A majority of large-scale hacking incidents were done by morons.

Bryce

Bryce

Going Hard
Joined
Dec 8, 2024
Posts
27,171
Reputation
63,181
Take Graham Ivan Clark for example. After getting into Twitters administrative database, he logged into Obamas account, Musk's account, Apples account, and more. This kid had the ability to incite a global conflict but instead ran a crypto scam and only made $100k which ended up getting seized. All he did was pose as an employee, tell another employee there was an issue with Twitters internal VPN, sent them a phishing link, and used their login info to find a manual about logging into accounts with the database alongside it.

What I find funny is that most people seem to believe hackers are these computer geniuses who know how to crack passwords on a whim and program malware capable of taking over the world, but in reality, 99% of these attacks are done via social engineering or simple identity fraud.

Take push-bombing for example. Back when MFA was less secure, a hacker could buy or find a comprised account at a business, spam an employee's phone with MFA messages, and hope they'd click one out of annoyance or confusion. Just by simply pissing someone off, they could gain access to the entire business depending on who they got. This happened to Uber in 2022. And what did the hacker do? He trolled and sent messages to employees on Slack.

Think of it, this guy could've viewed proprietary source code, discover vulnerabilities, copy intellectual property, leak millions of customers accounts, sell driver information, or even find a path from employee systems to production databases. Yet he decided to mess around and tell employees that he hacked Uber.

I think it proves the real vulnerability is not the tech, but the people in charge of the tech.
 
  • +1
Reactions: Divineincel, lnceIs, Jason Voorhees and 5 others
@Jason Voorhees
 
I low-key would of ended the world

would of sent 33 missiles to asdvek house
 
  • JFL
Reactions: Mogs Me
How the hackers felt after getting my moms I cloud information due to 8 year old me entering her information on their free Roblox site just to download my mom nudes to goon to it later

IMG 6244
 
  • JFL
  • +1
Reactions: Aox Ofwar and Bryce
How the hackers felt after getting my moms I cloud information due to 8 year old me entering her information on their free Roblox site just to download my mom nudes to goon to it later

View attachment 4756645
how yk your mom has nudes:feelscry:
 
  • JFL
Reactions: Mogs Me
How the hackers felt after getting my moms I cloud information due to 8 year old me entering her information on their free Roblox site just to download my mom nudes to goon to it later

View attachment 4756645
When u chillin with yo girl watchin Dexter and yo homie yappin bout sum "they've blackmailed me G I'm ending it all" so u lowk hang up on his dumb ahh and start beating yo girl

Episode 2 Sunday GIF by SpongeBob SquarePants
 
  • JFL
Reactions: Mogs Me
Take Graham Ivan Clark for example. After getting into Twitters administrative database, he logged into Obamas account, Musk's account, Apples account, and more. This kid had the ability to incite a global conflict but instead ran a crypto scam and only made $100k which ended up getting seized. All he did was pose as an employee, tell another employee there was an issue with Twitters internal VPN, sent them a phishing link, and used their login info to find a manual about logging into accounts with the database alongside it.

What I find funny is that most people seem to believe hackers are these computer geniuses who know how to crack passwords on a whim and program malware capable of taking over the world, but in reality, 99% of these attacks are done via social engineering or simple identity fraud.

Take push-bombing for example. Back when MFA was less secure, a hacker could buy or find a comprised account at a business, spam an employee's phone with MFA messages, and hope they'd click one out of annoyance or confusion. Just by simply pissing someone off, they could gain access to the entire business depending on who they got. This happened to Uber in 2022. And what did the hacker do? He trolled and sent messages to employees on Slack.

Think of it, this guy could've viewed proprietary source code, discover vulnerabilities, copy intellectual property, leak millions of customers accounts, sell driver information, or even find a path from employee systems to production databases. Yet he decided to mess around and tell employees that he hacked Uber.

I think it proves the real vulnerability is not the tech, but the people in charge of the tech.
yea hackers are crazy man

put a bunch of porn on my computer and shit and my mom came in
and when i got up i was pulling my pants up and shit cz of the virus
 
  • JFL
  • +1
Reactions: Luquier, Mogs Me and Bryce
yea hackers are crazy man

put a bunch of porn on my computer and shit and my mom came in
and when i got up i was pulling my pants up and shit cz of the virus

shit still has my fucking dying to this day
i love this video
 
When u chillin with yo girl watchin Dexter and yo homie yappin bout sum "they've blackmailed me G I'm ending it all" so u lowk hang up on his dumb ahh and start beating yo girl

Episode 2 Sunday GIF by SpongeBob SquarePants
Not a single unique experience ๐Ÿ˜ข
 
  • +1
Reactions: Bryce
Correct it's 99% of the time some slick con man than some computer geek stuck in terminal. Literal the first chapter of any cybersecurity textbook and the first thing we learn is social engineering and opsec. Humans are always the weakest and 99% of the time only reason for any kind of data leaf, theft or malware. It's rare for a actual bug or exploit that messes with the core system to make it out in the wild unless you ofc vibe code evrything and pull a tea app fiasco
 
  • +1
Reactions: Bryce
Correct it's 99% of the time some slick con man than some computer geek stuck in terminal. Literal the first chapter of any cybersecurity textbook and the first thing we learn is social engineering and opsec. Humans are always the weakest and 99% of the time only reason for any kind of data leaf, theft or malware. It's rare for a actual bug or exploit that messes with the core system to make it out in the wild unless you ofc vibe code evrything and pull a tea app fiasco
Still remember so vividly tbh @imontheloose
 
  • +1
Reactions: imontheloose
Still remember so vividly tbh @imontheloose
we dont do cybersecurity unless u specialise in computing slop. som1 in my group project has done that (theyre considered the idiots of the cohort subtly and slyly; rightfully so bc shes absolutely useless), but its entirely reasonable to assume its easier to socially engineer a granny to give u admin than to somehow loop hool thru whatever system ur aiming to exploit.
 
  • +1
Reactions: Bryce and Jason Voorhees

Similar threads

mcmentalonthemic
Replies
73
Views
4K
ssxjdgh
ssxjdgh
mcmentalonthemic
Replies
26
Views
5K
PSLGODINCEL
P
_MVP_
Replies
11
Views
2K
gulden
gulden

Users who are viewing this thread

Back
Top