A report by iSight Partners found a network of fake personas being used to create connections with the attackers targets via social media platforms like Facebook, LinkedIn and Twitter. Many of these personas were extremely well developed and their social media activity included active endorsements and social networking connections. The attackers build a level of trust with their targets and, over time, collect information from those targets while building familiarity and trust. They then use that information to socially engineer the targets to unknowingly give up their login credentials to sites like Google or Yahoo, but also sensitive accounts.”]
Source: https://www.csoonline.com/article/2310804/what-s-old-is-new-again.html

