SlideShare a Scribd company logo
1 of 1
Download to read offline
social media fraud
A TIMELINE
MYSPACE LAUNCHED AS
A CLONE OF FRIENDSTER
LINKEDIN LAUNCHED AS A
SOCIAL NETWORKING SITE
FOR PROFESSIONALS
‘03
FACEBOOK LAUNCHED AT
HARVARD UNIVERSITY
TWITTER LAUNCHED AS A SOCIAL NETWORKING
AND MICRO-BLOGGING SITE.
FACEBOOK LETS THIRD-PARTY
DEVELOPERS CREATE FACEBOOK APPS
SURPASSES MYSPACE IN MONTHLY
UNIQUE VISITORS
During “Deepwater Horizon” oil spill: With more than 20,000 followers at press time, the cynical
response to the oil spill was twice as popular than BP's actual Twitter page, @BP_America.
The vulgar rants of Yahoo's dragon
lady/CEO, Carol Bartz, appeared
under a fake Twitter account
A fake Richard Branson Twitter account
promoted a London taxi service as an
“endorsement” from Branson
Paramount Entertainment impersonator blasts racist and inappropriate/offensive Tweets
FACEBOOK REACHES
1 BILLION USERS
BILLION
WITH A B
‘04
‘06
‘07
‘09 FACEBOOK REACHES
200 MILLION USERS.
‘10 MAJOR EXAMPLES OF SOCIAL FRAUD APPEAR ON TWITTER
‘12
‘13 Southwest Airlines has an impersonator on Facebook with over 1,900
followers who may not know information from the page isn’t real.
American Airlines, Jet Blue, Delta, United Airlines and Emirates were
all victims of a mass-scale scam on Instagram, promising fake VIP
deals and giveaways.
‘14
THE SOCIAL MEDIA TECHNOLOGY THAT CONNECTS US IN A DIGITAL
WORLD HAS CREATED IMMEASURABLE LEVELS OF RISK.
IMPERSONATIONS, FRAUD, SOCIAL ENGINEERING AND PHISHING
AND MALWARE CAMPAIGNS PLAGUE THE SOCIAL MEDIA UNIVERSE.
BY THE NUMB3RS
SOCIAL NETWORKS ARE NOT JUST WEBSITES -- THEY ARE BUSINESS DESTINATIONS AND POWERFUL
MARKETING TOOLS. THE VERSATILITY AND UBIQUITOUS ACCESS OF THESE SOCIAL NETWORKS CREATES
COMPLEX AND DANGEROUS RISKS. ORGANIZATIONS MUST ADDRESS CYBER, BUSINESS, AND BRAND
RISKS AS THEY BUILD THEIR SOCIAL COMMUNITIES.
OFCOMPANIES
BELIEVEEMPLOYEE
USEOFSOCIAL
MEDIAPOSESA
THREATTOTHEIR
ORGANIZATION.
72 OFUSERSSAY
THEYHAVE
BEENSENT
MALWAREVIA
ASOCIAL
MEDIASITE.
33 24OFSMBSSAY
THEYHAVEBEEN
COMPROMISED
BYEMPLOYEES
USINGSOCIAL
MEDIA
5 10% %
BETWEEN5AND10PERCENTOF
TWITTERACCOUNTSAREFAKE.
THEAVERAGECOSTTOGETFAKE
FOLLOWERSINTHEFAKEFOLLOWER
“MARKET”ISONLY$11FOR1,000.
fakebook
FACEBOOKESTIMATESTHAT
BETWEEN5.5PERCENTAND11.2
PERCENT(68TO138MILLION)OF
ITSUSERACCOUNTSAREFAKE.
DEVELOP A SOCIAL RISK POLICY
Understand the risks that social media introduces and determine which matter
to your organization
Publish policy to the team members responsible for responding to social media
threats and risks
CONTINUOUSLY MONITOR SOCIAL MEDIA
Establish a real-time monitoring process to find potential risk issues across all germane
social media platforms - not just Facebook and Twitter!
ANALYZE ISSUES & IDENTIFY RISKS
Leverage a sophisticated security analyst toolkit to analyze potential issues and identify
threats and compliance issues
PRIORITIZE BY SEVERITY & IMPACT
Categorize and prioritize response actions based on severity and business
impact of identified threats and risk issues
“Furby” children’s toy victimized by fake Instagram account. Thai
woman behind fake account steals over $200,000 (6 Million baht).
1,000 X
5.5%
11.2%
The History of
VISIT ZEROFOX.COM TO LEARN MORE
VIP
SOCIAL MEDIA USAGE HAS EXPLODED SINCE THE INITIAL DAYS OF MYSPACE. BY 2009, FACEBOOK HAD HUNDREDS OF
MILLIONS OF USERS, BECOMING THE TOP ONLINE DESTINATION FOR CONNECTED PEOPLE WORLDWIDE. NETWORKS
CONTINUE TO GROW, WITH 1 IN 3 PEOPLE IN THE WORLD PROJECTED TO USE SOCIAL MEDIA DAILY BY 2017.
REMEDIATE & MITIGATE
Execute pre-built remediation and mitigation strategy to minimize damage
Integrate cyber threat information into security systems to prevent compromise.
Work with social media networks to “takedown” malicious accounts, posts, threats
and compliance violations that exist on their platforms
1
2
3
4
5
ZEROFOX RECOMMENDATIONS

