How Criminals Target Facebook

Given that approximately 20% of Facebook users have been exposed to malware, and that over 600,000 accounts are hacked almost daily, www.247Wallst.com release an article that they called “9 Ways That A Criminal Uses Facebook” that we should all be aware of, and that I share with you here:

 

•    HACKING ACCOUNTS: Common tools used to complete a successful hack: using common passwords, names, and dates.

 

•    COMMANDEERING ACCOUNTS: Criminals log in to an existing user account using an illegally-obtained password and ID. Immediately after logging in, they access the victim’s friend list. One of the best schemes is to ask friends for money. The hacker will claim “you” are stranded somewhere and need money quickly. It’s effective because a high level of trust exists among users

 

•    USER PROFILE CLONING: The act of using unprotected images and information to create a Facebook account with the same name and details of an existing user is profile cloning. Cloners will send friend requests to the same friends the victim has and gain access to others’ information to commit fraud. This is scary, yet simple.

 

•    CROSS-PLATFORM PROFILE CLONING: occurs when the cyber thief obtains information and images from Facebook and uses them to create false profiles on another social-networking site. This fraud is dangerous because victims may never realize they’ve been hacked.

 

•    PHISHING: When a hacker poses as a respected organization or individual and asks for personal data, it’s phishing. This occurs mostly via wall posts and direct messages. Once users click on the link, they are sent to a website loaded with malware or to a website where they are asked to provide information.

 

•    FAKE FACEBOOK: Scammers will direct a user to some sort of clickable enticement, to a Facebook log-in page designed to look like the real thing. When the victim enters a username and password, they are collected in a database, which the scammer will sell.

 

•    AFFINITY FRAUD: When the con artist assumes the identity of a person to earn the trust of those close to them. The criminals will exploit the earned trust by stealing information or money. Facebook, unfortunately, facilitates this type of fraud because its network is based around “friending” anyone and everyone.

 

•    MINING UNPROTECTED INFO: Facebook users tend to reveal their emails, phone numbers, addresses, birth dates, and other private data. A hacker’s basic training is to start with this kind of information to access accounts. While the majority of unprotected information is mined for targeted advertising, it can be a means to more pernicious ends such as profile cloning and, ultimately, identity theft.

 

SPAM: “Clickjacking” is illegal and involves the hacking of a personal account using an     advertisement for a viral video or article. The user clicks on the ad which then leads the program to send an advertisement to the person’s friends through their account without their knowledge.