August 9, 2018 By Joan Goodchild 5 min read

The massive rise in popularity of social platforms has led to a huge upswing in social media scams — putting a growing pool of users at risk. Facebook had 2.23 billion monthly active users as of the second quarter of 2018, while photo-sharing site Instagram hit 1 billion monthly active users by June 2018, according to Statista.

By empowering users to share and connect, social media platforms open the door for a variety of different security and privacy concerns. As any security professional will tell you, allowing your employees to use social media sites on corporate networks could make your system increasingly vulnerable.

Unfortunately, there are many social media scams your team must know about. Here are the biggest scams to watch out for in 2018.

1. Catfishing

Ah, l’amour. Most of us are suckers for it, and a variety of scammers are turning to social media sites like Facebook to take advantage of this fact. Catfishing is an internet scam in which a cybercriminal creates a fake online profile to seduce a victim into a fictitious online relationship — usually to get money or other benefits from the victim.

Of course, this doesn’t just happen on Facebook. Unsuspecting users of dating sites and apps are also common prey for fake profile scams.

“A catfisher scours through the user base, looking for a particularly vulnerable and eager user open to emotional manipulation,” wrote Heimdal Security.

Once the catfishing criminal lures their victim, they begin establishing trust and building a relationship. Eventually, this culminates in an agreement to meet, but the victim finds out it’s not that easy. Suddenly the catfisher needs funds to travel to see the victim, cover visa processing fees or help with some other financial shortcoming that must be resolved before the meeting can take place. Unfortunately, this is all a ploy to manipulate the victim into giving up their money.

Facebook announced last year that it was making an effort to reduce catfishing by leveraging artificial intelligence (AI). Facebook officials said at that time that they were developing features to make users aware of instances when their photos have been posted without permission.

2. Profile Hijacking

The Facebook profile hijack is another take on using a fake profile for nefarious means. In this case, cybercriminals often use the attributes and details of real people — like their photos, hometown and occupation — to set up profiles pretending to be that person. Other versions of this scam involve breaking into an existing profile, changing the password and using what has been a trusted profile to scam users in the person’s network.

Once in, the scammer might use the profile to ask the victim’s network for money. Often, a cybercriminal will message the user’s connections claiming that they have lost their wallet while on vacation and need a wire transfer of cash to get home.

3. Lottery Schemes

A ruse emerged earlier this year involving fake profiles that appeared to belong to top Facebook executive Mark Zuckerberg. The cybercriminals sent messages to other users informing them that they’d just won lottery prize money.

“The pitch often begins with an unsolicited ‘Hello. How are you doing?’ on Facebook or Instagram,” a The New York Times report explained. “The fake accounts then proceed, sometimes in broken English, to inform people of their enormous Facebook lottery prize.”

The New York Times profiled a victim who was told he had won $750,000. But to collect the winnings, he needed first to send $200 in iTunes gift cards. The victim, a retired Army veteran living on Social Security, bought the gift cards and sent the redemption codes to the user claiming to be Zuckerberg. But the requests for money didn’t stop — and he eventually lost an additional $1,310 before realizing he had been scammed.

4. Quizzes That Mine Your Information

Which “Stars Wars” character are you? What city were you meant to live in? Which celebrity is your soulmate? Sound familiar? These are all popular quizzes that have been widely shared on Facebook, imploring users to take a few minutes for what seems like harmless fun.

But the Better Business Bureau (BBB) warns that some quizzes are designed to steal your data in an outright scam. Oftentimes, cybercriminals will include links embedded in the quiz that can steal information from your personal accounts. Once these criminals have your account information, they can use it to lure in other unsuspecting victims, including your friends.

“We always knew someone was trying to trick us with social media quizzes because they are free,” said Bill Fanelli, chief security officer at the BBB, in a release from the organization. “If there is no charge, then the value is the data they can collect. We also knew that it was for a use we probably would not like, because they went to such great lengths to hide their purpose. Now we know we were right on both counts.”

The BBB cautions users to be skeptical: Before you take a quiz, figure out who created it. Is it a brand you trust?

Security researchers with Symantec also note that the quizzes can be used as a cover for tricking users into subscribing to monthly services that will automatically charge their credit cards until action is taken.

5. URL-Shortening Cons

While URL shorteners are very useful for sharing a website link within a tight character limit, such as Twitter, they can also be used to mask a malicious page.

The Symantec report cited above also advises users to be careful about “blindly clicking on shortened URLs. You’ll see them everywhere on Twitter, but you never know where you’re going to go since the URL (‘Uniform Resource Locator,’ the web address) hides the full location.”

That location could be a nefarious site run by cybercriminals that can drop malware on your machine or lead you into some other scam. If you’re concerned about a shortened link, you can check it before clicking. There are a variety of websites, such as CheckShortURL, that offer a URL lengthening service, enabling you to paste in a link to see exactly where it leads.

6. Chain Message Hoaxes

Social media app Snapchat has run into a problem with chain message hoaxes, according to Tech Advisor. The ruse here involves trying to alarm users about something terrible that is going to happen to their data within the app.

“The most recent is a message being circulated that your Memories (i.e., saved photos) would be deleted unless you copy the message and share it with your friends,” wrote Tech Advisor.

A similar scam scared users by warning that any nude photos sent over Snapchat were going to be uploaded and shared.

These hoaxes are often made to look official because the cybercriminal creates the message in such a way that it appears to come from the official Snapchat account. Keep an eye out for poor grammar, spelling mistakes and other giveaways that the message is fake.

7. Money-Flipping

Money-flipping is a growing financial scam on Instagram and other social media channels. Criminals seek to extort money from users by convincing them to make a bum investment.

“Cybercriminals make it seem like their victims are investing their money in a business model that lets them ‘flip’ or double their money in no time at all,” according to IG Reviews. As ZeroFOX reports, many of these scams target military members. The cybercriminals in question often attract traffic from service members by using military-specific hashtags.

Why? ZeroFOX researchers say military personnel are often familiar with making overseas cash transfers, and military-specific banks have faster transactions and larger withdrawal limits to serve their customers.

Identifying Social Media Scams

Social media sites have brought people together, allowing them to connect and collaborate in ways that weren’t possible just a decade ago. But the price of that connection is the severe risk to privacy and security as cybercriminals lurk, waiting to take advantage of users’ personal information.

Employees who access social platforms from corporate machines could put your business assets and network at risk. By educating them about the common scams making the rounds periodically, you can ensure they stay aware and vigilant of the threats lurking on popular social sites.

Listen to the podcast to learn more: Social Engineering 101 — How to Hack a Human

More from Fraud Protection

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

New Fakext malware targets Latin American banks

6 min read - This article was made possible thanks to contributions from Itzhak Chimino, Michael Gal and Liran Tiebloom. Browser extensions have become integral to our online experience. From productivity tools to entertainment add-ons, these small software modules offer customized features to suit individual preferences. Unfortunately, extensions can prove useful to malicious actors as well. Capitalizing on the favorable characteristics of an add-on, an attacker can leverage attributes like persistence, seamless installation, elevated privileges and unencrypted data exposure to distribute and operate banking…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today