More Related Content

Similar to The History of Social Media Fraud

Social Media for financial institutions,wealth management companies,banks and...
Social Media for financial institutions,wealth management companies,banks and...Social Media for financial institutions,wealth management companies,banks and...
Social Media for financial institutions,wealth management companies,banks and...Vie Consultancy Services
 
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)Gab Billones
 
SIM 2010 Teil 1 // Theorie
SIM 2010 Teil 1 // TheorieSIM 2010 Teil 1 // Theorie
SIM 2010 Teil 1 // TheorieAndreas Cem Vogt
 
Ip issues in social media
Ip issues in social mediaIp issues in social media
Ip issues in social mediaAltacit Global
 
Rotarian’s Guide to Social Media
Rotarian’s Guide to Social MediaRotarian’s Guide to Social Media
Rotarian’s Guide to Social MediaRotary International
 
Social Media & Social Influence Marketing // Theorie
Social Media & Social Influence Marketing // TheorieSocial Media & Social Influence Marketing // Theorie
Social Media & Social Influence Marketing // TheorieAnika Klauß
 
Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpacedCameron Banks
 
WP_HidinginPlainSight-Prt1_0216_FINAL
WP_HidinginPlainSight-Prt1_0216_FINALWP_HidinginPlainSight-Prt1_0216_FINAL
WP_HidinginPlainSight-Prt1_0216_FINALEli Marcus
 

Similar to The History of Social Media Fraud (20)

MinoskyAnthony754
MinoskyAnthony754MinoskyAnthony754
MinoskyAnthony754
 
Social Media for financial institutions,wealth management companies,banks and...
Social Media for financial institutions,wealth management companies,banks and...Social Media for financial institutions,wealth management companies,banks and...
Social Media for financial institutions,wealth management companies,banks and...
 
Aug3 pres2
Aug3 pres2Aug3 pres2
Aug3 pres2
 
What Is Social Media And Why Should I Care
What Is  Social  Media And  Why  Should  I  CareWhat Is  Social  Media And  Why  Should  I  Care
What Is Social Media And Why Should I Care
 
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)
 
July28 pres2
July28 pres2July28 pres2
July28 pres2
 
SIM 2010 Teil 1 // Theorie
SIM 2010 Teil 1 // TheorieSIM 2010 Teil 1 // Theorie
SIM 2010 Teil 1 // Theorie
 
Ip issues in social media
Ip issues in social mediaIp issues in social media
Ip issues in social media
 
Social Media and Academia2015
Social Media and Academia2015Social Media and Academia2015
Social Media and Academia2015
 
Rotarian’s Guide to Social Media
Rotarian’s Guide to Social MediaRotarian’s Guide to Social Media
Rotarian’s Guide to Social Media
 
Social_Networking_Project
Social_Networking_ProjectSocial_Networking_Project
Social_Networking_Project
 
