Experts On Arrests In Twitter’s Largest Security Breach, Steps To Protect Against Mobile Phishing Fraud

By   ISBuzz Team
Writer , Information Security Buzz | Aug 04, 2020 09:26 am PST

In response to news that a 17-year-old was one of three people arrested in connection with the largest privacy and security breach in Twitter’s history and the bitcoin scam that saw the accounts of public figures such as Barack Obama, Bill Gates and Joe Biden hijacked for fraud, an expert with Point3 Security offers perspective and advice to protect against mobile phishing.

Notify of
1 Expert Comment
Oldest Most Voted
Inline Feedbacks
View all comments
Chloé Messdaghi
Chloé Messdaghi , VP of Strategy
August 4, 2020 5:30 pm

As we’re learning, one of the young men arrested today was previously investigated back in April, and the Secret Service previously took 700K bitcoin from him.

We’re in a time when people are generally overwhelmed and attackers know this and are actively exploiting it. That’s why we’re seeing a rise in mobile phishing in particular.

Think about it: now more than ever, if someone gets a text on their mobile from a boss who doesn’t usually reach out that way, they’re likely to chalk it up to the interoffice lines of communications that have been blurred and rewritten by the Pandemic. And if an employee is then asked by someone purporting to be their boss with a message saying “we have a serious problem” and to please call a helpdesk number immediately, they’re more likely to comply before thinking things through – again, because the Pandemic has made people overwhelmed and eager to respond to security threats.

On top of that, mobile is a much better way to phish someone versus laptop computing – studies say that even well informed users are 3x more likely to fall for a phishing link on a small screen vs. a desktop, because it’s harder visually and logistically to double check a link. There needs to be a lot more conversations about mobile phishing in particular, and any phishing really. Rule #1 must be: Always question everything you get, including and especially anything from your employer.

Here’s some common phishing-through-mobile approaches: SMS messages that warn of a security situation or ask the recipient to “click here to validate;” URL padding – where a bad actor takes a legitimate domain and adds malicious extensions onto it, that can lead elsewhere – but the recipient doesn’t know because when they get the SMS message, only the main domain shows; malicious Tiny URLs – we see these a lot, and they take the unsuspecting recipient to an insecure and dangerous site; and mobile verification code scams – those are the most popular.

Again, the first rule must be that if a number’s not familiar and already saved in the recipient’s contacts – they really need to double check it and make Google their ‘search buddy’ by seeing if there’s anything to be learned about the number.

Bad actors are exploiting our surreal-reacted emotional state and lack of focus to make money.

Also, it’s important to differentiate attackers from hackers. Attackers are the malicious/bad actors – in contrast, hackers find and report vulnerabilities without exploiting them. Stories that mislabel bad actors as hackers actually hurt the hacker community, who are trying to keep everyone safe by finding and deescalating problems.

Last edited 3 years ago by Chloé Messdaghi

Recent Posts

Would love your thoughts, please comment.x