Rachel Tobac's Avatar

Rachel Tobac

@racheltobac.bsky.social

Hacker & CEO @SocialProofSec security awareness/social engineering training, videos, talks | 3X @DEFCON๐Ÿฅˆ | Ex Chair @WISPorg | Ex @CISAgov Technical Advisory Council under Director Jen Easterly

13,034 Followers  |  751 Following  |  259 Posts  |  Joined: 23.04.2023
Posts Following

Posts by Rachel Tobac (@racheltobac.bsky.social)

lol thatโ€™s cool, glad I work with your org!

27.02.2026 15:19 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

I watch my companyโ€™s security awareness training just because the speaker is @racheltobac.bsky.social

27.02.2026 12:30 โ€” ๐Ÿ‘ 12    ๐Ÿ” 1    ๐Ÿ’ฌ 3    ๐Ÿ“Œ 0
Message from "Signal Support"

Dear User, this is Signal Security
Support ChatBot.

Our system has detected a recent login attempt to your account from an unrecognized device or location. As a security measure, we have blocked this attempt and sent a verification code via
SMS to your registered phone number.

If this was NOT you: To secure your account and block this unauthorized access, please reply to this message with the verification code
you just received.

If this WAS you:
You can safely ignore this message. The login attempt will be automatically approved shortly. 

Thank you for helping us keep your
account secure.

Message from "Signal Support" Dear User, this is Signal Security Support ChatBot. Our system has detected a recent login attempt to your account from an unrecognized device or location. As a security measure, we have blocked this attempt and sent a verification code via SMS to your registered phone number. If this was NOT you: To secure your account and block this unauthorized access, please reply to this message with the verification code you just received. If this WAS you: You can safely ignore this message. The login attempt will be automatically approved shortly. Thank you for helping us keep your account secure.

Signal will never message you like this.

If you get a message like this, SOMEONE IS TRYING TO HACK YOUR SIGNAL.

DO NOT GIVE THEM THAT CODE.

26.01.2026 02:16 โ€” ๐Ÿ‘ 1998    ๐Ÿ” 1306    ๐Ÿ’ฌ 16    ๐Ÿ“Œ 12
In the last days, there has been an unprecedented attack targeting investigative journalists trying to seize their Signal accounts. This has gone largely unreported.

I have been repeatedly targeted by phishing, and I learned that also colleagues from other outlets were targeted, with the attackers unfortunately managing to compromise at least one colleagueโ€™s account. Whatโ€™s worrying: this doesnโ€™t seem like an isolated case. A broader wave is apparently hitting journalists (and some civil society actors) via Signal.

How it works: Attackers message you on Signal pretending to be โ€œSignal Support,โ€ warning about โ€œsuspicious activity,โ€ and urging you to โ€œre-verifyโ€ your account. Once you accept the chat, you receive a real Signal SMS verification code, because the attacker is actively trying to register your number on a new device. If you share that code, youโ€™re handing them the keys. 

Signalโ€™s extra protection is the Signal PIN. If an attacker also tricks you into giving up your PIN (or you donโ€™t have strong protections enabled), they can see your contacts and networks, potentially join chats going forward, and lock you out by changing settings. 

Quick protections worth doing today:
- Signal will never contact you via a two-way in-app support chat. Treat those messages as hostile. 
- Never share SMS codes, Signal PIN, or anything called โ€œregistration lock.โ€ 
- Turn on Registration Lock (Settings โ†’ Account โ†’ Registration Lock). 
- If you see a โ€œsafety number changedโ€ alert: verify the person via a different channel (call/video), not just Signal text. 
- Report + block suspicious requests, and review linked devices. 

If you work with sensitive sources: this isnโ€™t just about losing an account, itโ€™s about exposing networks. Please share this with colleagues who rely on Signal day-to-day.

