Jump to content

Is hacking a fiverr account even possible, after you have followed all the security measures. The answer is NO?


phantompower

Recommended Posts

So I was just sitting in front of my computer wondering what it would take for someone to “hack” your account then proceed to withdraw your money.
Knowing your password – Well for this someone could use a keylogger but any decent anti virus automatically detects it.
Lets assume they already got your password. Now they need to click on withdraw then also magically know your email you withdraw with and the password. The email I use to log into fiverr is different from my paypal email.
Lets assume they know all my email passwords. Well then gmail would ask them to verify their identity since they are trying to access in a different computer or phone. To verify the identity they would need to have my phone number and my phone and my security key question and answer.
OK. Well what if they change the email associated with fiverr? Then they would have to verify it through the email verification sent to my email address that they can’t login because they don’t have me.

Bottom line is that the people who claim that their accounts have been hacked and all the money withdrawn to a different account are somewhat lying. Their accounts most likely were milked dry by someone a family member who has access to all of their info.

Link to comment
Share on other sites

So I was just sitting in front of my computer wondering what it would take for someone to “hack” your account then proceed to withdraw your money.

Knowing your password – Well for this someone could use a keylogger but any decent anti virus automatically detects it.

Lets assume they already got your password. Now they need to click on withdraw then also magically know your email you withdraw with and the password. The email I use to log into fiverr is different from my paypal email.

Lets assume they know all my email passwords. Well then gmail would ask them to verify their identity since they are trying to access in a different computer or phone. To verify the identity they would need to have my phone number and my phone and my security key question and answer.

OK. Well what if they change the email associated with fiverr? Then they would have to verify it through the email verification sent to my email address that they can’t login because they don’t have me.

Bottom line is that the people who claim that their accounts have been hacked and all the money withdrawn to a different account are somewhat lying. Their accounts most likely were milked dry by someone a family member who has access to all of their info.

Lets assume they already got your password. Now they need to click on withdraw then also magically know your email you withdraw with and the password.

If they know your fiverr password couldn’t they change that when they access your account?

And also could they change the email the notifications go to? And the Paypal address?

As I recall, someone was saying that happened to them recently, and then the password was changed back to the original one, or at least that’s what it sounded like.

I think that seller also said that he had the money returned to his account by fiverr.

Link to comment
Share on other sites

Lets assume they already got your password. Now they need to click on withdraw then also magically know your email you withdraw with and the password.

If they know your fiverr password couldn’t they change that when they access your account?

And also could they change the email the notifications go to? And the Paypal address?

As I recall, someone was saying that happened to them recently, and then the password was changed back to the original one, or at least that’s what it sounded like.

I think that seller also said that he had the money returned to his account by fiverr.

In order to changer your password they need your security question and answer. In order to change your email they need to have access to the email address to click on the verification sent by fiverr.

Link to comment
Share on other sites

In order to changer your password they need your security question and answer. In order to change your email they need to have access to the email address to click on the verification sent by fiverr.

Also, if you fail to enter the correct password 3️⃣ times, Fiverr automatically locks your account until you contact Customer Support.

Link to comment
Share on other sites

Also, if you fail to enter the correct password 3️⃣ times, Fiverr automatically locks your account until you contact Customer Support.

Also if they click on “I forgot” for the the security answer, they are prompted to contact Support and go through a simple yet very hard to beat verification process.

Link to comment
Share on other sites

Actually, I think it is possible. All you need is a good phishing email and to target someone a bit on the slow side. In fact, if i was an evil man, I reckon I’d be a super scammer. Within a year I’d have Indian fake Microsoft tech support and Nigerian 419 scammers traveling thousands of miles to prostrate themselves before me in worship.

Sadly, although I can make plans to be super bad when it comes to the execution, I feel God and my dead Nan watching me. Get me a celestial restraining order and I’ll rule the world. Until then, I’ll just have to make do with living on my sofa surrounded by empty jars of peanut butter.

Link to comment
Share on other sites

Actually, I think it is possible. All you need is a good phishing email and to target someone a bit on the slow side. In fact, if i was an evil man, I reckon I’d be a super scammer. Within a year I’d have Indian fake Microsoft tech support and Nigerian 419 scammers traveling thousands of miles to prostrate themselves before me in worship.

