@pertho for me the important thing, in this case is how they target the sysadmins, then the use diverse online social network info to gather information and then try to infiltrate.
It's important for sysadmins to manage the info about us that is out there.