Social Media & Social Influence Marketing // Theorie
Social Media & Social Influence Marketing // TheorieSocial Media & Social Influence Marketing // Theorie
Social Media & Social Influence Marketing // Theorie
 
WISE Presentation
WISE PresentationWISE Presentation
WISE Presentation
 
Twitter Takeover
Twitter TakeoverTwitter Takeover
Twitter Takeover
 
Social Media
Social MediaSocial Media
Social Media
 
Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpaced
 
WP_HidinginPlainSight-Prt1_0216_FINAL
WP_HidinginPlainSight-Prt1_0216_FINALWP_HidinginPlainSight-Prt1_0216_FINAL
WP_HidinginPlainSight-Prt1_0216_FINAL
 
10 great-sm-stories
10 great-sm-stories10 great-sm-stories
10 great-sm-stories
 
10 great-sm-stories
10 great-sm-stories10 great-sm-stories
10 great-sm-stories
 
Aug1 pres2
Aug1 pres2Aug1 pres2
Aug1 pres2
 

More from ZeroFOX

Anatomy of and Enterprise Social Media Cyber Attack: Customer Scams
Anatomy of and Enterprise Social Media Cyber Attack: Customer ScamsAnatomy of and Enterprise Social Media Cyber Attack: Customer Scams
Anatomy of and Enterprise Social Media Cyber Attack: Customer ScamsZeroFOX
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social TakeoverZeroFOX
 
Cyber Criminals Play "Striker"
Cyber Criminals Play "Striker"Cyber Criminals Play "Striker"
Cyber Criminals Play "Striker"ZeroFOX
 
Anatomy of an Enterprise Social Cyber Attack
Anatomy of an Enterprise Social Cyber Attack Anatomy of an Enterprise Social Cyber Attack
Anatomy of an Enterprise Social Cyber Attack ZeroFOX
 
Vintage Social Media
Vintage Social MediaVintage Social Media
Vintage Social MediaZeroFOX
 
Email vs Social Media Phishing
Email vs Social Media PhishingEmail vs Social Media Phishing
Email vs Social Media PhishingZeroFOX
 

More from ZeroFOX (6)

Anatomy of and Enterprise Social Media Cyber Attack: Customer Scams
Anatomy of and Enterprise Social Media Cyber Attack: Customer ScamsAnatomy of and Enterprise Social Media Cyber Attack: Customer Scams
Anatomy of and Enterprise Social Media Cyber Attack: Customer Scams
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social Takeover
 
Cyber Criminals Play "Striker"
Cyber Criminals Play "Striker"Cyber Criminals Play "Striker"
Cyber Criminals Play "Striker"
 
Anatomy of an Enterprise Social Cyber Attack
Anatomy of an Enterprise Social Cyber Attack Anatomy of an Enterprise Social Cyber Attack
Anatomy of an Enterprise Social Cyber Attack
 
Vintage Social Media
Vintage Social MediaVintage Social Media
Vintage Social Media
 
Email vs Social Media Phishing
Email vs Social Media PhishingEmail vs Social Media Phishing
Email vs Social Media Phishing
 

