FBI Internet Social Networking Risks
Internet-based social networking sites have created a revolution in social connectivity. However, con artists, criminals, and other dishonest actors are exploiting this capability for nefarious purposes.
There are primarily two tactics used to exploit online social networks. In practice, they are often combined.
1. Computer savvy hackers who specialize in writing and manipulating computer code to gain access or install unwanted software on your computer or phone.
2. Social or human hackers who specialize in exploiting personal connections through social networks. Social hackers, sometimes referred to as social engineers, manipulate people through social interactions (in person, over the phone, or in writing).
Humans are a weak link in cyber security, and hackers and social manipulators know this. They try to trick people into getting past security walls. They design their actions to appear harmless and legitimate.
Falling for an online scam or computer hack could be damaging for an individual victim as well as the organization the victim works for. Such risks include:
Vulnerability of Social Networking Sites
Social networking sites are Internet-based services that allow people to communicate and share information with a group.
Risks:
Once information is posted to a social networking site, it is no longer private. The more information you post, the more vulnerable you may become. Even when using high security settings, friends or websites may inadvertently leak your information.
Personal information you share could be used to conduct attacks against you or your associates. The more information shared, the more likely someone could impersonate you and trick one of your friends into sharing personal information, downloading malware, or providing access to restricted sites.
Predators, hackers, business competitors, and foreign state actors troll social networking sites looking for information or people to target for exploitation.
Information gleaned from social networking sites may be used to design a specific attack that does not come by way of the social networking site.
Tactics:
Baiting - Someone gives you a USB drive or other electronic media that is preloaded with malware in the hope you will use the device and enable them to hack your computer.
Do not use any electronic storage device unless you know its origin is legitimate and safe. Scan all electronic media for viruses before use.
Click-jacking - Concealing hyperlinks beneath legitimate clickable content which, when clicked, causes a user to unknowingly perform actions, such as downloading malware, or sending your ID to a site. Numerous click-jacking scams have employed Like and Share buttons on social networking sites. Disable scripting and iframes in whatever Internet browser you use. Research other ways to set your browser options to maximize security.
Cross-Site Scripting (XSS) - Malicious code is injected into a benign or trusted website. A Stored XSS Attack is when malicious code is permanently stored on a server; a computer is compromised when requesting the stored data. A Reflected XSS Attack is when a person is tricked into clicking on a malicious link; the injected code travels to the server then reflects the attack back to the victims browser. The computer deems the code is from a trusted source.
Turn off HTTP TRACE support on all webservers. Research additional ways to prevent becoming a victim of XSS.
Doxing - Publicly releasing a persons identifying information including full name, date of birth, address, and pictures typically retrieved from social networking site profiles.
Be careful what information you share about yourself, family, and friends (online, in print, and in person).
Elicitation - The strategic use of conversation to extract information from people without giving them the feeling they are being interrogated. Be aware of elicitation tactics and the way social engineers try to obtain personal information.
Pharming - Redirecting users from legitimate websites to fraudulent ones for the purpose of extracting confidential data. (E.g.: mimicking bank websites.)
Watch out for website URLs that use variations in spelling or domain names, or use .com instead of .gov, for example. Type a websites address rather than clicking on a link.
Example: Most computer infections come from websites. Just visiting a website can expose your computer to malware even if you do not download a file or program. Often legitimate sites may be unknowingly infected. Websites with information on popular celebrities or current sensational news items are frequently hijacked by criminals, or criminals may create such websites to lure victims to them.
Phishing - Usually an email that looks like it is from a legitimate organization or person, but is not and contains a link or file with malware. Phishing attacks typically try to snag any random victim. Spear phishing attacks target a specific person or organization as their intended victim.
Do not open email or email attachments or click on links sent from people you do not know. If you receive a suspicious email from someone you know, ask them about it before opening it.
Example: In March 2011, hackers sent two spear phishing emails to a small group of employees at security firm, RSA. They only needed one employee to open an infected file and launch the malware. The malware downloaded information from RSA that then helped the hackers learn how to defeat RSAs security token. In May and June 2011, a number of defense contractors networks were breached via the compromised RSA token.
Phreaking - Gaining unauthorized access to telecommunication systems.
Do not provide secure phone numbers that provide direct access to a Private Branch Exchange or through the Public Branch Exchange to the public phone network.
Scams - Fake deals that trick people into providing money, information, or service in exchange for the deal.
If it sounds too good to be true, it is most likely a scam. Cybercriminals use popular events and news stories as bait for people to open infected email, visit infected websites, or donate money to bogus charities.
Example:Before the 2010 World Cup, cybercriminals offered tickets for sale or sent phishing emails claiming you won tickets to see the event.
After the death of Osama Bin Laden, a video claiming to show Bin Ladens capture was posted on Facebook. The video was a fake. When users clicked on the link to the video, they were told to copy a JavaScript code into their browser bar which automatically sent the hoax to their friends, and gave the hackers full access to their account.
