[ad_1]
Cybercriminals have recently managed to force many Internet users to spend their own Facebook login data, an operation known as “fishing“which has become very popular in recent years. Despite the success in obtaining hundreds of thousands of passwords, the scammers seem overlooked something fundamental: a security key itself so that this stolen information cannot be accessed.
The action performed consisted of fooling thousands of Facebook users for them to hand over their account passwords. Then the criminals stored stolen login credentials in a cloud database … which they forgot to lock. Because of this, the operation was exposed and the plan ended up having a very bad, or good, ending for the victims.
In the cloud, anyone can see information stolen from the browser. The database also provided more details on such as they performed the operation. Israeli security researchers Noam Rotem and Ran Locar were responsible for uncovering the criminals’ gaffe. On Friday they released a survey with security website vpnMentor addressing the case.
The negative highlight is Twitter, which drops by more than 20% with low user growth
Researchers speculate that the scammers used Facebook accounts to post spam content on their victims’ profiles. As a result, people have been drawn to the posts and it could all boil down to a bitcoin scheme. Facebook has been alerted by researchers and, of course, the database is no longer available. As a result, the social network forced a reset passwords of the accounts affected by the coup.
The cybercriminal fishing program has attracted victims sites that have gone through legitimate services, offering a service to show Facebook users that they had viewed their profiles. After entering the fake link, a Facebook login page (also illegitimate) asked for the account details. According to the website CNet, hundreds of thousands of users may have fallen for the scam.
Source: CNET
.
[ad_2]
Source link