Someone on #NFT spaces asked me about other ways threat actors can gain more user Intel without computer or phone.. Besides Christmas lights? Some toys that have bluetooth can be comprised and threat actors can use to spy or listen in on some conversations..
👇
1. Fisher-Price Chatter bluetooth has no secure pairing process. Threat Actors can exploit this in an audio bug.
2. "My Friend Cayla" bluetooth also has similar issues.
3. Twinkly Lights:
A threat actor on the network can intercept the comms between the Twinkly lights and the mobile app and use them to manipulate the LEDs into custom patterns or turn them off.
Prevent?
When you're done playing with them - turn off bluetooth. #NFT#NFTs#NFTCommunity
• • •
Missing some Tweet in this thread? You can try to
force a refresh
1. The difference between different phishing techniques:
1. phishing: community 2. spear phishing: targeted members of the community
3. whaling: brand owner 4. vishing: by phone 5. smishing: send messages by text 6. Angler phishing: sending direct message within social media 7. Pharming: malicious actors hijack a Domain Name Server (DNS), the server that translates URLs from natural language into IP addresses
8. Evil Twin: fake WiFi hotspot, often making it look legitimate, that might intercept data during transfer. 9. Watering hole phishing: threat actors research around the websites a brands employees visit often, then infecting the IP address with malicious code or downloads.