Summary: The video discusses the tactics used by cybercriminals to effectively target individuals through social engineering, where they exploit relationships and networks to access sensitive information. The narrator explains a systematic approach to mapping out a target’s social connections, focusing on gaining trust through familiar contacts before launching an attack.
Keypoints:
- Cybercriminals often target individuals by infiltrating their email networks.
- Initial targeting usually involves familiar contacts to build trust before reaching the main target.
- Extensive research on the target’s online presence, including social media and professional networks, is conducted.
- Targets are categorized into levels:
- Level one: Inner circle (family and close friends)
- Level two: Extended connections (professionals like lawyers and gyms)
- Level three: Affiliates and broader acquaintances
- The strategy often involves targeting level two and level three connections before approaching the main target.
- Through this approach, attackers can gain control over communications, making it easier to deceive the primary target.
Youtube Video: https://www.youtube.com/watch?v=XwbabtA03ns
Youtube Channel: Jack Rhysider
Video Published: Fri, 31 Jan 2025 18:04:26 +0000