Sadly, although I can make plans to be super bad when it comes to the execution, I feel God and my dead Nan watching me. Get me a celestial restraining order and I’ll rule the world. Until then, I’ll just have to make do with living on my sofa surrounded by empty jars of peanut butter.

Did you read anything below the title?? Once you get a good phishing email how will you verify any of my info? Lets say gmail asks you for my phone number then send a one time password to the number. What then? As for the nigerians and indians worshipping, I have no comment.

Link to comment
Share on other sites

Actually, I think it is possible. All you need is a good phishing email and to target someone a bit on the slow side. In fact, if i was an evil man, I reckon I’d be a super scammer. Within a year I’d have Indian fake Microsoft tech support and Nigerian 419 scammers traveling thousands of miles to prostrate themselves before me in worship.

Sadly, although I can make plans to be super bad when it comes to the execution, I feel God and my dead Nan watching me. Get me a celestial restraining order and I’ll rule the world. Until then, I’ll just have to make do with living on my sofa surrounded by empty jars of peanut butter.

peanut butter.

Creamy or Crunchy? :thinking:

Link to comment
Share on other sites

Did you read anything below the title?? Once you get a good phishing email how will you verify any of my info? Lets say gmail asks you for my phone number then send a one time password to the number. What then? As for the nigerians and indians worshipping, I have no comment.

If hacking and scamming wasn’t worth it, people wouldn’t try. I can’t say how I would do it exactly but I dare say it is entirely possible if someone has the determination.

Link to comment
Share on other sites

If hacking and scamming wasn’t worth it, people wouldn’t try. I can’t say how I would do it exactly but I dare say it is entirely possible if someone has the determination.

It ain’t about the worth, it’s about whether it is possible or not and since you dare say how you would do it, it only proves it ain’t possible.

Link to comment
Share on other sites

I smell a feisty gauntlet throwdown!

I’m not writing a post about how I would theoretically try to hack a Fiverr account. It would be pointless without final proof of such a methods success. Plus it could give people ideas. Hacking happens. Nothing is secure and complacency breeds security weaknesses in the first place.

Sorry, no fight or nee naw nee naw of the Mod police on this one. Besides, I’m marathon watching The 100. - So silly but so enthralling.

Link to comment
Share on other sites

What’s The 100 about? I am half watching War of the Worlds and hating on Tom “Shit Dad” Cruise. I am enjoying the firey train of death and special FX though.

It’s basically lord of the flies. Teenagers sent down from a space station to see if the Earth is habitable after a nuclear war 100 years in the past. Lots of spaceship explosions, interference by unexpected spear throwing tribespeople, teenage who’s screwing who angst, and now it seems, people who dress like they are from the 1950’s , live in a mountain and drink blood.

So silly, but… So enthralling.

Link to comment
Share on other sites

What’s The 100 about? I am half watching War of the Worlds and hating on Tom “Shit Dad” Cruise. I am enjoying the firey train of death and special FX though.

P.S. I just remembered that I have the new version of The Ring. Might move onto that next but I’m all out of peanut butter and my dogs refusing to snuggle. - Not good for a horror flick this late at night.

Link to comment
Share on other sites

So I was just sitting in front of my computer wondering what it would take for someone to “hack” your account then proceed to withdraw your money.

Knowing your password – Well for this someone could use a keylogger but any decent anti virus automatically detects it.

Lets assume they already got your password. Now they need to click on withdraw then also magically know your email you withdraw with and the password. The email I use to log into fiverr is different from my paypal email.

Lets assume they know all my email passwords. Well then gmail would ask them to verify their identity since they are trying to access in a different computer or phone. To verify the identity they would need to have my phone number and my phone and my security key question and answer.

OK. Well what if they change the email associated with fiverr? Then they would have to verify it through the email verification sent to my email address that they can’t login because they don’t have me.

Bottom line is that the people who claim that their accounts have been hacked and all the money withdrawn to a different account are somewhat lying. Their accounts most likely were milked dry by someone a family member who has access to all of their info.

people who claim that their accounts have been hacked and all the money withdrawn to a different account are somewhat lying. Their accounts most likely were milked dry by someone a family member who has access to all of their info.

