Computer Viruses/Malware in the form of rouge software, such as fake-anti virus programs that look real and tell the victim to pay money for the program in order to delete the many viruses on their pc. Other social networking viruses are distributed vial emails and intriguing attachments, especially if they are sent from hacked friend’s account.
Phishing in the form of pop-up windows and fake websites
Voice/IP/CallerID Spoofing using a well known or familiar voice or caller ID in order to gain instant trust.
Leaving a flash drive containing malicious code in a public place, such as a hallway, bathroom, office floor, etc. Human nature is curious and many people will insert the flash drive to see what’s on it. especially if it has a label such as “financials,” or “contracts.”
Careless people will through away sensitive material in the garbage. There has been a lot of important and private information gathered form simply digging through the garbage.
Secure passwords, PIN numbers, and personal information can easily be found by people looking over your shoulder. Many people are not aware that others are watching them or simply don’t secure their environments enough to prevent it from happening.
The attacks can be technology based or human based, and so can the payloads. The malicious scripts placed on computers as a result of a successful social networking attack can take the form of: Rootkits, Backdoors, Keyloggers, Worms, and other Viruses that pass information from the victim to the attacker, many of them even giving the attacker direct access and admin rights of the victim’s computer. Human type payloads can be access to private or locked down environments, direct information gathering form the target, and simply the trust of victim, which can lead to the attacker getting quite a bit of information.