It Was Easy to Hack a Billionaire
Вставка
- Опубліковано 29 вер 2024
- For most Americans, the following rings true: We’re aware there’s risk online, but we don’t know what to do about it. We have no idea how they get in, how to stop them or what they can find once they’ve made it into our digital lives. To raise awareness around the risk Americans face online and encourage people to take proactive steps to protect themselves from cybercrime, Aura decided to chronicle a hack from start-to-finish. And who better to hack than our billionaire investor, Jeffrey Katzenberg.
Our CEO challenged Jeffrey to turn off his Aura app to see what happened. The hacker, Rachel Tobac, made it in with ease.
how did they even get the phone number in the first place considering that he's a billionaire his phone number is kept private
This video is a proof of concept. The concept that was being proved was that anyone can easily let down their guard and get hacked by ways of social engineering. This is also proof that social engineering can get you anyone's number. Like, maybe you can find the billionair's assistent/relatives' number... pretent to be them, then get the billionaire's phone number from them. There are also a lot of other ways to get anyone's number: OSINT, target someone from the phone company, go through their trash can, clone his voice through AI and ask his assistant, etc....
Easily found on data brokerage sites which they often use, but also all they need to do is find a company or friend/coworker who has the number and manipulate them into giving it out. Crazy stuff!
The difference between black hat vs white is about who wrong or right
Lol.. this is all scripted
This is an extremely excellent illustration of just how vulnerable executive leadership can be. Just shared with my CIO!
now you can actually clone anthony's voice with ai
I’m more concerned with how easy it is to hack the younger generation, cyber security agents, engineers , and the so called “I work in tech” people.
Soooooooo contrived.... you mean to tell me he didn't know exactly what he was clicking on? He was in the middle of an interview where he had asked to be hacked. And he just happened to have an (undisclosed and suspiciously convenient) serious vulnerability in is version of OSX/Safari? And he let the camera crews film him opening what should have been a *confidential* email? Gimme a break.
obviously its an add to educate people. But this shit happens every time
That’s the point when it’s unexpected or when you’re busy. Other social engineers have explained this, and she has other videos on doing this to other high profile people. She does this for a living after doing it live in Defcon and is a CEO of her own social engineering company that other companies hire her to do exactly this.
Point is you think it’s staged and no way it will happen to anyone or you, but it’s because of that mentality that people fall for it, just like this billionaire at the start.
Would Aura have been able to offer protection against this hack, or only from the damage that would occur after a hack takes place and someone is exploiting the stolen data/identity?
LOL "I don't click on any malicious link"
Gets a suspicious call "Check email and click on link"
"Hold on everybody, let me check my email and click on this link"
Gets hacked.
This is so impressive. Woah!
Nice i love aura products and hotspot Shield keep it up guys :)
Adam's ribs where's Eve the first 😂 not there yet just kidding she is. 😂fucking jokes
So did he get hacked by just clicking the link or logging into the cloud drive link they send him?
just clicking the link
@@arg3882 How does that work?
You know the difference between robot call vs scam likely
Do you need a certificate? Was Doug lowe right?
I'm white hat hacker that's how I would parent even with religion(s) 😊
I wouldn't mind talking to these people
There is always possibly a way they always try like it's a be like woohoo iI be like fuck you
Yo what's up fellow white hat hacker
And yes I #OppresssUSFraud and #OppressGlobalForeignAffairsFraud
That's not a good thing
That a black hat does that
Do you the difference between steganography vs evasion she does
I need a raspberry pi quality response report. Once I talk to some. You youtube has a video bug when video doesn't align with the video
So why are they saying the girl was the hacker, when Evan was doing all the technical work? 🤔 All she did was the same as any telephone scammer could do.
Look her up, she is quite well known and does do Pen-testing IRL plus runs her own business that is about cyber security. Rachel Tobac is her name.
Shes a social engineer. A good one