TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Deconstructing a Sexploitation Attack

37 pointsby joebasiricoover 5 years ago

8 comments

newscrackerover 5 years ago
&gt; Keep sensitive data off of shared systems, use a strong password and Two Factor Authentication, keep your systems up to date, and be thoughtful about the trust you put into where you upload your data.<p>Also be thoughtful about the trust you put into <i>who you share any data with</i> (especially photos) and be conscious about who can see it (this is a big deal on social media, where privacy and visibility permissions aren’t easily understood or used by people). Unless you’re a celebrity (and sometimes even if you’re a celebrity), sensitive information could leak from anyone you’ve shared it with.
评论 #21484912 未加载
amanziover 5 years ago
Recent versions of Windows 10 have the Sandbox feature which gives you quick and easy access to a temporary VM that would let you safely open the attachment as described in this article. Obviously not as secure as Kali Linux, but more usable to most people than spinning up a Kali VM.
systematicalover 5 years ago
So a whole lot of nothing. They pulled a list and loaded an email campaign. I wonder who is actually paying up here. Nice to learn about some tools that I was not familiar with though.
评论 #21484902 未加载
copperxover 5 years ago
I didn&#x27;t think PDF files could contain executable code.<p>Are PDFs as attack vectors common?
评论 #21479844 未加载
评论 #21479695 未加载
评论 #21487695 未加载
评论 #21479639 未加载
评论 #21481859 未加载
评论 #21479927 未加载
评论 #21479669 未加载
mlang23over 5 years ago
There seems to be an accessibility issue with this link. I do get an essentially empty page in Firefox and Chrome when I try to read this with a screen reader. Opening the same page with lynx also gives me an empty page (no surprise there), and skimming through the page source, the HTML&#x2F;CSS&#x2F;JS contains far too much obscure stuff to actually trust this page.
zenit-mf-1over 5 years ago
“international hacker negotiator” Seems an interesting and trendy job
yifanluover 5 years ago
tl;dr: they got one of these spam email that you’ll find a dozen of in your spam box, made up a bunch of “potential” bad things that could happen but none of that happened and the spammer just wanted bitcoins.
评论 #21479824 未加载
dickeytkover 5 years ago
<a href="https:&#x2F;&#x2F;share.icloud.com&#x2F;photos&#x2F;0fB49xX6FueVyXTFbo0my-OEg" rel="nofollow">https:&#x2F;&#x2F;share.icloud.com&#x2F;photos&#x2F;0fB49xX6FueVyXTFbo0my-OEg</a><p>This is literally the entire article on mobile safari<p>EDIT: purify ad-blocker caused the issue