Social Media Account Hijacking Jumps 1,000% in Last 12 Months – TechNewsWorld
Hijacking of social media accounts has reached epidemic proportions in the last 12 months, according to the Identity Theft Resource Center.
The non-profit which provides assistance to the victims of identity theft revealed in its 2022 Consumer Impact Report that social media takeovers have increase 1,000% during the period.
In a survey of consumers, the ITRC found that 85% had their Instagram accounts compromised, while 25% had their Facebook account hijacked.
The report also found that 70% of the victims of account hijacking were permanently locked out of their social media accounts and 71% had friends contacted by the hackers that compromised the account.
It may be easy to dismiss this type of identity crime as a mere inconvenience, the report noted, but it can have a profound financial and emotional impact on people.
For example, 27% of account hijacking victims told the ITRC they’d lost sales revenue when they lost control of their social media.
“For some people, where social media is a communication platform for family and friends, losing access can range from an annoyance to heartbreaking,” said Mike Parkin, senior technical engineer at Vulcan Cyber, a provider of SaaS for enterprise cyber risk remediation, in Tel Aviv, Israel.
“For others, where they are making money from Instagram, YouTube or TikTok, losing their account can mean a substantial hit to their income,” he told TechNewsWorld.
One of the biggest assets for any kind of phishing attack is having a “trusted” channel of communication, observed John Bambenek, a principle threat hunter at Netenrich, an IT and digital security operations firm based in San Jose, Calif.
“If I get a phishing email from Citibank, I know I can ignore it because I don’t bank there,” he told TechNewsWorld. “If you are using a social media account to attack the contacts of your victim, they are already preconditioned to accept your message as valid.”
“We tend to trust people we’re close to when they message us on social media,” added Paul Bischoff, a privacy advocate at Comparitech, a reviews, advice and information website for consumer security products.
“If I get a message from my mother, I’m going to implicitly trust it,” he told TechNewsWorld. “If someone takes over her social media account, it wouldn’t be hard for them to trick me into sending them money, my Social Security number, or my account password.”
“By abusing this sort of trusted relationship,” he said, “account takeovers can spread and be difficult for victims to detect when compared to, for example, a phishing email.”
An account owner isn’t the only victim of an account hijacking, noted Matt Polak CEO and founder of the Picnic Corporation, a social engineering protection company, in Washington, D.C.
“By impersonating the actual owner of the account, a bad actor can create posts or send private messages that fool contacts into doing something they would not otherwise do, such as clicking on a malicious link, handing over credit card information or their credentials — which can lead to further account compromise — or depositing money into the attacker’s account,” he told TechNewsWorld.
“So social media account takeover can be not only be harmful to the person whose identity is being impersonated, but also to those who are targeted by the criminal using the account,” he added.
Social media’s popularity has made it a target of web predators, maintained Roger Grimes, a data-driven defense evangelist with KnowBe4, a security awareness training provider, in Clearwater, Fla. “Whatever becomes popular becomes hacked,” he told TechNewsWorld. “It’s been true since the beginning of computers and is just as true today.”
“That is why it is crucial that we create a personal and organizational culture of healthy skepticism, where everyone is taught how to recognize the signs of a social engineering attack no matter how it arrives — be it email, web, social media, SMS message, or phone call — and no matter who it appears to be sent by,” he said.
Some of the blame for account hijacking can be pinned on social media operators, maintained Matt Chiodi, chief trust officer at Cerby, maker of a platform to manage Shadow IT, in San Francisco.
“None of the prominent social media platforms offer robust authentication options to their billions of users,” he told TechNewsWorld. “This is unacceptable for tools that are so widely used by consumers and critical to enterprises and democracy.”
“These ‘unmanageable applications’ do not support security standards, such as single sign-on or automated user creation and removal through a standard known as SCIM,” he said. “These two standards are the bread and butter of what keeps many enterprises’ crown jewel applications secure. But none of them are supported, and it’s the main reason criminals go after social accounts.”
The ITRC also reported a slight decline in repeat victims of identity theft. In 2022, 26% of surveyed victims said they’d been a victim before, compared to 29% in 2021.
Awareness may be one reason for that decline, posited Carmit Yadin, founder and CEO of DeviceTotal, maker of a risk management platform for un-agentable devices, in Tel Aviv, Israel.
“When someone gets hacked, he takes it seriously,” she told TechNewsWorld. “He will learn and know what not to do next.”
“Before getting hacked,” she continued, “he may have heard about these attacks but wasn’t aware of their consequences.”
Another possible reason for the decline was offered by Angel Grant, vice president for security at F5, a multi-cloud application services and security company, in Seattle. “Victims of identity theft often wrongfully feel shame and embarrassment that they did something wrong,” he told TechNewsWorld. “Because of that, they often do not report when they are impacted.”
