ART 80F - WEEK 7 LECTURE CONTENT

 

Exploiting Networks + Systems

A Network or System Exploit

  • Component, protocol or feature of a system that allows it to be manipulated or disrupted.


Fake Networks on LinkedIn

linkedIn03.jpg

From BBC Report on Fake Profiles being used by Hackers

By making these connections, criminals can entice users to give up personal details, direct them to malware-laden websites and, if they can get their email addresses, launch spear-phishing campaigns - targeted emails that aim to steal personal information.

"LinkedIn users expect to be contacted by recruiters, so this ruse works out in the scammers' favour," it said in its report.

"Most of these fake accounts have been quite successful in gaining a significant network - one had 500 contacts. Some even managed to get endorsements from others," Symantec researcher Dick O'Brien told the BBC.

Article How to Spot a Fake Profile

linkedIn04.png
linkedIn05.png

"Gaming" Spotify

spotify02.jpg

Vice article on Spotify's Spam War

Via Vice / Motherboard

Via Vice / Motherboard

Article on "Sleepify" strategy

In this YouTube post Vulfpeck’s frontman Jack Stratton claims that for each Spotify user that streams “Sleepify”—which is comprised of ten tracks of complete silence—on repeat throughout the night, the band will make $4. If enough people do it, that could help it fund a free tour, which Stratton claims will visit the cities that stream the album the most.

Faked Spotify Hack


Fake Accounts - Deception, Disruption + Chaos

fakeDapl01.png

DeSmog report on fake Twitter accounts used to spread disinformation and counter protest efforts against DAPL

Gizmodo on Fake ANTIFA Accounts