In the last days, there has been an unprecedented attack targeting investigative journalists trying to seize their Signal accounts. This has gone largely unreported. I have been repeatedly targeted by phishing, and I learned that also colleagues from other outlets were targeted, with the attackers unfortunately managing to compromise at least one colleagueโ€™s account. Whatโ€™s worrying: this doesnโ€™t seem like an isolated case. A broader wave is apparently hitting journalists (and some civil society actors) via Signal. How it works: Attackers message you on Signal pretending to be โ€œSignal Support,โ€ warning about โ€œsuspicious activity,โ€ and urging you to โ€œre-verifyโ€ your account. Once you accept the chat, you receive a real Signal SMS verification code, because the attacker is actively trying to register your number on a new device. If you share that code, youโ€™re handing them the keys. Signalโ€™s extra protection is the Signal PIN. If an attacker also tricks you into giving up your PIN (or you donโ€™t have strong protections enabled), they can see your contacts and networks, potentially join chats going forward, and lock you out by changing settings. Quick protections worth doing today: - Signal will never contact you via a two-way in-app support chat. Treat those messages as hostile. - Never share SMS codes, Signal PIN, or anything called โ€œregistration lock.โ€ - Turn on Registration Lock (Settings โ†’ Account โ†’ Registration Lock). - If you see a โ€œsafety number changedโ€ alert: verify the person via a different channel (call/video), not just Signal text. - Report + block suspicious requests, and review linked devices. If you work with sensitive sources: this isnโ€™t just about losing an account, itโ€™s about exposing networks. Please share this with colleagues who rely on Signal day-to-day.

WARNING, fellow journalists: As @nicoschmidt.io explains, attackers are trying to hijack reporters' Signal accounts by tricking people into handing over their 2FA codes. www.linkedin.com/posts/nicosc...

28.01.2026 19:49 โ€” ๐Ÿ‘ 884    ๐Ÿ” 672    ๐Ÿ’ฌ 11    ๐Ÿ“Œ 38

lol I very truly donโ€™t, itโ€™s quite frizzy and the good lighting masks it! Lighting is everything.

27.01.2026 16:35 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Video thumbnail

If youโ€™re an activist, journalist, exec, or have a high threat model for any other reason, I do recommend using all tools to protect against spyware including Appleโ€™s lockdown mode and WhatsAppโ€™s new Strict Account Settings. Thanks WhatsApp for the partnership to get the word out to folks.

27.01.2026 15:46 โ€” ๐Ÿ‘ 25    ๐Ÿ” 8    ๐Ÿ’ฌ 4    ๐Ÿ“Œ 0

V good

14.01.2026 23:31 โ€” ๐Ÿ‘ 3    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

The repairable, customizable, build-it-yourself, physical webcam & mic kill switch, Linux compatible, port swappable @frame.work laptop has hit the SocialProof office ๐Ÿค–๐Ÿค˜

14.01.2026 16:47 โ€” ๐Ÿ‘ 70    ๐Ÿ” 4    ๐Ÿ’ฌ 5    ๐Ÿ“Œ 2
Preview
How the latest deepfake scam can cheat companies out of millions | CNN Business From CEOs to colleagues, deepfake technology can trick people into sending money, sharing passwords, or revealing sensitive information - all in seconds. CNNโ€™s Clare Duffy met with ethical hacker and ...

Great work from @racheltobac.bsky.social, with @cnn.com: How the latest deepfake scam can cheat companies out of millions. Good one to share with your company, and with friends & loved ones. edition.cnn.com/2025/10/07/b... cc @craignewmark.bsky.social @pausetake9.bsky.social @gate15.bsky.social

10.10.2025 11:42 โ€” ๐Ÿ‘ 12    ๐Ÿ” 10    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0
Social Engineer: YOU are Easier to Hack than your Computer
YouTube video by Scammer Payback Social Engineer: YOU are Easier to Hack than your Computer

An totally entertaining, and informative interview with @racheltobac.bsky.social and Scammer Payback about hacking and handling your online privacy in the new epoch of AI. youtu.be/xEdZwLRJttQ?...

13.10.2025 09:57 โ€” ๐Ÿ‘ 36    ๐Ÿ” 11    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 1

Episode 22: Social Engineering, Gas Mark 4, and AGAs with Rachel Tobac!

@tib3rius.bsky.social & @swiftsecur.bsky.social are joined by @racheltobac.bsky.social to talk social engineering war stories...and more!

Links below!

24.10.2025 14:01 โ€” ๐Ÿ‘ 6    ๐Ÿ” 4    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
People Who Say Theyโ€™re Experiencing AI Psychosis Beg the FTC for Help The Federal Trade Commission received 200 complaints mentioning ChatGPT between November 2022 and August 2025. Several attributed delusions, paranoia, and spiritual crises to the chatbot.

โ€œThe consumerโ€™s son has been interacting with an AI chatbot called ChatGPT, which is advising him not to take his prescribed medication and telling him that his parents are dangerous,โ€ reads the FTCโ€™s summary of one of the calls.

