Skip to main content

Hacking Humans: Meta's Fraudulent Ads, BYOU Supply Chain Attacks, and Ghost Tapping Scams

N2K NetworksNovember 12, 202551 min260 views
33 connections·40 entities in this video

Meta's Fraudulent Ad Revenue

  • 📈 Meta's internal documents reveal that the company projects up to 10% of its 2024 revenue, amounting to billions, will come from fraudulent or banned ads.
  • ⚠️ Despite classifying an estimated 15 billion ads daily as high-risk, Meta reportedly raises ad rates for suspicious advertisers rather than removing them outright, effectively acting as a "fraud tax."
  • 💰 In 2024, Meta is estimated to have made around $16 billion from these high-risk ads, representing about 10% of its total revenue.
  • ⚖️ Regulators, including the SEC, are investigating Meta's role in financial scams, with UK regulators finding Meta accounts for over half of payment-related scam losses.

BYOU Supply Chain Risk in Windows Updaters

  • 🧩 The Howler Cell team at Cyderes identified a systemic risk dubbed "Bring Your Own Updates" (BYOU), allowing attackers to hijack trusted update clients.
  • 💻 Attackers can abuse legitimate update processes, like those using Advanced Installer, to deliver malicious code that bypasses security controls due to signed binaries and trusted paths.
  • ⚠️ A vulnerability in Advanced Installer 22.7 allowed unsigned update packages to be accepted by default, enabling attackers to point updaters to malicious payloads.
  • 🔒 While Advanced Installer offers an opt-in mitigation to install only digitally signed packages, many deployments do not enable this, leaving them vulnerable.
  • 🏢 This attack vector can lead to widespread supply chain poisoning, affecting numerous corporate customers through compromised updaters or poisoned packages.

Ghost Tapping and Tap-to-Pay Scams

  • 💳 A new scam called "ghost tapping" uses near-field communication (NFC) devices to secretly charge tap-to-pay cards and mobile wallets in crowded places.
  • 💸 Victims often don't notice small, unauthorized withdrawals until they accumulate, prompting warnings from the BBB.
  • 📡 Attackers use RFID readers that emit a field to power and read cards, potentially charging them at a distance, though modern tokenization prevents direct card detail theft.
  • 🛡️ Protective measures include using RFID-blocking wallets, verifying charges before tapping, setting up instant transaction alerts, and being cautious in crowded areas.

Tap-to-Pay Venue Experience

  • 📍 At a recent cybersecurity conference, seats in an auditorium featured "tap your phone here" labels with NFC symbols, but lacked clear instructions.
  • ❓ Tapping the phone triggered an alert to connect to a venue service, likely for ordering food or drinks, but without payment information, the connection was not completed.
  • 🤔 The lack of clear messaging for the NFC tap points caused confusion and concern among attendees, highlighting the importance of user-friendly and informative technology deployment.

Catch of the Day: Council of the Ecliptic

  • ✉️ An email invitation to the "Council of the Ecliptic" offers membership based on observed ambition, discretion, and resolve, promising access to council, knowledge, and a secret community.
  • 🤫 The invitation emphasizes strict secrecy, mutual aid, and a commitment to the circle's code, with a requirement to reply "yes" to proceed.
  • 🌌 The "ecliptic" refers to the apparent path of the sun, moon, and planets through the sky, associated with zodiac signs.
  • 🕵️ The mysterious nature of the invitation, reminiscent of secret societies or even the Zodiac Killer, prompts curiosity about its true purpose and potential membership fees.
Knowledge graph40 entities · 33 connections

How they connect

An interactive map of every person, idea, and reference from this conversation. Hover to trace connections, click to explore.

Hover · drag to explore
40 entities
Chapters5 moments

Key Moments

Transcript190 segments

Full Transcript

Topics15 themes

What’s Discussed

MetaFraudulent AdsSupply Chain AttacksWindows UpdatersAdvanced InstallerBYOU AttackGhost TappingTap-to-PayNFCRFIDSocial EngineeringPhishingCybersecurityCouncil of the EclipticCouncil of the Ecliptic Invitation
Smart Objects40 · 33 links
Companies· 8
People· 2
Concepts· 27
Products· 2
Media· 1