I have no interest in being malicious. I keep in mind that every so often you really do have a literal slave chained to a desk in a warehouse basement. Anything I did physically could result in serious harm to those people.
Normally I’m nowhere near a computer when I drag these people on. Those conversations can last for 30 minutes or more before they figure out I’m not going to actually download the remote access software. At the same time it’s so easy. Most of the remote software these scammers use have two way communication. And most aren’t smart enough to turn it off properly. I do a lot of bug hunting so I’m running in Ice Box to begin with. It takes about 30 seconds to load up a VM and fire up the internet. Help yourself to my 100% isolated fake machine! But even more fun is firing up a second shared VM and piggybacking the connection to wander around and explore. The best laugh I got in a public setting toying with a caller was when I found his cell phone was connected. “Your wife [name] is beautiful.” Maybe I should call her at [number] and ask her out. I’m obviously smarter than you since you left your phone connected and I’m reading your contacts and messages. I think she’ll leave you. That didn’t go over so well. :#
_________________ 42 6F 61 72 64 73 6F 72 74 2E 63 6F 6D
|