Fake vs. Taken-Over Accounts with Jason Kent and Will Glazier
Easy Prey20 Des 2023

Fake vs. Taken-Over Accounts with Jason Kent and Will Glazier

As we approach the next season, threat actors will be keeping a close eye on dating apps. These apps have become a prime target for threat actors due to the size of the market expanding to over 300 million users and the rich information stored in these apps.

Today's guests are Jason Kent and Will Glazier. Jason is a hacker-in-residence at Cequence Security. He has a diverse information security, networking, and IT background and a generous level of knowledge for most pieces of the IT spectrum including firewalls, security architecture, security controls, and security infrastructure.

Will Glazier is the Head of Threat Research at Cequence Security where they protect some of the world's largest brands from sophisticated bot attacks and threats against the public facing APIs. Will has a background in fraud abuse and prevention as well as building threat intelligence systems.

Show Notes:

  • [1:18] - Jason and Will share their backgrounds and current roles at Cequence Security.

  • [5:24] - As common as scams and fraud are, even Jason and Will have personal experience with them.

  • [7:39] - Dating app attacks are particularly hard because they prey on vulnerable people. There are so many cases, that there should not be shame around talking about it.

  • [9:32] - The first red flag is when someone you are talking to on a dating app tries to get you over to texting or another app.

  • [11:37] - In any given month, the amount of malicious API transactions that Cequence is blocking is in the billions.

  • [13:52] - Fake accounts are constantly made but not as heavily used as taken over accounts.

  • [16:08] - Scammers are now paying for premium accounts to appear more legitimate and the investment pays off when they scam someone.

  • [18:11] - There are tools people can buy to make all accounts look real through automation.

  • [19:29] - It is essential that people in a fraud department can trust the information and push it out to Cequence.

  • [22:04] - Some organizations will pay a ransom to decrease the time wasted and money lost. In their eyes, the money lost to pay the ransom isn't as much.

  • [26:11] - Margins are getting tighter for the bad guys.

  • [30:31] - The infrastructure that scammers use varies. There are some that are really well known at Cequence and some that are more difficult.

  • [32:51] - It is easier to take out one big player than to take out hundreds of small ones.

  • [36:03] - There are human and political pressures that make things more challenging for security.

  • [38:07] - Romance scammers are employing new tactics and switching them up.

  • [39:48] - If you put too much trust in the platform that it makes you trust the random person you're talking to, take a step back.

  • [42:40] - Take a look online for things that have been done by scammers historically, especially if you are new to dating apps.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:

Episoder(321)

Art Heists

Art Heists

The world of art theft looks glamorous in the movies, but the reality is far more complicated. From multi-million dollar forgery schemes to undercover FBI operations recovering stolen national treasur...

29 Apr 37min

The Power of Prediction

The Power of Prediction

We make predictions all the time including about the weather, about traffic, about what someone is going to say next. It feels natural, even rational. But when algorithms start making predictions abou...

22 Apr 39min

Privacy vs Reality

Privacy vs Reality

Online security advice often sounds simple until you actually try to follow it. Between password managers, privacy settings, and data brokers, protecting yourself can start to feel like a full-time jo...

15 Apr 58min

Wired to Trust

Wired to Trust

It's easy to think scams only work when someone misses something obvious. In reality, most of them don't look obvious at the start. They show up as normal situations with just enough friction to notic...

8 Apr 41min

Intimate Partner Fraud

Intimate Partner Fraud

Most scams leave a digital trail. A fake email, a spoofed number, a fraudulent website. You can trace them, report them, sometimes even reverse them. But what happens when the scam has no digital trai...

1 Apr 45min

Identity without Passwords

Identity without Passwords

Every day, employees at hotels, restaurants, and resorts across the country are doing exactly what they were hired to do: being warm, responsive, and eager to help. It's what makes hospitality work. I...

25 Mar 38min

When Cybercrime Gets Personal

When Cybercrime Gets Personal

Most security breaches don't begin with sophisticated code or elaborate technical exploits. They begin with a phone call, a convincing email, or someone at a help desk who just wanted to be helpful. T...

18 Mar 45min

Stopping Phone Scams

Stopping Phone Scams

Phone scams get dismissed as background noise or just annoying interruptions and unknown numbers with robotic voices we learn to ignore. But behind that noise is an industry built on psychology, autom...

11 Mar 45min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
aftenpodden-usa
forklart
popradet
stopp-verden
fotballpodden-2
rss-gukild-johaug
lydartikler-fra-aftenposten
nokon-ma-ga
det-store-bildet
hanna-de-heldige
dine-penger-pengeradet
rss-ness
rss-espen-lee-usensurert
aftenbla-bla
e24-podden
rss-dannet-uten-piano
rss-penger-polser-og-politikk
frokostshowet-pa-p5