Jump in the discussion.

No email address required.

ZINC employed traditional social engineering tactics by initially connecting with individuals on LinkedIn to establish a level of trust with their targets. Upon successful connection, ZINC encouraged continued communication over WhatsApp, which acted as the means of delivery for their malicious payloads.

>Talking to strangers on LinkedIn

>Using WhatsApp at all

>Giving them access to your work pc without question

Im 95% confident that everyone targeted/falling for this is a :marseytunaktunak:

Jump in the discussion.

No email address required.

This reminds me of going on AIM

Telling my middle school friends I wanted to send them a cool little game I found

Just let me send you this coolgame.exe trojaned with Back Orifice

Also please tell me your IP, uh I guess 'cause I wanna see if I can ping you

And then I made their CD-ROM drives mysteriously open and close

Jump in the discussion.

No email address required.

Link copied to clipboard
Action successful!
Error, please refresh the page and try again.