• 1 Post
  • 107 Comments
Joined 1 year ago
cake
Cake day: June 19th, 2023

help-circle











  • Yeh, they have managed to keep the range and attraction that you have both a new student trying to buy the cheapest possible set of furniture for their student flat and some rich retirees fitting out their holiday home buying in the same place.

    I got a POÄNG chair, love it. But there are cussions for it that are more expensive than the entire chair I bought!

    It’s amazing, and probably great for the upsell as there is always something slightly nicer.





  • You can probably get the URL for a companies SharePoint pretty easily, but you need a login. You are able to get a PAs credentials through a phishing link etc but need the 2fa code.

    You do the IT phishing attack (enter this code for me to fix your laptop being slow…), get them to enter the code and now you have access to a SharePoint instance full of confidential docs etc.

    I’m not saying it’s a great attack vector, but it’s not that different to a standard phishing attack.

    You could attack anything that’s using the single sign on. Attack their build infrastructure and you now have a supply chain attack against all of their customers etc.

    It helps but its not enough to counter the limits of human gullibility.





  • Nighed@sffa.communitytoAsklemmy@lemmy.mlCan I refuse MS Authenticator?
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    1 month ago

    Bad actor goes to super secret page while working on ‘fixing’ and issue for the user. They then get the 2 digit request code and ask the user to input it to ‘resolve’ the issue.

    Mostly the same as any other 2fa social engineering attack I guess, but the users phone does display what the code is for on the screen which could help… But if your falling for it probably not.