The decline could also be a sign that identity thieves may be finding it harder to find easy targets and harder to get new ones, suggested Ray Steen, CSO of MainSpring, a provider of IT managed services, in Frederick, Md.
“After falling prey to one identity attack, victims frequently clean up their digital footprint and adopt better security practices,” he told TechNewsWorld.
“In this light, a 3% decrease in victims is not as encouraging as it may first appear,” he said. “I would hope for larger improvements.”
“Unfortunately,” he added, “cyber actors take at least one step forward for every step their victims take towards better security, and they are constantly developing new methods of attack.”
John P. Mello Jr. has been an ECT News Network reporter since 2003. His areas of focus include cybersecurity, IT issues, privacy, e-commerce, social media, artificial intelligence, big data and consumer electronics. He has written and edited for numerous publications, including the Boston Business Journal, the Boston Phoenix, Megapixel.Net and Government Security News. Email John.
Please sign in to post or reply to a comment. New users create a free account.
Computer
E-Reader
Smartphone
Tablet
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/06/cyberwarfare-3-300×156.jpg
https://www.technewsworld.com/story/attacks-on-cloud-service-providers-down-25-during-first-4-months-of-2022-176678.html
Attacks on Cloud Service Providers Down 25% During First 4 Months of 2022
Canonical Lets Loose Ubuntu 22.04 LTS ‘Jammy Jellyfish’
Low-Code Platforms Help Ease the Shadow IT Adversity Pain
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/09/Google-Nest-Cam-Outdoors-300×156.jpg
https://www.technewsworld.com/story/nest-cams-unique-battery-and-solar-power-options-177143.html
Nest Cam’s Unique Battery and Solar Power Options
Researchers Find Consumer Satisfaction Remains High for PCs and TVs
New AI-Powered Service Turns Portraits Into Talking Heads
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/09/amd-and-intel-300×156.jpg
https://www.technewsworld.com/story/amd-vs-intel-suddenly-the-desktop-pc-is-in-play-177042.html
AMD vs. Intel: Suddenly the Desktop PC Is in Play
Electronics Will Cost More in 2023
Apple Shows Off Vast Upgrades to Software, Hardware, User Experiences at WWDC22
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/09/Windows-11-300×156.jpg
https://www.technewsworld.com/story/how-to-configure-windows-to-auto-restart-after-a-power-failure-177101.html
How To Configure Windows To Auto Restart After a Power Failure
Linux Mint 21 Release Brings Reviewer a Welcome Reunion
Intehill 15.6″ Portable Monitor Is Masterful at Work and Play
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/social-media-apps-300×156.jpg
https://www.technewsworld.com/story/social-media-account-hijacking-jumps-1000-in-last-12-months-report-177164.html
Social Media Account Hijacking Jumps 1,000% in Last 12 Months: Report
Zero Trust SIM Boosts BYOD Security
EvilProxy Phishing Service Threatens MFA Protection of Accounts
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/server-room-300×156.jpg
https://www.technewsworld.com/story/security-demands-shifting-business-backups-away-from-on-prem-boxes-176873.html
Security Demands Shifting Business Backups Away From On-Prem Boxes
Data Observability’s Big Challenge: Build Trust at Scale
The Business Case for Clean Data and Governance Planning
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/open-source-300×156.jpg
https://www.technewsworld.com/story/coding-vulnerabilities-linux-growth-foss-friction-cap-summer-highlights-176640.html
Coding Vulnerabilities, Linux Growth, FOSS Friction Cap Summer Highlights
Leapwork CEO: No-Code Platforms Democratize Testing Automation
Cognitive Skills for Engineering Success
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/09/e-reader-300×156.jpg
https://www.technewsworld.com/story/color-android-apps-change-the-game-for-e-paper-tablets-177150.html
Color, Android Apps Change the Game for E-Paper Tablets
Nvidia and the 3D Future of the Internet
AI Gun Detection Firm ZeroEyes Awarded Air Force Drone Grant
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/accountant-300×156.jpg
https://www.technewsworld.com/story/b2b-funding-firms-banking-on-embedded-finance-176805.html
B2B Funding Firms Banking on Embedded Finance
Unresolved Conflicts Slow eSIM Upgrade Path to Better IoT Security
Cryptocurrency Custody Concerns: Who Holds the Digital Storage Keys?
