• sugar_in_your_tea@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    11
    ·
    4 days ago

    Exactly. Many breaches follow this pattern:

    1. Learn the name and some basic details about the secretary or something
    2. Call corporate tech support asking for a password reset claiming to be the secretary
    3. Access important stuff since secretaries have a surprising amount of access

    Replace “secretary” with some other relevant individual who has a surprising amount of access and wouldn’t attract attention.