The History of Social Media Fraud

  • 1. social media fraud A TIMELINE MYSPACE LAUNCHED AS A CLONE OF FRIENDSTER LINKEDIN LAUNCHED AS A SOCIAL NETWORKING SITE FOR PROFESSIONALS ‘03 FACEBOOK LAUNCHED AT HARVARD UNIVERSITY TWITTER LAUNCHED AS A SOCIAL NETWORKING AND MICRO-BLOGGING SITE. FACEBOOK LETS THIRD-PARTY DEVELOPERS CREATE FACEBOOK APPS SURPASSES MYSPACE IN MONTHLY UNIQUE VISITORS During “Deepwater Horizon” oil spill: With more than 20,000 followers at press time, the cynical response to the oil spill was twice as popular than BP's actual Twitter page, @BP_America. The vulgar rants of Yahoo's dragon lady/CEO, Carol Bartz, appeared under a fake Twitter account A fake Richard Branson Twitter account promoted a London taxi service as an “endorsement” from Branson Paramount Entertainment impersonator blasts racist and inappropriate/offensive Tweets FACEBOOK REACHES 1 BILLION USERS BILLION WITH A B ‘04 ‘06 ‘07 ‘09 FACEBOOK REACHES 200 MILLION USERS. ‘10 MAJOR EXAMPLES OF SOCIAL FRAUD APPEAR ON TWITTER ‘12 ‘13 Southwest Airlines has an impersonator on Facebook with over 1,900 followers who may not know information from the page isn’t real. American Airlines, Jet Blue, Delta, United Airlines and Emirates were all victims of a mass-scale scam on Instagram, promising fake VIP deals and giveaways. ‘14 THE SOCIAL MEDIA TECHNOLOGY THAT CONNECTS US IN A DIGITAL WORLD HAS CREATED IMMEASURABLE LEVELS OF RISK. IMPERSONATIONS, FRAUD, SOCIAL ENGINEERING AND PHISHING AND MALWARE CAMPAIGNS PLAGUE THE SOCIAL MEDIA UNIVERSE. BY THE NUMB3RS SOCIAL NETWORKS ARE NOT JUST WEBSITES -- THEY ARE BUSINESS DESTINATIONS AND POWERFUL MARKETING TOOLS. THE VERSATILITY AND UBIQUITOUS ACCESS OF THESE SOCIAL NETWORKS CREATES COMPLEX AND DANGEROUS RISKS. ORGANIZATIONS MUST ADDRESS CYBER, BUSINESS, AND BRAND RISKS AS THEY BUILD THEIR SOCIAL COMMUNITIES. OFCOMPANIES BELIEVEEMPLOYEE USEOFSOCIAL MEDIAPOSESA THREATTOTHEIR ORGANIZATION. 72 OFUSERSSAY THEYHAVE BEENSENT MALWAREVIA ASOCIAL MEDIASITE. 33 24OFSMBSSAY THEYHAVEBEEN COMPROMISED BYEMPLOYEES USINGSOCIAL MEDIA 5 10% % BETWEEN5AND10PERCENTOF TWITTERACCOUNTSAREFAKE. THEAVERAGECOSTTOGETFAKE FOLLOWERSINTHEFAKEFOLLOWER “MARKET”ISONLY$11FOR1,000. fakebook FACEBOOKESTIMATESTHAT BETWEEN5.5PERCENTAND11.2 PERCENT(68TO138MILLION)OF ITSUSERACCOUNTSAREFAKE. DEVELOP A SOCIAL RISK POLICY Understand the risks that social media introduces and determine which matter to your organization Publish policy to the team members responsible for responding to social media threats and risks CONTINUOUSLY MONITOR SOCIAL MEDIA Establish a real-time monitoring process to find potential risk issues across all germane social media platforms - not just Facebook and Twitter! ANALYZE ISSUES & IDENTIFY RISKS Leverage a sophisticated security analyst toolkit to analyze potential issues and identify threats and compliance issues PRIORITIZE BY SEVERITY & IMPACT Categorize and prioritize response actions based on severity and business impact of identified threats and risk issues “Furby” children’s toy victimized by fake Instagram account. Thai woman behind fake account steals over $200,000 (6 Million baht). 1,000 X 5.5% 11.2% The History of VISIT ZEROFOX.COM TO LEARN MORE VIP SOCIAL MEDIA USAGE HAS EXPLODED SINCE THE INITIAL DAYS OF MYSPACE. BY 2009, FACEBOOK HAD HUNDREDS OF MILLIONS OF USERS, BECOMING THE TOP ONLINE DESTINATION FOR CONNECTED PEOPLE WORLDWIDE. NETWORKS CONTINUE TO GROW, WITH 1 IN 3 PEOPLE IN THE WORLD PROJECTED TO USE SOCIAL MEDIA DAILY BY 2017. REMEDIATE & MITIGATE Execute pre-built remediation and mitigation strategy to minimize damage Integrate cyber threat information into security systems to prevent compromise. Work with social media networks to “takedown” malicious accounts, posts, threats and compliance violations that exist on their platforms 1 2 3 4 5 ZEROFOX RECOMMENDATIONS