<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Tactics &#8211; phishandchips.io</title>
	<atom:link href="https://phishandchips.io/tag/tactics/feed/" rel="self" type="application/rss+xml" />
	<link>https://phishandchips.io</link>
	<description>Discussing cybersecurity one byte at a time.</description>
	<lastBuildDate>Mon, 18 Sep 2023 17:28:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://phishandchips.io/wp-content/uploads/2023/09/cropped-phishandchips.io_-32x32.png</url>
	<title>Tactics &#8211; phishandchips.io</title>
	<link>https://phishandchips.io</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">223541256</site>	<item>
		<title>Where Do Email Lists Come From?</title>
		<link>https://phishandchips.io/where-do-email-lists-come-from/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 18 Sep 2023 13:34:45 +0000</pubDate>
				<category><![CDATA[Target Selection]]></category>
		<category><![CDATA[Tactics]]></category>
		<guid isPermaLink="false">https://phishandchips.io/?p=503</guid>

					<description><![CDATA[Email lists used for spam and phishing campaigns are sourced from a variety of locations, with each source having its unique method of acquisition and challenges associated with them. These lists, often comprising of thousands or even millions of email addresses, provide the essential contacts for phishing expeditions. The DarkWeb The most apparent source of [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Email lists used for spam and phishing campaigns are sourced from a variety of locations, with each source having its unique method of acquisition and challenges associated with them. These lists, often comprising of thousands or even millions of email addresses, provide the essential contacts for phishing expeditions.</p>



<ul class="wp-block-list">
<li><a href="#darkweb">The DarkWeb</a></li>



<li><a href="#social-media">Social Media</a></li>



<li><a href="#harvesting">Harvesting</a></li>



<li><a href="#volunteer">Volunteer to be Phished</a></li>



<li><a href="#buying-lists">Buying Email Lists</a></li>
</ul>



<h3 class="wp-block-heading" id="darkweb">The DarkWeb</h3>



<p>The most apparent source of these email lists is through data dumps from previous security breaches, which are often found on the DarkWeb. The DarkWeb, a part of the internet not indexed by search engines and accessible only with special software, is a haven for cybercriminals. After successful breaches of a website or company&#8217;s database, data is either sold or just dumped on this part of the web. This data typically includes names, email addresses, passwords, and other sensitive personal information, which can be used for spamming or phishing purposes. </p>



<p><a href="https://tb-manual.torproject.org/about/" data-type="link" data-id="https://tb-manual.torproject.org/about/">About the Tor Browser</a></p>



<h3 class="wp-block-heading" id="social-media">Social Media &amp; Public Info</h3>



<p>Apart from the DarkWeb, another primary source includes social media platforms, where people often publicly share their contact information. Enterprising users can often manually scrape these sites or use automated scraping bots to compile extensive lists of email addresses. </p>



<p>Scraping can even be accomplished with a browser extension see <a href="https://chrome.google.com/webstore/detail/email-extractor/jdianbbpnakhcmfkcckaboohfgnngfcc" data-type="link" data-id="https://chrome.google.com/webstore/detail/email-extractor/jdianbbpnakhcmfkcckaboohfgnngfcc">Email Extractor</a> (chrome).</p>



<h3 class="wp-block-heading" id="harvesting">Harvesting</h3>



<p>Harvesting involves setting-up fake websites or landing pages that appear legitimate but are designed solely to capture email addresses from unsuspecting visitors. </p>



<p>Online gaming sites and registration forms for various online services are common places where individuals inadvertently offer up their email addresses or use OAuth to pass identity and contact scopes to the authorized application.</p>



<div class="wp-block-group has-black-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-95730b41 wp-block-group-is-layout-constrained" style="padding-top:0;padding-bottom:0">

<div class="codecolorer-container php blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="php codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;"><span style="color: #000088;">$fb</span> <span style="color: #339933;">=</span> <span style="color: #000000; font-weight: bold;">new</span> Facebook\Facebook<span style="color: #009900;">&#40;</span><span style="color: #009900;">&#91;</span><br />
&nbsp; &nbsp; <span style="color: #0000ff;">'app_id'</span> <span style="color: #339933;">=&gt;</span> <span style="color: #0000ff;">'{app-id}'</span><span style="color: #339933;">,</span><br />
&nbsp; &nbsp; <span style="color: #0000ff;">'app_secret'</span> <span style="color: #339933;">=&gt;</span> <span style="color: #0000ff;">'{app-secret}'</span><span style="color: #339933;">,</span><br />
&nbsp; &nbsp; <span style="color: #0000ff;">'default_graph_version'</span> <span style="color: #339933;">=&gt;</span> <span style="color: #0000ff;">'v3.2'</span><span style="color: #339933;">,</span><br />
<span style="color: #009900;">&#93;</span><span style="color: #009900;">&#41;</span><span style="color: #339933;">;</span><br />
<span style="color: #000088;">$response</span> <span style="color: #339933;">=</span> <span style="color: #000088;">$fb</span><span style="color: #339933;">-&gt;</span><span style="color: #004000;">get</span><span style="color: #009900;">&#40;</span><span style="color: #0000ff;">'/me?fields=email'</span><span style="color: #339933;">,</span> <span style="color: #0000ff;">'{access-token}'</span><span style="color: #009900;">&#41;</span><span style="color: #339933;">;</span></div></div>




<p class="has-small-font-size" style="padding-top:0px;padding-right:var(--wp--preset--spacing--30);padding-bottom:0px;padding-left:var(--wp--preset--spacing--30)">Sample OAuth that pulls email address scope</p>
</div>



