Social estimated to be more than three

Social networking’s tremendous growth has created a breeding ground for hackers to engage in cybercrime. In this lesson, you’ll learn more about how cybercriminals use social networking for illegal purposes.

Social Crime Time

In 2013, the stock market lost more than $130 billion in value thanks to one event. No, it wasn’t a global crisis.

Our Authors Write a Custom Essay
For Only $13.90/page!


order now

A war hadn’t broken out. And, there were no changes to fiscal or monetary policies. Instead, the dip was attributed to a single source: social media. Hackers gained control of the Twitter account of the Associated Press and posted an erroneous ”news story” that a bomb had been detonated in the White House in Washington, D.C. The fake story caused the Dow to drop 150 points, roughly equivalent to $136 billion, though it eventually rebounded.This is one example of how social networks are used for mischievous purposes, and there are plenty of others.

Scammers used actor Robin Williams’ death to encourage people to share a fake video that ultimately caused a fake file to be downloaded to users’ devices. Criminals on fake Instagram accounts posted photos of supposed lottery winners, offering to share their bounty with anyone who followed their account. Once the account grew to a sizable following, the account owners sold the account and all of its followers to someone else.

On Twitter, cybercriminals often post malicious URLs that look legitimate in hopes of getting users to click – and subsequently infect their devices.

The rise of social networking has created an atmosphere for increased cybercrime.
social, networks, cybercrime, cyber, crime, hackers


The growing use of social media, now estimated to be more than three billion users worldwide, provides fertile ground for hackers looking to commit cybercrime. Cybercrime is an easy way to target people because it requires only a computer, an internet connection, and criminal intent. The evidence of how simple it is to commit cybercrimes is in the number of victims estimated to have been targeted in 2017: nearly one billion people!

Common Cybercrimes in Social Networking

Let’s take a look at some of the most common types of cybercrimes impacting social media networks.

The prevalence of social media usage and the ability to interact anonymously are two of the biggest reasons why cybercrimes on social networking sites have gone wild. Here are a few examples of the most popular types of attacks perpetrated on social media.

Malware

When you click on links you don’t recognize, or open attachments sent by people on your friend list, you are opening yourself up to the potential of a malware infection. Malware is malicious software designed to cripple or take over your computer system. In essence, it installs a virus onto your machine. Always verify that the source of the file is legitimate before clicking on or downloading any files.

Reconnaissance

Reconnaissance isn’t just for police officers, cybercriminals conduct their own type of reconnaissance or surveillance to look for people on social media to prey on. This information is then turned into fake social media profiles, so they can impersonate someone, perhaps a boss or a friend, to get you to reveal sensitive information they can use to take advantage of a particular situation.

Social Engineering

Social engineering is another way cybercriminals steal people’s identities and attempt to use false social media accounts for personal or financial gain. Often, this works by hackers gathering information about a particular person and then using that information to construct phishing emails or other forms of communications to gain access to individuals’ personal or financial details.

False Flags

Have you ever gotten an email that seemed a little off? Some hackers impersonate social media sites and send site users emails as a way of gaining access to a user’s profile. These fake emails often appear in the form of a ”reset your password” reminder.

Location Data

Some cybercrimes help criminals bridge the gap between the digital world and the real one.

Cybercriminals may observe that a user is out of town on vacation, or they may observe that a user has tagged themselves at a certain location. The criminals then use that information to burglarize a home or business. Geolocation details, that is where the photo was taken, have also been attributed to more serious crimes such as child abduction.

Ransomware

Ransomware is malicious software that, once downloaded to your computer, can prevent you from accessing your data or even an entire website. The cybercriminal responsible then demands a payment, or ransom, to regain access to your data. Ransomware can enter your computer system when you click on links or download items from social media sites.

Selling Stolen Data

Facebook, in particular, has been ground zero for many criminals looking to trade or sell stolen data. Hackers gain access to stolen credit card details or other personal information.

Then, they can search for like-minded criminals on the platform and find other cybercriminals willing to buy the stolen data. In this way, social media acts as a marketplace for criminal behaviors.

Lesson Summary

Cybercrime has breached social media networks, thanks to both increased users and increased use. Hackers look for opportunities to gain access to people’s accounts, personal or financial information, typically through suspicious links or downloads. Malware and ransomware are two types of malicious software that can take over your computer, giving cybercriminals access to your data and network. Phishing scams, such as emails or other forms of communications created to gain access to personal or financial details, can originate from fake, but realistic-looking, social media profiles. Social media is also used by cybercriminals to conduct reconnaissance on unsuspecting targets, to sell stolen data and to note when users are on vacation in order to gain access to their homes.

x

Hi!
I'm Sigvald

Do you need a custom essay? How about ordering an essay here?

Check it out