The bases in dating and when should they happen Camsexfree
People are increasingly taking to online dating to find relationships—but can they be used to attack a business?The kind (and amount) of information divulged—about the users themselves, the places they work, visit or live—are not only useful for people looking for a date, but also to attackers who leverage this information to gain a foothold into your organization.Conversely, we were able to find a given profile’s corresponding identity outside the online dating network through classic Open Source Intelligence (OSINT) profiling. Many were just too eager to share more sensitive information than necessary (a goldmine for attackers).In fact, there’s even a previous research that triangulated people’s exact positions in real time based on their phone’s dating apps.Indeed, such attacks are feasible—but do they actually happen? Targeted attacks on the Israeli army early this year used provocative social network profiles as entry points.
Once the target is compromised, the attacker can attempt to hijack more machines with the endgame of accessing the victim’s professional life and their company’s network.
That meant we also had to like profiles of potentially real people.
This led to some interesting scenarios: sitting at home at night with our families while casually liking every single new profile in range (yes, we have very understanding partners).
Profiles with specific job titles naturally attracted more attention.
We also had our fair share of cheesy pickup lines and honest, good people connecting with us, but we never got a targeted attack. Perhaps no campaigns were active on the online dating networks and areas we chose during our research.
It can be as vanilla as a classic phishing page for the dating app itself or the network the attacker is sending them to.