Skip to content

Piero Bosio Social Web Site Personale Logo Fediverso

Social Forum federato con il resto del mondo. Non contano le istanze, contano le persone

I think I was just the target of a fairly sophisticated phishing attempt.

Uncategorized
5 1 1
  • I think I was just the target of a fairly sophisticated phishing attempt.

    Got a call from a toll-free number, answered it, it was somebody claiming to be from Google.

    Said they were calling about a recent attempt to sign in to my account and a ticket to change my recovery address. I said that didn't sound right, guy on the phone said he was going to send me what they received.

    I get an email, I don't look closely at it but it's an actual email from Google (1/?)

  • I think I was just the target of a fairly sophisticated phishing attempt.

    Got a call from a toll-free number, answered it, it was somebody claiming to be from Google.

    Said they were calling about a recent attempt to sign in to my account and a ticket to change my recovery address. I said that didn't sound right, guy on the phone said he was going to send me what they received.

    I get an email, I don't look closely at it but it's an actual email from Google (1/?)

    The guy says it looks like an OAuth app may have tried to do it and I think ok, yeah. I use "sign in with Google" all the time, there could be some rogue thing out there where maybe I granted more permissions than I should have or something.

    The guy asks if I'm familiar with OAuth and I tell them I am, I've written apps that use OAuth before. He proceeds to give me a brief spiel anyway which I found odd.

    So then I ask ok well can you tell me what app did it? He couldn't. (2/?)

  • The guy says it looks like an OAuth app may have tried to do it and I think ok, yeah. I use "sign in with Google" all the time, there could be some rogue thing out there where maybe I granted more permissions than I should have or something.

    The guy asks if I'm familiar with OAuth and I tell them I am, I've written apps that use OAuth before. He proceeds to give me a brief spiel anyway which I found odd.

    So then I ask ok well can you tell me what app did it? He couldn't. (2/?)

    That kind of set off alarm bells because I know from administrating Google Workspace that you absolutely can see what app did what. So red flag.

    So then he says something about he can reset my OAuth token. Like it sounded like my account has 1 OAuth token, the way he presented it. Which isn't right.

    So I say "ok well listen I can log into my account and disconnect from apps" and he said something about how it's better if they do it? (3/?)

  • That kind of set off alarm bells because I know from administrating Google Workspace that you absolutely can see what app did what. So red flag.

    So then he says something about he can reset my OAuth token. Like it sounded like my account has 1 OAuth token, the way he presented it. Which isn't right.

    So I say "ok well listen I can log into my account and disconnect from apps" and he said something about how it's better if they do it? (3/?)

    So then I say look, the caller ID shows you're calling from a toll-free number and that's all it shows - I can't really verify if you're Google or not. I'll handle it. End the call.

    So then I sit down and look at that email that came in while I was on the phone. It was an authorization code to add my account as a recovery to somebody else's account.

    I'm guessing the next steps would have involved me giving that code to add my account as a recovery to somebody else's account (4/?)

  • So then I say look, the caller ID shows you're calling from a toll-free number and that's all it shows - I can't really verify if you're Google or not. I'll handle it. End the call.

    So then I sit down and look at that email that came in while I was on the phone. It was an authorization code to add my account as a recovery to somebody else's account.

    I'm guessing the next steps would have involved me giving that code to add my account as a recovery to somebody else's account (4/?)

    Dude had my phone number, my name, sounded really nice and everything. Spoke professionally, no crackly audio from being in a cheap data center, nothing.

    But also - since when does Google call you? And over trying to add a recovery address? The email itself says "if this doesn't look familiar just ignore it."

    Scary stuff.

  • oblomov@sociale.networkundefined oblomov@sociale.network shared this topic on

Gli ultimi otto messaggi ricevuti dalla Federazione
Post suggeriti
  • 0 Votes
    1 Posts
    7 Views
    Why #ICE Can #Kill With ImpunityOver the past decade, US #immigration agents have shot and killed more than two dozen people. Not a single agent appears to have faced #criminal charges.#ice #security #rights #Trump https://www.wired.com/story/why-ice-can-kill-with-impunity/
  • 0 Votes
    1 Posts
    4 Views
    In 2025, the German #BSI launched the Year of #Email #Security recommending Tuta Mail.🇩🇪 ❤️In 2026, we call for a year on end-to-end encryption in email - so they stop recommending Gmail & Co as well. 🔒 #privacy #security
  • 0 Votes
    1 Posts
    6 Views
    The "Bluetooth Headphone Jacking" talk at #39c3 was awesome, too. They reversed a popular SOC that powers Bluetooth earbuds and headphones.They found that (even without being paired to the headphone), they could dump flash and RAM from the device. Then they dumped a bunch of info from the device - e.g. the #Bluetooth address and "master" encryption keys used for the communication with paired devices (e.g. a #phone).Then they impersonated the headphone from their laptop and connected to the phone (pretending to be the headphone).The headphone (or the laptop impersonating the phone) has permissions to do some things on the phone, e.g. accept calls, increase/decrease volume, etc.Then they started recovering access a #WhatsApp account via some account recovery mechanisms. That required some one-time security key which would normally be delivered via SMS, but that could be delivered via phone call as a fallback option, too. Since the phone thought it was connected to the Bluetooth headphone, phone call audio would go to the laptop via Bluetooth.As the cherry on top, they escalated into the victim's #Amazon account.Scary shit. #YouCannotBeParanoidEnough #security
  • 0 Votes
    1 Posts
    11 Views
    ⚠️ Do not be HACKED !! 😱Software updates include not only new features but also critical security fixes. To keep your site secure and stable, ensure you always use the latest version.We frequently observe numerous sites across the Fediverse running very outdated versions of Mastodon or Misskey. Some sites are even using versions over a year old.Be the smart administrator and keep your site up to date.#Mastodon #Misskey #Fediverse #ActivityPub #PixelFed #PeerTube #InfoSec #Security