📜 ⬆️ ⬇️

Spam indestructible

What kind of perverted methods people do not come up with in order to push others into a trojan or virus. Previously, there were jokes in the style of "I'm a pretty girl, here are my depraved pictures." But this is, apparently, passed stage.

I get a message today on icq:

"Hello! Do you do php programming?
If yes, then I have an interesting mutually beneficial offer for you. ”
')

Considering that I have mentioned php in the icq questionnaire, plus I am registered on the freelance website, and my previous customer could recommend, I don’t see any trick yet and answer:
“Yes, I do, although now I don’t have a lot of free time. nevertheless - what is the offer? ”

The answer came immediately:

“There is a program for solving SUDOKU, I would like to duplicate its algorithm in php. 500 dollars"

"Now the program itself has been released"

Here they are trying to send me a file weighing 23 kilobytes with the name “photo_archive.exe”. Honestly, I did not immediately look at the name, but the expansion confused me:

"Uh ... and this is definitely not a trojan?"

To which I am answered, “Are you a programmer and not a clown?” And again they are trying to send the same file but already with the name “su_415.exe” and the question “Do you accept?”

After my answer
“Let's no jokes. you are without any contracts, assignments, etc. send me an exe file called photo_archive, then rename it to su_415, and then call me a clown? thanks, exe files I do not need "
comrade no longer wrote.

Here is a story. And you say, modern technologies, recognition systems, artificial intelligence ... Social engineering always rules, drives and will steer. Be careful.

Source: https://habr.com/ru/post/11996/


All Articles