{"id":748,"date":"2009-10-25T21:28:23","date_gmt":"2009-10-26T02:28:23","guid":{"rendered":"http:\/\/www.skipease.com\/blog\/?p=748"},"modified":"2016-06-07T07:55:40","modified_gmt":"2016-06-07T12:55:40","slug":"social-networks-used-for-phishing-attacks","status":"publish","type":"post","link":"https:\/\/www.skipease.com\/blog\/social-networks\/social-networks-used-for-phishing-attacks\/","title":{"rendered":"Social Networking Criminals Go Phishing"},"content":{"rendered":"<p>Tech savvy crooks and criminals are increasingly using popular social networks like Facebook, Twitter and MySpace as tools for their latest phishing schemes.<\/p>\n<p>Cybercrooks realize that popular social networks contain a wealth of personal information contributed by their growing user base.<\/p>\n<p>Over the past 3 years almost 3,200 account hijacking cases on social networks were reported to the Internet Crime Complaint Center. The Internet Crime Complaint Center is a partnership between the FBI; the National White Collar Crime Center and the Bureau of Justice Assistance.<\/p>\n<p>Fake profile updates, emails, video and links are used to trick social network users into revealing personal information about themselves on scam sites, including logon IDs and passwords.<\/p>\n<p>Once a person&#8217;s social network account is hacked, the criminals can trick their list of friends and repeat the crime on other people. Social networks provide plenty of opportunity to trick more people &#8211; the average Facebook user has 120 friends on their list.<\/p>\n<p>The huge growth in social networks has created great tools for cybercriminals. Facebook alone has 300 million registered people.<\/p>\n<p>Cybercriminals are experts at using social engineering to trick people. They can use a friend&#8217;s social network profile to trick you into thinking the said person is in trouble and needs financial help, causing some to give out personal and financial information.<\/p>\n<p>A 2005 study from Indiana University showed that as much as 70% of social network phishing scams are successful.<\/p>\n<p>The Internet Crime Complaint Center received over 72,000 complaints about Internet fraud in 2008 that amounted to $264.6 million in financial loss, with each victim losing an average of $931 USD.<\/p>\n<p>Social networks are responding to this new threat.<\/p>\n<p>Facebook has created computer systems that detect phished user accounts. They can recognize and lock user accounts that send an unusually high amount of messages to friends.<\/p>\n<p>MySpace compiles blacklists of phony user accounts to stop people from clicking on phishing links.<\/p>\n<p>Source: <a href=\"http:\/\/www.cnn.com\/2009\/TECH\/10\/24\/tech.social.networking.crimes\/\">CNN<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tech savvy crooks and criminals are increasingly using popular social networks like Facebook, Twitter and MySpace as tools for their latest phishing schemes. Cybercrooks realize that popular social networks contain a wealth of personal information contributed by their growing user base. Over the past 3 years almost 3,200 account hijacking cases on social networks were [&#8230;]<\/p>\n<p><a class=\"btn btn-secondary understrap-read-more-link\" href=\"https:\/\/www.skipease.com\/blog\/social-networks\/social-networks-used-for-phishing-attacks\/\">Read More&#8230;<span class=\"screen-reader-text\"> from Social Networking Criminals Go Phishing<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-748","post","type-post","status-publish","format-standard","hentry","category-social-networks"],"_links":{"self":[{"href":"https:\/\/www.skipease.com\/blog\/wp-json\/wp\/v2\/posts\/748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.skipease.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.skipease.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.skipease.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.skipease.com\/blog\/wp-json\/wp\/v2\/comments?post=748"}],"version-history":[{"count":4,"href":"https:\/\/www.skipease.com\/blog\/wp-json\/wp\/v2\/posts\/748\/revisions"}],"predecessor-version":[{"id":5987,"href":"https:\/\/www.skipease.com\/blog\/wp-json\/wp\/v2\/posts\/748\/revisions\/5987"}],"wp:attachment":[{"href":"https:\/\/www.skipease.com\/blog\/wp-json\/wp\/v2\/media?parent=748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.skipease.com\/blog\/wp-json\/wp\/v2\/categories?post=748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.skipease.com\/blog\/wp-json\/wp\/v2\/tags?post=748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}