Online dating bad stories about military
It can be as vanilla as a classic phishing page for the dating app itself or the network the attacker is sending them to.And when combined with password reuse, an attacker can gain an initial foothold into a person’s life.And as a user, you should report and un-match the profile if you feel like you are being targeted. The same discretion should be done with email and other social media accounts.They’re easy to access, outside a company’s control, and a cash cow for cybercriminals.This isn’t to say though that this couldn’t happen or isn’t happening—we know that it’s technically (and definitely) possible.But what’s surprising is the amount of company information that can be gathered from an online dating network profile.Indeed, such attacks are feasible—but do they actually happen? Targeted attacks on the Israeli army early this year used provocative social network profiles as entry points.
The honeyprofiles were created with specific areas of potential interest: medical admins near hospitals, military personnel near bases, etc.Location is very potent, especially when you consider the use of Android Emulators that let you set your GPS to any place on the planet.Location can be placed right on the target company’s address, setting the radius for matching profiles as small as possible.That shouldn’t come as a surprise, as online dating networks allow you to filter people using a wide range of factors—age, location, education, profession, salary, not to mention physical attributes like height and hair color.
Grindr was an exception, because it requires less personal information.That meant we also had to like profiles of potentially real people.