top of page

Support | Tip | Donate

Recent Posts

Featured Post

How Criminals Target Facebook

  • Writer: The White Hatter
    The White Hatter
  • Jun 19, 2011
  • 2 min read

Updated: May 14


Given that approximately 20% of Facebook users have been exposed to malware, and that over 600,000 accounts are hacked almost daily, www.247Wallst.com released an article that they called “9 Ways that a Criminal Uses Facebook” that, I think, we should all be aware of and that I will share with you here:

HACKING ACCOUNTS: Common tools used to complete a successful hack using common passwords, names, and dates.

COMMANDEERING ACCOUNTS: Criminals login to an existing user account using an illegally-obtained password and ID. Immediately after logging in, they access the victim’s friend list. One of the best schemes is to ask friends for money. The hacker will claim that the person they’re hacking is stranded somewhere and needs money quickly. It’s effective because a high level of trust exists among users.

USER PROFILE CLONING: The act of using unprotected images and information to create a Facebook account with the same name and details of an existing user is profile cloning. Cloners will send friend requests to the same friends the victim has and gain access to others’ information to commit fraud. This is scary, yet simple.

CROSS-PLATFORM PROFILE CLONING: occurs when the cyber thief obtains information and images from Facebook and uses them to create false profiles on another social-networking site. This fraud is dangerous because victims may never realize they’ve been hacked.

PHISHING: When a hacker poses as a respected organization or individual and asks for personal data, it’s phishing. This occurs mostly via wall posts and direct messages. Once users click on the link, they are sent to a website loaded with malware or to a website where they are asked to provide information.

FAKE FACEBOOK: Scammers will direct a user to some sort of clickable enticement, to a Facebook login page designed to look like the real thing. When the victim enters a username and password, they are collected in a database, which the scammer will then sell.

AFFINITY FRAUD: When the con artist assumes the identity of a person to earn the trust of those close to them. The criminals will exploit the earned trust by stealing information or money. Facebook, unfortunately, facilitates this type of fraud because its network is based around “friending” anyone and everyone.

MINING UNPROTECTED INFO: Facebook users tend to reveal their emails, phone numbers, addresses, birth dates, and other private data. A hacker’s basic training is to start with this kind of information to access accounts. While the majority of unprotected information is mined for targeted advertising, it can be a means to more pernicious ends such as profile cloning and, ultimately, identity theft.

SPAM: “Clickjacking” is illegal and it involves the hacking of a personal account using an advertisement for a viral video or article. The user clicks on the ad, which then leads the program to send an advertisement to the person’s friends through their account without their knowledge.

It’s important to be educated and aware of these subjects so you can spot them before any harm can be done.

Digital Food For Thought

Darren Laur


Support | Tip | Donate
Featured Post
Lastest Posts
The White Hatter Presentations & Workshops
bottom of page