reddit General

Why call it a "security incident" instead of a security breach or anything else? The former makes it sound like "consent incident" , which makes it way funnier.

Sperging and autism below:
Probably because the post was written by a tranny and they cannot take an L, that would crush their already fragile ego and make them commit 41%. They have to frame it as "opssie, we did a fucky wucky. It was totally not our fault that some of us fell for a phishing scam".
You should have picked up on that from the "Here's what we know". I'm surprised it didn't add why this is "problematic".

These troons literally cannot write anything without using globohomo media/tech oligarchy phrasing. No doubt because they aren't particularly intelligent to begin with and can only form statements from what they've consoomed.
 
apparently the hackers cloned reddit's corporate intranet login portal and got the phish-ee to sign in to that somehow. the bigger question in my mind is how they even had access to the intranet in the first place to copy it properly, seems like at least a partial inside job.
All they need is the link to the corporate sign-in, so they could copy the html.
The only problem with this is that the employee would know right away that they were phished, because the fake site wouldn't function properly like the corporate site would.
This is why the employee was able to "self report" the phishing, probably right away.

I'm curious to know how they tricked this retard into clicking a link to the fake site.
They probably sent him an email pretending to be corporate or something, I would guess.
This really is not very sophisticated at all. Any retard could probably do it if reddit's cybersec is this bad.

Phishing attacks are primarily aimed at senile old boomers or people with DSP-level intellect.
Very embarrassing this worked on reddit staff with this level of security clearance.
I'm sure this person earned their position fairly.
 
Last edited:
Here's a pic of him from a previous reddit post posing as Rosie the riveter.

I'm assuming crystal is slang for crystal meth?
1675988315366.png

Ironically he isn't half the man my mother is. Also, that's not how you flex.
 
Can't believe 1,800 "people" are working for free. It must be hell for them to get a real job with the the amount of mental ill- I mean neurodivergency in the digital offices called Discord.
Not free. These are real employees.

Saw the number in a post about layoffs. I think it was from Business Insider, who is apparently subscription only so I can't screen shot it.
 
Why is everyone assuming it was trannies who did it, and not Pajeet who got an email saying "Click here for hot Singles on your area!"? Considering modern tech companies I would say it's at least a 50/50 chance. The fact it was administrative stuff leans strongly to Pajeet Shitting in the Street again.

The trannies are all unpaid forum jannies, not Admins.
 
Why call it a "security incident" instead of a security breach or anything else? The former makes it sound like "consent incident" , which makes it way funnier.

Probably because the post was written by a tranny and they cannot take an L, that would crush their already fragile ego and make them commit 41%. They have to frame it as "opssie, we did a fucky wucky. It was totally not our fault that some of us fell for a phishing scam".
I actually may be wrong here but I believe the formal terms in Cybersecurity are "Event" (there was activity but nothing was breached) and "Incident" (lol something bad actually happened).
 
All they need is the link to the corporate sign-in, so they could copy the html.
The only problem with this is that the employee would know right away that they were phished, because the fake site wouldn't function properly like the corporate site would.
This is why the employee was able to "self report" the phishing, probably right away.

I'm curious to know how they tricked this retard into clicking a link to the fake site.
They probably sent him an email pretending to be corporate or something, I would guess.
This really is not very sophisticated at all. Any retard could probably do it if reddit's cybersec is this bad.

Phishing attacks are primarily aimed at senile old boomers or people with DSP-level intellect.
Very embarrassing this worked on reddit staff with this level of security clearance.
I'm sure this person earned their position


The easiest way to hide a phishing dupe page is to have it forward intentionally incorrect login information to the actual login page and have the target redirected to the “we’re sorry but your password or username was incorrect, please try again.” Login page. You could have it forward the correct details to the actual login page, but that would potentially give away that there is a malicious third party. Sending a bunk login would make it appear as though someone attempted to brute force a login rather than phishing details.
 
All they need is the link to the corporate sign-in, so they could copy the html.
The only problem with this is that the employee would know right away that they were phished, because the fake site wouldn't function properly like the corporate site would.
This is why the employee was able to "self report" the phishing, probably right away.

I'm curious to know how they tricked this retard into clicking a link to the fake site.
They probably sent him an email pretending to be corporate or something, I would guess.
This really is not very sophisticated at all. Any retard could probably do it if reddit's cybersec is this bad.

Phishing attacks are primarily aimed at senile old boomers or people with DSP-level intellect.
Very embarrassing this worked on reddit staff with this level of security clearance.
I'm sure this person earned their position fairly.
In defense of Reddit...

These attacks are low effort, potentially high reward, and virtually free. They are used because they work, and no matter how good the cyber security of an organisation is, people are always a vulnerability that can be exploited.

People in governments, militaries, corporations fall for this shit on the daily.
 
Back