• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Week 1: Course Introduction
      • Week 2: Meterpreter, Avoiding Detection, Client Side Attacks, and Auxiliary Modules
      • Week 3: Social Engineering Toolkit, SQL Injection, Karmetasploit, Building Modules in Metasploit, and Creating Exploits
      • Week 4: Porting Exploits, Scripting, and Simulating Penetration Testing
      • Week 5: Independent Study – Perform Metasploit Attack and Create Presentation
      • Week 6: Ettercap
      • Week 7: Introduction to OWASP’s WebGoat application
    • Second Half of the Semester
      • Week 8: Independent Study
      • Week 9: Introduction to Wireless Security
      • Week 10: Wireless Recon, WEP, and WPA2
      • Week 11: WPA2 Enterprise, Wireless beyond WiFi
      • Week 12: Jack the Ripper, Cain and Able, Delivery of Sample Operating Systems
      • Week 13: Independent Study – Analyze provided Operating System Samples and Create Assessment Report
      • Week 14: Deliver Assessment to Operating System Class either in person or via teleconferenc
  • Assignments
    • Analysis Reports
    • Group Project Report and Presentation
  • Webex
  • Harvard Coursepack
  • Gradebook

MIS 5212-Advanced Penetration Testing

MIS 5212 - Section 001 - Wade Mackey

Fox School of Business

Social Media Phishing Attacks Soar 500%

February 11, 2017 by Mengxue Ni 3 Comments

Social Media phishing attacks jumped by a massive 500% in Q4,2016. The report claimed fraudulent accounts across sites like Twitter and Facebook increased 100% from the third to fourth quarter. So-called “angel phishing” is a relatively new tactic in which the black hats register fake Twitter accounts that masquerade as customer support accounts. They monitor the real support accounts for irate customer messages and then quickly jump in to send messages back to those users loaded with malicious links.

I was phishing attacked by an email that told me I was hired by a company which I never applied. I did search the person who was trying to interview me, I found out the real-person said she didn’t hire people through google hangout or skype. Also, she said her identity was stolen on LinkedIn. For students who is desecrating to get a job after graduation, I think this kind of phishing is very attractive. The only thing I didn’t get is how did them get my school email.

 

Link: https://www.youtube.com/watch?v=qE3lce3XGXw

Filed Under: Week 04 Tagged With:

Reader Interactions

Comments

  1. Mauchel Barthelemy says

    February 13, 2017 at 7:35 pm

    I believe this is one of the most difficult challenge social media companies are and will be facing for a while. 500% is an alarming number that should convince Facebook, Twitter etc. that something drastic needs to be done to combat phishing. It will take them a lot of time before they get this right. All parties involved, including users, must play their part and do so well. Also, this is something that should start with all major companies working together to brainstorm strong efforts against massive social media phishing. Otherwise, it will become even more difficult if they opt to work individually to address this problem.

    Log in to Reply
  2. Ahmed A. Alkaysi says

    February 13, 2017 at 7:49 pm

    My company sends out “fake” phishing attempts to its employees in order to test and educate them. I actually fell victim to this test by opening up a link from someone that tried to add me on Linkedin. Without realizing the email looked suspicious nor reminding myself that my Linkedin account isn’t connect to my work email, I clicked on the link. The importance of making sure to click on links only from people and emails you recognize cannot be stated enough. If its someone that you don’t recognize, I suggest doing a google search to see what comes up.

    Log in to Reply
  3. Loi Van Tran says

    February 14, 2017 at 1:50 pm

    Phishing and social engineering is always tough to beat, especially proper reconnaissance is done. Like what you see here from Facebook and Twitter accounts, customers now prefer to use social media to contact a company’s customer service. Disgruntled customers makes it easy for victims to be approached by a faux customer service rep. My recommendation is to always check your sources, either checking the email domain, or calling the company if you need help. You may never know who is really on the other side of the screen.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (35)
  • Week 01 (2)
  • Week 02 (14)
  • Week 03 (13)
  • Week 04 (10)
  • Week 05 (7)
  • Week 06 (29)
  • Week 07 (8)
  • Week 08 (1)
  • Week 09 (6)
  • Week 10 (12)
  • Week 11 (7)
  • Week 12 (4)
  • Week 13 (6)
  • Week 14 (18)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in