Social networks – A bonanza for cybercriminals
Jump to navigation
Jump to search
(Publication) Google search: [1]
Social networks – A bonanza for cybercriminals | |
---|---|
Botnet | |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | Android, Social networks, VKontakte, Facebook, Instagram |
Origin | Russia |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2016 / 2015-12-29 |
Editor/Conference | Kaspersky Securelist |
Link | https://securelist.com/blog/incidents/73204/social-networks-a-bonanza-for-cybercriminals/ (Archive copy) |
Author | Ruslan Stoyanov |
Type | Blogpost |
Abstract
“ What do you think when you receive yet another spam or phishing message on your mobile phone? Most likely it is: “Who are these people, and how on earth did they get my phone number?” Initially, suspicion usually falls on an unscrupulous employee at some organization that you gave your number to. However, it’s not uncommon for spammers and cybercriminals to use a database harvested from a social network using special software, rather than a “leaked” database of cellphone subscribers.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2016BFR4833, editor = {Kaspersky Securelist}, author = {Ruslan Stoyanov}, title = {Social networks – A bonanza for cybercriminals}, date = {29}, month = Dec, year = {2016}, howpublished = {\url{https://securelist.com/blog/incidents/73204/social-networks-a-bonanza-for-cybercriminals/}}, }