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/gaming-rig-300×156.jpg
https://www.technewsworld.com/story/cloud-gaming-poised-for-takeoff-177028.html
Cloud Gaming Poised for Takeoff
Qualcomm and the Mobile Video Game Revolution
Stat Firm Reports Less Than 1% of Subscribers Playing Netflix Games
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/cyberwarfare-2-300×156.jpg
https://www.technewsworld.com/story/chinese-hackers-deploy-fake-news-site-to-infect-government-energy-targets-177036.html
Chinese Hackers Deploy Fake News Site To Infect Government, Energy Targets
5 Cyber Safety Tips To Survive the Internet, Hackers and Scammers
Top Universities Exposing Students, Faculty and Staff to Email Crime
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/customer-experience-300×156.jpg
https://www.technewsworld.com/story/how-not-to-do-cx-lenovo-style-177024.html
How Not To Do CX, Lenovo Style
KYY 15.6″ Portable Monitor Packs Value With a Healthy Feature Set
New Linux Laptop Line Advances HP, System76 Open-Source Collaboration
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/09/Apple-Watch-Ultra-lifestyle-adventure-300×156.jpg
https://www.technewsworld.com/story/apple-refreshes-product-lines-introduces-new-ultra-watch-177074.html
Apple Refreshes Product Lines, Introduces New Ultra Watch
Meta Moves To Back Off Removing Covid Misinformation From Platforms
Hack Your Metabolism To Improve Health With the Lumen Smart Device
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/solar-panel-home-300×156.jpg
https://www.technewsworld.com/story/the-coming-wave-of-next-generation-home-solar-companies-177031.html
The Coming Wave of Next-Generation Home Solar Companies
Home Security Market Thriving Despite Dread of False Alarms
Digital Devices of Corporate Brass Ripe for Hacker Attacks
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/07/smartphone-user-puzzled-300×156.jpg
https://www.technewsworld.com/story/6-signs-cybercriminals-infected-your-phone-and-how-to-fix-it-176911.html
6 Signs Cybercriminals Infected Your Phone and How To Fix It
Start Here When Things Go Wrong on Your Linux System
Computers Use Processes, So Should You
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/06/canonical-ubuntu-300×156.jpg
https://www.technewsworld.com/story/ubuntu-core-22-release-addresses-challenges-of-iot-edge-computing-176583.html
Ubuntu Core 22 Release Addresses Challenges of IoT, Edge Computing
Foundries and Arduino Team To Patch IoT Devices
Remote Work Heightens Privacy and Security Anxiety Among Employees
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/press-conference-300×156.jpg
https://www.technewsworld.com/story/tech-whistleblowers-prefer-loud-exit-to-quiet-quitting-177039.html
Tech Whistleblowers Prefer Loud Exit To Quiet Quitting
IT Security Pros Push for Consolidated Standards, Vendor Products
Denmark Tops in Digital Quality of Life, US in Fifth Place
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/microsoft-word-300×156.jpg
https://www.technewsworld.com/story/new-software-vulnerability-zeroes-in-on-microsoft-programs-176806.html
New Software Vulnerability Zeroes In on Microsoft Programs
Hackers Cast LinkedIn as Most-Popular Phishing Spot
Forrester Pegs B2B Fraud, Cyber Insurance Complacency as Top Threats in 2022
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/09/satellite-phone-call-300×156.jpg
https://www.technewsworld.com/story/the-future-of-satellite-phone-communications-177085.html
The Future of Satellite Phone Communications
Kids’ Screen Use Sees Fastest Rise in 4 Years
Sports Betting Platforms Gambling With Substandard CX
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/Titan-Linux-300×156.jpg
https://www.technewsworld.com/story/titan-linux-beta-brings-simplicity-finesse-to-kde-remake-176554.html
Titan Linux Beta Brings Simplicity, Finesse to KDE Remake
Linux Security Study Reveals When, How You Patch Matters
New Breeze Theme Gives KDE Neon Release Lots of Sparkle
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/09/review-privacy-policy-300×156.jpg
https://www.technewsworld.com/story/maintaining-global-compliance-with-modern-data-privacy-laws-177135.html
Maintaining Global Compliance With Modern Data Privacy Laws
PII of Many Fortune 1000 Execs Exposed at Data Broker Sites
US-Led Seizure of RaidForums May Defy Lasting Effect on Security
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/innoview-pm004-300×156.jpg
https://www.technewsworld.com/story/innoviews-15-6-4k-portable-panel-could-be-the-ultimate-touchscreen-accessory-176726.html
InnoView’s 15.6″ 4K Portable Panel Could Be the Ultimate Touchscreen Accessory
Rebuilding Ukraine: 3D Printing and the Metaverse Could Help Create the Cities of Tomorrow
InnoView 15.8″ Portable Display: More Screen Space for Small Devices
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/Space-BACN-300×156.jpg
https://www.technewsworld.com/story/darpa-moves-forward-with-project-to-revolutionize-satellite-communication-177003.html