<p>Some unscrupulous social networks or websites may sell their customer&#8217;s information to third parties, which may end up in the hands of spammers and phishers. </p>



<h3 class="wp-block-heading" id="volunteer">Volunteer to be Phished</h3>



<p>Some individuals willingly or unknowingly volunteer their email addresses for phishing or spam campaigns. Simulated phishing campaigns staged by your organization&#8217;s information security office are a common awareness &amp; training tactic. In other cases, people might willingly sign up for services or newsletters without thoroughly understanding how their email addresses will be used. </p>



<p>See our list of phishing services.</p>



<h3 class="wp-block-heading" id="buying-lists">Buying Email Lists</h3>



<p>For those looking for a more straightforward approach, email lists can be purchased from various sources. These sources may include marketing agencies, data brokers (e.g. <a href="https://zoominfo.com" data-type="link" data-id="https://zoominfo.com">B2B directories</a>), or shady online marketplaces. While buying email lists might seem like a convenient shortcut for spammers, it comes with significant challenges. Most notably, the practice often violates regulations such as the <a href="https://www.ftc.gov/business-guidance/resources/can-spam-act-compliance-guide-business" data-type="link" data-id="https://www.ftc.gov/business-guidance/resources/can-spam-act-compliance-guide-business">CAN-SPAM</a> Act in the United States and similar laws worldwide. Furthermore, purchased lists may contain outdated or inaccurate information, resulting in a low success rate for phishing campaigns.</p>



<p class="has-text-align-center">What&#8217;s next?</p>



<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<p class="has-text-align-center">Related Topics</p>



<div class="wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex">
<div class="wp-block-button is-style-outline inter-section is-style-outline--1"><a class="wp-block-button__link has-secondary-color has-text-color wp-element-button" href="https://phishandchips.io/category/framework/target-selection/">Target Selection</a></div>
</div>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<p class="has-text-align-center">Next Topic</p>



<div class="wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex">
<div class="wp-block-button is-style-outline inter-section is-style-outline--2"><a class="wp-block-button__link has-secondary-color has-text-color has-text-align-center wp-element-button" href="https://phishandchips.io/category/framework/social-engineering/">Social Engineering</a></div>
</div>
</div>
</div>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">503</post-id>	</item>
		<item>
		<title>Financial Aid Refund Scam</title>
		<link>https://phishandchips.io/financial-aid-refund-scam/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 16 Sep 2023 17:32:21 +0000</pubDate>
				<category><![CDATA[Tacklebox]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Tactics]]></category>
		<guid isPermaLink="false">https://phishandchips.io/financial-aid-refund-scam/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">210</post-id>	</item>
		<item>
		<title>Messages from HR</title>
		<link>https://phishandchips.io/messages-from-hr/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 16 Sep 2023 17:32:21 +0000</pubDate>
				<category><![CDATA[Tacklebox]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Tactics]]></category>
		<guid isPermaLink="false">https://phishandchips.io/messages-from-hr/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">211</post-id>	</item>
		<item>
		<title>Are you Busy?</title>
		<link>https://phishandchips.io/are-you-busy/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 16 Sep 2023 17:32:21 +0000</pubDate>
				<category><![CDATA[Tacklebox]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Tactics]]></category>
		<guid isPermaLink="false">https://phishandchips.io/are-you-busy/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">212</post-id>	</item>
		<item>
		<title>Webcam Exploitation Ransom</title>
		<link>https://phishandchips.io/webcam-exploitation-ransom/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 16 Sep 2023 17:32:21 +0000</pubDate>
				<category><![CDATA[Tacklebox]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Tactics]]></category>
		<guid isPermaLink="false">https://phishandchips.io/webcam-exploitation-ransom/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">213</post-id>	</item>
		<item>
		<title>Phishing with Forms</title>
		<link>https://phishandchips.io/phishing-with-forms/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 16 Sep 2023 17:32:21 +0000</pubDate>
				<category><![CDATA[Tacklebox]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Tactics]]></category>
		<guid isPermaLink="false">https://phishandchips.io/phishing-with-forms/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">214</post-id>	</item>
		<item>
		<title>Dating Scam</title>
		<link>https://phishandchips.io/dating-scam/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 16 Sep 2023 17:32:20 +0000</pubDate>
				<category><![CDATA[Tacklebox]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Tactics]]></category>
		<guid isPermaLink="false">https://phishandchips.io/dating-scam/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">218</post-id>	</item>
		<item>
		<title>COVID-19 Scams</title>
		<link>https://phishandchips.io/covid-19-scams/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 16 Sep 2023 17:32:20 +0000</pubDate>
				<category><![CDATA[Tacklebox]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Tactics]]></category>
		<guid isPermaLink="false">https://phishandchips.io/covid-19-scams/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">205</post-id>	</item>
		<item>
		<title>Invoice Phishing</title>
		<link>https://phishandchips.io/invoice-phishing/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 16 Sep 2023 17:32:20 +0000</pubDate>
				<category><![CDATA[Tacklebox]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Tactics]]></category>
		<guid isPermaLink="false">https://phishandchips.io/invoice-phishing/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">206</post-id>	</item>
		<item>
		<title>Remote Work Phish</title>
		<link>https://phishandchips.io/remote-work-phish/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 16 Sep 2023 17:32:20 +0000</pubDate>
				<category><![CDATA[Tacklebox]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Tactics]]></category>
		<guid isPermaLink="false">https://phishandchips.io/remote-work-phish/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">207</post-id>	</item>
	</channel>
</rss>
