Senior dating practices
They could also use an exploit kit, but since most use dating apps on mobile devices, this is somewhat more difficult.Once the target is compromised, the attacker can attempt to hijack more machines with the endgame of accessing the victim’s professional life and their company’s network.Indeed, such attacks are feasible—but do they actually happen? Targeted attacks on the Israeli army early this year used provocative social network profiles as entry points.Romance scams are also nothing new—but how much of these are done on online dating networks?This isn’t to say though that this couldn’t happen or isn’t happening—we know that it’s technically (and definitely) possible.
We also set up profiles that, while looking as genuine as possible, would not overly appeal to normal users but entice attackers based on the profile’s profession.
We further explored by setting up “honeyprofiles”, or honeypots in the form of fake accounts.
We narrowed the scope of our research down to Tinder, Plenty of Fish, OKCupid, and Jdate, which we selected because of the amount of personal information shown, the kind of interaction that transpires, and the lack of initial fees.
With the ability to locate a target and link them back to a real identity, all the attacker needs to do is to exploit them.
We gauged this by sending messages between our test accounts with links to known bad sites.