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/vishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vishing</span></a></p>
Scripter :verified_flashing:<p>Voice-Phishing: Betrüger setzen auf raffinierte Vishing-Masche | heise online<br><a href="https://heise.de/-9212374" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">heise.de/-9212374</span><span class="invisible"></span></a> <a href="https://social.tchncs.de/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybercrime</span></a> <a href="https://social.tchncs.de/tags/VoicePhishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VoicePhishing</span></a> <a href="https://social.tchncs.de/tags/Vishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vishing</span></a></p>
Andrew 🌻 Brandt 🐇<p>I'm coming back from taking two weeks off of work to find that I've got some hilariously bad <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/vishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vishing</span></a> emails in my personal inbox that were sent to an email address I used back when I was dealing with <a href="https://infosec.exchange/tags/Dell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Dell</span></a> customer support several years ago, when they had an insider data breach where a contractor stole customer email addresses. </p><p>Anything I've received ever since addressed to this "dell@" email address has been <a href="https://infosec.exchange/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> but this one really takes the cake for "high quality." </p><p>There really should be a mock awards ceremony for terrible attacks. This one would be in the nominations for sure just because they decided to use colored text in Comic Sans font for the <a href="https://infosec.exchange/tags/PayPal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PayPal</span></a> logo.</p><p><a href="https://infosec.exchange/tags/BadSpam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BadSpam</span></a> <a href="https://infosec.exchange/tags/BadSpamAwards" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BadSpamAwards</span></a></p>