Not necessarily. It’s amazing how many people use the same password for everything from their bank to email itself to Fiverr to PayPal. The email is even more likely to be over-utilized, so if the person enters their username and password in a phishing page, the phisher might get 1 in 20 that have poor security practices, but that 1 is worth it to a con artist. I doubt it’s always a family member, phishing scams combined with poor security nabs an occasional victim. Someone using all the security options available including 2 step verification on email and such are far less likely to be hacked, and a brute force attack where no phishing was involved is even less likely. In the long run the question is really a moot.

Get me a celestial restraining order and I’ll rule the world.

This on the other hand is worrisome. If someone gives cya a celestial restraining order, we’re all in trouble! 🙂

Link to comment
Share on other sites

people who claim that their accounts have been hacked and all the money withdrawn to a different account are somewhat lying. Their accounts most likely were milked dry by someone a family member who has access to all of their info.

Not necessarily. It’s amazing how many people use the same password for everything from their bank to email itself to Fiverr to PayPal. The email is even more likely to be over-utilized, so if the person enters their username and password in a phishing page, the phisher might get 1 in 20 that have poor security practices, but that 1 is worth it to a con artist. I doubt it’s always a family member, phishing scams combined with poor security nabs an occasional victim. Someone using all the security options available including 2 step verification on email and such are far less likely to be hacked, and a brute force attack where no phishing was involved is even less likely. In the long run the question is really a moot.

Get me a celestial restraining order and I’ll rule the world.

This on the other hand is worrisome. If someone gives cya a celestial restraining order, we’re all in trouble! 🙂

Don’t worry, I’d spare you. I couldn’t after all, go out on a completely unmoderated rampage. That could get too messy for everyone.

Link to comment
Share on other sites

people who claim that their accounts have been hacked and all the money withdrawn to a different account are somewhat lying. Their accounts most likely were milked dry by someone a family member who has access to all of their info.

Not necessarily. It’s amazing how many people use the same password for everything from their bank to email itself to Fiverr to PayPal. The email is even more likely to be over-utilized, so if the person enters their username and password in a phishing page, the phisher might get 1 in 20 that have poor security practices, but that 1 is worth it to a con artist. I doubt it’s always a family member, phishing scams combined with poor security nabs an occasional victim. Someone using all the security options available including 2 step verification on email and such are far less likely to be hacked, and a brute force attack where no phishing was involved is even less likely. In the long run the question is really a moot.

Get me a celestial restraining order and I’ll rule the world.

This on the other hand is worrisome. If someone gives cya a celestial restraining order, we’re all in trouble! 🙂

I had actually come to my conclusion when someone posted a link to a poorly designed phishing page so out of curiosity I clicked it, then began to imagine how far the hack would go. The ones who get hacked are those who keep a pot of gold under the bed, close all the doors then forget they have a window.

Link to comment
Share on other sites

So I was just sitting in front of my computer wondering what it would take for someone to “hack” your account then proceed to withdraw your money.

Knowing your password – Well for this someone could use a keylogger but any decent anti virus automatically detects it.

Lets assume they already got your password. Now they need to click on withdraw then also magically know your email you withdraw with and the password. The email I use to log into fiverr is different from my paypal email.

Lets assume they know all my email passwords. Well then gmail would ask them to verify their identity since they are trying to access in a different computer or phone. To verify the identity they would need to have my phone number and my phone and my security key question and answer.

OK. Well what if they change the email associated with fiverr? Then they would have to verify it through the email verification sent to my email address that they can’t login because they don’t have me.

Bottom line is that the people who claim that their accounts have been hacked and all the money withdrawn to a different account are somewhat lying. Their accounts most likely were milked dry by someone a family member who has access to all of their info.

Knowing your password – Well for this someone could use a keylogger but any decent anti virus automatically detects it.

there are keyloggers that will not be detected by an anti virus. anti virus soft relies on heuristic patterns and if someone codes a new keylogger the only way it is getting picked up is if a lot of people get infected with it.

Lets assume they know all my email passwords. Well then gmail would ask them to verify their identity since they are trying to access in a different computer or phone

you can get past that without being asked for verification.

You can also get rooted via your browser as well without having any idea of what is going on.

Ever seen ads or requests for people to provide advertising on chrome extensions or requests to sell extensions… Sometimes that is all they are… Other times its not.

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

×
×
  • Create New...