Social Malware

Social Media, just about everyone has some a type of social media account. If you ask anyone with a social media account what the most annoying thing about it is, they might tell you one of two things; Getting spam messages from an account whether it is friend or foe, or having fake pages follow and or request you. From December 2014 to December 2016 social media impersonators grew at an exponential rate, growing at a pace of 11 times within in those two years. Fake accounts or impersonated accounts have a negative effect on social media, because it hurts business, other individuals etc. What many people do not realize is that a handful of their followers, or friends on social media are not actual people, rather systems put in place to search your personal information. The same goes for some of the ads that are put on social media. Impostors create ads prompting users to click through to a malicious site. Usually containing phrases like: “YOU WIN CLICK HERE” or “POP THIS BALLOON TO WIN YOUR PRIZE” is another form of malware. Mike Raggo, a computer scientist, who created a website to track impersonators, says he is highly surprised and impressed because social platforms typically require a vetting process for promoted ads. Impersonators can bypass the vetting process by using real brand logos and similar-looking merchandise. Many impersonators employ several techniques: phishing, adware, malware, fraud, counterfeit merchandise, and “follow farming”. Many impersonators set up their accounts long before they attack. What many do is create an account that seems normal, it goes through the process of following any and everybody hoping for follow backs, then the page may go dormant for a while and when it reappears, it is sending spam messages asking you to click on a link to something. A lot of accounts had been set up for some time to build a following. Then they change multiple times, transcending multiple accounts or companies over time. Research shows that there is an interesting challenge for many businesses as they have to figure out and understand how to keep themselves secure. Most organizations are equipped to handle phishing, malicious links, and malware in email, but are they equipped to handle social media?

Leave a Reply

Your email address will not be published. Required fields are marked *

Skip to toolbar