22.10.2025 13:37 โ€” ๐Ÿ‘ 36    ๐Ÿ” 16    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 5

Hey @racheltobac.bsky.social you're probably going to need to hire a lot more people for all the new clients you're about to get.

16.10.2025 15:53 โ€” ๐Ÿ‘ 9    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Oh goodness gracious

16.10.2025 22:32 โ€” ๐Ÿ‘ 5    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Thanks for watching!

13.10.2025 23:10 โ€” ๐Ÿ‘ 3    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Thank you Andy!

10.10.2025 12:16 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

In 2025, I've had a steep increase in reports from clients about AI voice clone phone calls asking for money, passwords or codes.
I give it about 12 months before criminals increase use of live video call deepfakes in their scams.
Get your folks & team prepared to catch it now.

09.10.2025 16:04 โ€” ๐Ÿ‘ 16    ๐Ÿ” 8    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

continued...
- Fraudsters Cloned Company Director's Voice In $35 M Heist: forbes.com/sites/thomas...
- Wiz CEO says company was targeted with deepfake attack that used his voice: techcrunch.com/2024/10/28/w...

09.10.2025 16:04 โ€” ๐Ÿ‘ 4    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
British engineering giant Arup revealed as $25 million deepfake scam victim | CNN Business A British multinational design and engineering company behind world-famous buildings such as the Sydney Opera House has confirmed that it was the target of a deepfake scam that led to one of its Hong ...

These live video call or audio call deepfakes are increasing in the business world. Most often, an exec is deepfaked to the team that supports them asking for money, passwords, MFA codes, etc:
- $25M sent to scammers in Arup video call deepfake attack cnn.com/2024/05/16/t...

09.10.2025 16:04 โ€” ๐Ÿ‘ 4    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
How the latest deepfake scam can cheat companies out of millions | CNN Business From CEOs to colleagues, deepfake technology can trick people into sending money, sharing passwords, or revealing sensitive information - all in seconds. CNNโ€™s Clare Duffy met with ethical hacker and ...

*My Latest CNN Zoom Call Deepfake Demo*
An eng org sent $25M to scammers who deepfaked the CFO in a live video call.
Are your colleagues, fam & friends ready to catch this AI attack?
I demo'd a live Zoom deepfake to CNN's Clare Duffy to help you spot the signs:
edition.cnn.com/2025/10/07/b...

09.10.2025 16:03 โ€” ๐Ÿ‘ 23    ๐Ÿ” 13    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
OpenAIโ€™s New Video App Is Jaw-Dropping (for Better and Worse)

Two of our tech reporters tested out Sora, a smartphone app made by OpenAI that lets people create videos entirely from A.I. โ€œIt is, in effect, a social network in disguise; a clone of TikTok down to its user interface, algorithmic video suggestions and ability to follow and interact with friends.โ€

02.10.2025 21:12 โ€” ๐Ÿ‘ 48    ๐Ÿ” 12    ๐Ÿ’ฌ 22    ๐Ÿ“Œ 3

Thanks for reading!

02.10.2025 23:45 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

"It makes it really easy to create a believable deepfake in a way that we havenโ€™t quite seen yet."
-- @racheltobac.bsky.social, CEO of SocialProof Security, a cybersecurity start-up in San Francisco

02.10.2025 23:12 โ€” ๐Ÿ‘ 6    ๐Ÿ” 2    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

My worddd

29.09.2025 23:05 โ€” ๐Ÿ‘ 3    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

@racheltobac.bsky.social new threat model for businesses? ๐Ÿ˜ฌ๐Ÿ˜ตโ€๐Ÿ’ซ

29.09.2025 15:19 โ€” ๐Ÿ‘ 11    ๐Ÿ” 2    ๐Ÿ’ฌ 3    ๐Ÿ“Œ 0

Thank you for the kind words!!

17.09.2025 15:17 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Social Engineer: YOU are Easier to Hack than your Computer
YouTube video by Scammer Payback Social Engineer: YOU are Easier to Hack than your Computer

This should be mandatory watch by everybody who has a phone and or email. @racheltobac.bsky.social shows how vulnerable we all are to getting hacked through social engineering and with gAI tools it's only gotten easier.

17.09.2025 12:47 โ€” ๐Ÿ‘ 48    ๐Ÿ” 10    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 3

Thank you!!

10.09.2025 13:59 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

I only watched this today, but I enjoyed it immensely. So many security lessons in a very entertaining package. ๐Ÿ˜Š

10.09.2025 12:09 โ€” ๐Ÿ‘ 13    ๐Ÿ” 2    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0