Spoofing - Deceiving computers or computer users by hiding or faking ones identity. Email spoofing utilizes a sham email address or simulates a genuine email address. IP spoofing hides or masks a computers IP address.
Know your co-workers and clients and beware of those who impersonate a staff member or service provider to gain company or personal information.
Preventive Measures at Work:
Additional Preventive Measures:
No legitimate service or network administrator will ask you for your password.
Educational Resources:
A number of organizations and websites provide additional details on how to protect you and your workplace from social networking threats.
http://www.LooksTooGoodToBeTrue.com http://www.OnGuardOnline.gov http://www.us-cert.gov http://www.ic3.gov http://www.dhs.gov http://www.ftc.gov http://www.fbi.gov
See more here:
FBI Internet Social Networking Risks
- Which social network is best for small accounts? The best algorithms for growing without paying - Revista Merca2.0 - May 3rd, 2025 [May 3rd, 2025]
- US Enforces Tougher Visa Checks With Mandatory Disclosure Of Social Media Accounts From The Last Five Years - Travel And Tour World - May 3rd, 2025 [May 3rd, 2025]
- How hard is it to balance police work with social medias influence? - School News Network - May 3rd, 2025 [May 3rd, 2025]
- Polis veto on social media bill stands after lawmakers failed to override - KDVR - May 3rd, 2025 [May 3rd, 2025]
- FTC v. Meta live: updates from the battle for Instagram and WhatsApp - The Verge - May 3rd, 2025 [May 3rd, 2025]
- Heineken Turns Anti-Social - Media, That Is 04/29/2025 - MediaPost - May 2nd, 2025 [May 2nd, 2025]
- Heineken taps Joe Jonas to ditch social media and pour into real connections - Marketing-Interactive - May 2nd, 2025 [May 2nd, 2025]
- Europeans are leaving the social network Mask X en masse - Mezha.Media - May 2nd, 2025 [May 2nd, 2025]
- Elon Musks X social network lost 10% of its users from Europe in six months. Reasons - - May 2nd, 2025 [May 2nd, 2025]
- Heineken campaign imagines an influencer crisis in a world without social media followers - Campaign Brief - May 2nd, 2025 [May 2nd, 2025]
- Joe Jonas and Dude With Sign Team Up to Celebrate Life Off Social Media - That Eric Alper - May 2nd, 2025 [May 2nd, 2025]
- Joe Jonas and Heineken bring in a social media apocalypse in new ad - afaqs! - May 2nd, 2025 [May 2nd, 2025]
- Divisive forces spreading hate on social media must be identified, dealt with firmly: Mehbooba Mufti - asianewsnetwork.net - May 2nd, 2025 [May 2nd, 2025]
- Socontra: social network for AI agent-to-agent interaction set to automate online shopping - Eagle-Tribune - May 2nd, 2025 [May 2nd, 2025]
- Survey: More than four in 10 teens say social media harms their sleep - The Star - May 2nd, 2025 [May 2nd, 2025]
- Mark Zuckerberg Says Social Media Is Over - The New Yorker - April 25th, 2025 [April 25th, 2025]
- Prince Harry and Meghan Markle are 'grateful' that Prince Archie and Princess Lilibet are too young for social media - Business Insider - April 25th, 2025 [April 25th, 2025]
- Morgan Stanley believed Google would rival Facebook if the search giant could beat Mark Zuckerberg to scooping up WhatsApp - Fortune - April 25th, 2025 [April 25th, 2025]
- Australian leaders vow to stand firm on social media age limits as election nears - Reuters - April 25th, 2025 [April 25th, 2025]
- My Company Competed Against Facebook. Here's What Happened | Opinion - Newsweek - April 25th, 2025 [April 25th, 2025]
- Layboard Launches Innovative Social Network for Job Searching and Career Growth - Reuters - April 25th, 2025 [April 25th, 2025]
- Abrego Garcia family flees to safe house after Trump DHS posts home address on social media - The Real News Network - April 25th, 2025 [April 25th, 2025]
- Opinion: Morning routines are a myth and serve as social media gimmicks - lsureveille.com - April 25th, 2025 [April 25th, 2025]
- Gen Zs Underground Social Network Just Went National And Its Blowing Up - Forbes - April 25th, 2025 [April 25th, 2025]
- Fans React to Jameson Williams Not Following Lions on Social Media - Sports Illustrated - April 25th, 2025 [April 25th, 2025]
- OpenAI may be creating a new social media platform with AI-generated images - Tech Edition - April 25th, 2025 [April 25th, 2025]
- B3 partner with Reach Labs to launch user acquisition platform and GameChain - VentureBeat - April 25th, 2025 [April 25th, 2025]
- OpenAIs Reportedly Exploring Its Own AI-Based Social Network - Social Media Today - April 16th, 2025 [April 16th, 2025]
- OpenAI launches its Social Network: the new frontier of the data war - The Cryptonomist - April 16th, 2025 [April 16th, 2025]
- OpenAI is reportedly developing its own X-like social media platform - TechCrunch - April 16th, 2025 [April 16th, 2025]
