That let us establish a baseline for several locations and see if there were any active attacks in those areas.

The honeyprofiles were created with specific areas of potential interest: medical admins near hospitals, military personnel near bases, etc.

how to start a phone dating business-6

We also employed a few house rules for our research—play hard to get, but be open-minded: The goal was to familiarize ourselves to the quirks of each online dating network.

We also set up profiles that, while looking as genuine as possible, would not overly appeal to normal users but entice attackers based on the profile’s profession.

Conversely, we were able to find a given profile’s corresponding identity outside the online dating network through classic Open Source Intelligence (OSINT) profiling. Many were just too eager to share more sensitive information than necessary (a goldmine for attackers).

In fact, there’s even a previous research that triangulated people’s exact positions in real time based on their phone’s dating apps.

They could also use an exploit kit, but since most use dating apps on mobile devices, this is somewhat more difficult.

Once the target is compromised, the attacker can attempt to hijack more machines with the endgame of accessing the victim’s professional life and their company’s network.People are increasingly taking to online dating to find relationships—but can they be used to attack a business?The kind (and amount) of information divulged—about the users themselves, the places they work, visit or live—are not only useful for people looking for a date, but also to attackers who leverage this information to gain a foothold into your organization.They arrived just fine and weren’t flagged as malicious.With a little bit of social engineering, it’s easy enough to dupe the user into clicking on a link.We then created profiles in various industries across different regions.