DARPA Moves Forward With Project To Revolutionize Satellite Communication
Science, Art Inspire Women in Tech Entrepreneurship
Why Commercial Space Travel Is Unlikely To Scale Up
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/09/search-300×156.jpg
https://www.technewsworld.com/story/upstart-search-engine-andi-delivers-answers-not-lists-177106.html
Upstart Search Engine Andi Delivers Answers, Not Lists
Microsoft Bing, Yandex Create New Search Protocol
Botify SEO Platform Helps Brands Navigate Organic Search Rankings
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/server-admins-300×156.jpg
https://www.technewsworld.com/story/cyber-asset-management-overwhelming-it-security-teams-87457.html
Cyber Asset Management Overwhelming IT Security Teams
30 Years of Linux History Told via Distros
Stale Open Source Code Rampant in Commercial Software: Report
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/03/digital-wallet-qr-code-300×156.jpg
https://www.technewsworld.com/story/whats-in-store-for-next-gen-digital-wallets-87451.html
What’s in Store for Next-Gen Digital Wallets
Apple Refreshes iPhone SE, iPad Air, Debuts Studio Desktop
Tesla Smartphone Could Be a Game Changer
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/social-media-apps-300×156.jpg
https://www.technewsworld.com/story/a-third-of-us-social-media-users-creating-fake-accounts-176987.html
A Third of US Social Media Users Creating Fake Accounts
Amazon Lawsuit Fingers Facebook Groups Recruiting Fake Reviewers
Big Tech Firms Move To Squash Deceptive Info on Ukraine Crisis
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/global-disaster-300×156.jpg
https://www.technewsworld.com/story/nvidia-launches-earth-2-and-goes-to-war-against-climate-change-87336.html
Nvidia Launches Earth 2 and Goes to War Against Climate Change
Kuo Predicts ‘iPhone 13’ Will Support Satellite Calls and Texting
30 Years Later, the Trajectory of Linux Is Star Bound
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/09/police-officer-300×156.jpg
https://www.technewsworld.com/story/high-tech-trends-in-law-enforcement-and-emergency-response-177058.html
High-Tech Trends in Law Enforcement and Emergency Response
VR Platforms Deliver Metaverse-Style Experiences to Online Shopping
Robotic Letter Writing Lends a Hand to Personalized Marketing, CRM
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/surface-duo-2-300×156.jpg
https://www.technewsworld.com/story/microsoft-finally-has-truly-competitive-alternatives-to-apple-products-87282.html
Microsoft Finally Has Truly Competitive Alternatives to Apple Products
New iPad Mini Stars at Apple Refresh Event
Chromebook Shipments Jump 75% YoY in Q2
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/07/tug-of-war-300×156.jpg
https://www.technewsworld.com/story/musk-twitter-qualcomm-apple-netflix-microsoft-deciphering-the-insanity-176915.html
Musk-Twitter, Qualcomm-Apple, Netflix-Microsoft: Deciphering the Insanity
The World Is Not Yet Ready for Electric Cars
The Importance of the Metaverse Standards Forum
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/05/call-center-team-300×156.jpg
https://www.technewsworld.com/story/marketers-beware-floridas-mini-tcpa-176642.html
Marketers: Beware Florida’s Mini-TCPA
New EU Law Will Force Google, Meta, Others To Expose Algorithms
Pandemic, Compliance Driving Increased Privacy Spending
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/09/autonomous-car-passenger-300×156.jpg
https://www.technewsworld.com/story/intel-and-how-autonomous-driving-will-fix-the-electric-car-problem-177117.html
Intel and How Autonomous Driving Will Fix the Electric Car Problem
Lucid, Nvidia and the Rapidly Changing Future of Electric Cars
Rapid EV Adoption by Low-Income Drivers Needed To Curb Climate Change: Report
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/metaverse-future-300×156.jpg
https://www.technewsworld.com/story/nvidia-and-disney-can-breathe-life-into-the-metaverse-176993.html
Nvidia and Disney Can Breathe Life Into the Metaverse
The Metaverse Future: Are You Ready To Become a God?
New Recipe for Marketing Success: Blend Digital and CX, Mix Well With AI
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/vr-metaverse-300×156.jpg
https://www.technewsworld.com/story/apple-mr-specs-will-shun-metaverse-report-87385.html
Apple MR Specs Will Shun Metaverse: Report
Apple Wearables Holiday Sales Knock It Out of the Park
5 Terrific Tech Gift Ideas for Your Holiday Shopping List
https://www.technewsworld.com/wp-content/uploads/sites/3/2021/07/xl-2016-hacker-2-300×184.jpg
https://www.technewsworld.com/story/cybercriminals-employing-specialists-to-maximize-ill-gotten-gains-87200.html
Cybercriminals Employing Specialists To Maximize Ill-Gotten Gains
Encouraging Research Finds Brain Adjusts to ‘Third Thumb’
E-Commerce Tending to Health and Wellness Needs
Copyright 1998-2022 ECT News Network, Inc. All Rights Reserved.
Enter your Username and Password to sign in.