this post was submitted on 16 Oct 2023
268 points (100.0% liked)
scams
666 readers
1 users here now
/c/Scams on Lemmy.one is an anti-scam discussion and advice community oriented towards helping educate people about common scams.
Rules
-
No personal information of any kind, including last names, addresses, and phone numbers.
-
No personal army requests.
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Shouldn't be that risky, browser exploits are rare nowadays. They'll get your IP but there isn't much a scammer can do with that especially if it's a mobile data IP.
How would they do that? The url in the OP is just a short domain, it doesn't have a tracking code. They aren't going to register individual domains for every potential mark.
I can think of at least 2 ways to make it useful.
First, you're most likely to click the link within a few seconds or minutes of receiving it. So, you send out the link to one number, and wait 5 minutes before sending it to another number. If you get a hit on that domain, there is a very good chance it was the last number that converted into a click. You'll get some false positives conversions, yes. But at the end of your campaign, you have a very good list of people known to quickly click through.
Second, you don't necessarily need a 1-to-1 correlation. You might just be trying to refine your target lists to find the numbers most likely to convert.
Say you have a large list of numbers to check for gullibility. You set them into groups of 100, and send all 100 to the same domain. Every time someone clicks through, you increase the rating of everyone in the group. So, 1 person in your first group clicks through, everyone in the group gets "1" added to their rating. 99 will be false positives, but this group is infinitely more valuable to you than a group of zeroes.
Repeat with a second group and a new domain: 20% click through, everyone in this group gets "20" added to their rating. This list is 20 times more valuable than the first, even though 80% of them are a false positive.
Once you've gone through your entire list, drop all the zeroes, subtract 1 from every score, rinse and repeat.
After just a few repetitions, you have a high quality list, very rich in potential targets.
I don't think the timing attack method would work very well since they probably have thousands of numbers to go through. The other one, I guess, but it seems like a lot of effort to find out who is slightly more likely to click things when they could have included a tracking code instead (or, like what they did, requested a reply text in addition to going to the link). I think it probably isn't that risky to just look at the website.
RCS chat at the top already proved the number is real to the spammer who sent it. Otherwise, RCS straight up fails with a client side message it can't be sent/delivered. In which case the client would retry as a basic text on prompt.
Didn't all major browsers recently push an urgent update due to a browser exploit?
Probably, but my understanding is that knowledge of exploits pre-patch is very valuable and difficult to come by, and the more systems the hack is used on the faster it gets patched. For that reason these are only really used in high value and targeted attacks, and not so much broad net phishing campaigns.