Zheng’s Datang Coin Ponzi Scheme

Charlie Shrem, age 11, invests early and makes millions in Bitcoin! Dave Carlson makes $8 million per month in Bitcoin! Inspired by these and other true-life stories, some have felt that with the right timing, they too can get in early and become the next cryptocurrency millionaire. After all, if an 11-year-old can do it, how difficult can it be? For thousands of people in northwestern China…

SEVillage at DerbyCon

  DerbyCon is one of our favorite places. In the past 4 years we have been the place to go for all things social engineering at DerbyCon. And for the fourth year in a row we will be again holding an entire SEVillage at DerbyCon! This will include not only the old favorite "Can you beat the polygraph?" but we will be bringing back Mission SE Impossible. And for the first time ever,…

I Spy With My Little EyePyramid: Siblings Phish Italy

In recent news, Italian siblings 45-year-old Giulio Occhionero and his 47-year-old sister Francesca Maria Occhionero were arrested for having installed malware on a major bank president’s system, 2 former prime ministers, a sitting mayor, a former deputy governor of the Bank of Italy and thousands more. While many of the details are still being questioned, one fact that has come out is that…

Fake It Till You Make It: Impersonation Attacks Ranging from Funny to Terrifying

People lie. It’s a fact of life. Recently at my 10 year reunion, I overheard people say they worked in everything from medicine to engineering, when I knew that these people worked in a big box retail store occasionally moving shelves and stocking meds. My wife lies to me every time I get excited about watching Star Wars, saying she is excited too and I’m totally not a nerd. Ok, that’s a lie… she…

SMiShing

At Social-Engineer, we define SMiShing as “the act of using mobile phone text messages, SMS (Short Message Service), to lure victims into immediate action. This action may include downloading mobile malware, visiting a malicious website, or calling a fraudulent phone number.” The word SMiShing comes from combining SMS, the technology behind texting with phishing, the practice of stealing…

Attack Vectors

What are attack vectors? They are the methods that adversaries use to breach or infiltrate networks. Malicious actors use a variety of attack vectors to compromise the security of individuals and organizations.  However, within this section we will outline the following four main categories: Phishing Pronounced just like fishing, phishing is the “practice of sending emails appearing to be from…

DEF CON 25 SECTF Rules and Registration

READ ALL OF THIS PAGE (that means every word on this page) BEFORE PROCEEDING – THE RULES ARE IMPORTANT! Synopsis: This truly unique event will challenge you and test your abilities to use social engineering skills to gather small amounts of data from unsuspecting companies over the phone. Each contestant will be assigned a target company.  Each contestant will be provided with flags, a sample…

Implicit Bias – Chances Are, You Have One

Here’s an oldie but a goodie. A man and his son are in a serious car accident and both are taken to the emergency room, unconscious. The boy is wheeled immediately into surgery. The surgeon takes one look at him and says, “I can’t operate on this child, he’s my son.” Who is the surgeon? When you decide on the answer, either congratulate yourself smugly or slap yourself on the forehead and…