Video Flagged Dead
Not yet a member? No problem!
Sign-up just takes a second.
Forgot your password?
Recover it now.
Already signed up?
Log in now.
Forgot your password?
Recover it now.
Not yet a member? No problem!
Sign-up just takes a second.
Remember your password?
Log in now.
16 Comments
siftbotsays...Tags changed from "real hustle keylogging scam" to "real, hustle, keylogging, scam, computer" by gold star member LadyBug.
LadyBugsays...*geek
scary scam! i'm sure most would fall prey to it!
siftbotsays...Video added to geek channel (geek called by gold star member ladybug)
Farhad2000says...My solution against this happening is ignoring all communications coming from your bank, and visit them monthly.
joemawlmasays....
snaremopsays...anyone gotta link to the website where you can download this stuff?
heheheh
winkler1says...This doesn't show how the keylogger was installed?
A much more subtle social engineering attack was this... leaving USB drives filled with spyware in the parking lot of the target. Folks brought them in and plugged them into the network. Boom.. pwned.
gfxmonksays...If you already have the keylogger, getting the other details is hardly a hustle... It's just a matter of waiting. I wanna know how they got the keylogger on in the first place.
EMPIREsays...ok. This woman's bank security is pathetic. My bank, only has you type in the login. The password is displayed in a small window with all the numbers scrambled randomly everytime you log in, and you input the password by clicking with the mouse. Much safer.
Of course you could also be monitered with some sort of remote viewer that could see whatever is displayed in your desktop, but at least this way is much safer.
BoneyDsays...Exactly gfxmonk, a very critical point for this scam. Did they just break into the office? Intercept the computer at her house? Break into her car? Each would raise the possibility of any other number of precautions defeating their intrusion attempt. Winkler's example seems much more plausible, which serves as a much more realistic lesson to prepare for exploitation. Similar to how we used to click over the read-only switch on a 3.5" floppy before use on strange PCs.
Both of the episode clips i've seen so far for this series have employed nothing more than scare-mongering tactics, obviously for ratings. The chance if this happening to you - in the method they've described - would be so unlikely, you might as-well stop travelling by air for fear of crashing into a mountain.
Farhad2000says...Getting the key logger on there is simple enough, leave a few USB keys out near your target. You'd be surprised how many people cant pass up a USB key... I already said too much...
Tymbrwulfsays...*dead, removed by user
siftbotsays...This published video has been declared non-functional; embed code must be fixed within 2 days or it will be sent to the dead pool - declared dead by Tymbrwulf.
siftbotsays...rasch187 has fixed this video's dead embed code - no Power Points awarded because rasch187's points are already fully charged.
jonnysays...*dead
siftbotsays...This video has been declared non-functional; embed code must be fixed within 2 days or it will be sent to the dead pool - declared dead by jonny.
Discuss...
Enable JavaScript to submit a comment.