- What Meta stands to lose if the FTC wins - Quartz - April 16th, 2025 [April 16th, 2025]
- Instagram and Facebook are hardly social media apps anymore. Here's the proof. - Business Insider - April 16th, 2025 [April 16th, 2025]
- FTC Antitrust Case Against Meta Heads to Trial This Week - Social Media Today - April 16th, 2025 [April 16th, 2025]
- OpenAI might be building its own social network, and we really hope they don't - TechRadar - April 16th, 2025 [April 16th, 2025]
- OpenAI Takes On Elon Musk By Creating Its Own Social Network! - Cointribune - April 16th, 2025 [April 16th, 2025]
- OpenAI is building its own social network to rival Elon Musk's X - Crypto Briefing - April 16th, 2025 [April 16th, 2025]
- OpenAI reportedly creating its own social network to take on X - Tom's Guide - April 16th, 2025 [April 16th, 2025]
- Behind the landmark trial that could reshape Metas future with Instagram - Los Angeles Times - April 16th, 2025 [April 16th, 2025]
- OpenAI is quietly working on a social network similar to Twitter, powered by ChatGPT - TechSpot - April 16th, 2025 [April 16th, 2025]
- OpenAI Reportedly Developing Social Media Platform Amid Ongoing Feud Between Musk, Altman - BW Businessworld - April 16th, 2025 [April 16th, 2025]
- OpenAI braced to challenge Elon Musks X with new social network - The Times - April 16th, 2025 [April 16th, 2025]
- Meta faces antitrust claims at trial over Instagram and WhatsApp ownership - The Guardian - April 16th, 2025 [April 16th, 2025]
- Like Musk, but with ChatGPT: OpenAI is working on its own social network similar to X - ITC.ua - April 16th, 2025 [April 16th, 2025]
- OpenAI may be turning ChatGPT into a social media platform - Android Authority - April 16th, 2025 [April 16th, 2025]
- Creative ChatGPT They are planning their own social network and it will be quite unique! LSA Magazine - Letem svtem Applem - April 16th, 2025 [April 16th, 2025]
- OpenAI is working on X-like social media network, the Verge reports - MarketScreener - April 16th, 2025 [April 16th, 2025]
- Will Meta be forced to sell Instagram and WhatsApp in FTC trial? - Bizcommunity - April 16th, 2025 [April 16th, 2025]
- Body talk on social networking sites and appearance anxiety among college students: the mediating role of self-objectification and moderating role of... - April 10th, 2025 [April 10th, 2025]
- I Tried Seven39, the Social Network That's Only Open Three Hours a Day - Lifehacker - April 10th, 2025 [April 10th, 2025]
- Mapping ISKPs Strength: Social Network Analysis of Tech-Driven Jihad - Global Network on Extremism and Technology - April 10th, 2025 [April 10th, 2025]
- ION and HyperGPT Unite to Power AI-Driven Web3 Social Networks - CoinTrust - April 10th, 2025 [April 10th, 2025]
- College Student Shares Why She Deleted All Socials and What Life Is Like Without It - The Flagler College Gargoyle - April 10th, 2025 [April 10th, 2025]
- CRD is shutting down its X account, saying platform 'rife with misinformation' - Times Colonist - April 10th, 2025 [April 10th, 2025]
- Social Network: Is the mental health of teenagers in danger? - evidencenetwork.ca - April 10th, 2025 [April 10th, 2025]
- Leo, Daily Horoscope Today, April 10, 2025: Business owners will find success through social networking - Times of India - April 10th, 2025 [April 10th, 2025]
- Daily time spent on social networking by internet users - the-star.co.ke - April 10th, 2025 [April 10th, 2025]
- Young people and the pressure to be perfect like on social media - baohaiduong.vn - April 10th, 2025 [April 10th, 2025]
- CSC urged to recall memo on social media use of gov't personnel - GMA Network - April 10th, 2025 [April 10th, 2025]
- Woman charged for hit-and-run death allegedly posted about victim on social media after the crash - KBTX News 3 - April 8th, 2025 [April 8th, 2025]
- LinkedIn reveals best places to work - 9Now - April 8th, 2025 [April 8th, 2025]
- Chamber showcase fills Union Station with real-life social networking for small biz owners - Startland News - April 5th, 2025 [April 5th, 2025]
- Beyond Bluesky: These are the apps building social experiences on the AT Protocol - TechCrunch - April 5th, 2025 [April 5th, 2025]
- Modeling the amplification of epidemic spread by individuals exposed to misinformation on social media - Nature - April 5th, 2025 [April 5th, 2025]
- Gen Z is flocking to the one social media platform millennials didn't ruin - Business Insider - April 5th, 2025 [April 5th, 2025]
- Whistlr Network: The Real-Time, Unfiltered Social Media, That - openPR.com - April 5th, 2025 [April 5th, 2025]
- EU may make an example of X by issuing $1 billion fine to Musks social network - Ars Technica - April 5th, 2025 [April 5th, 2025]
- Mark Zuckerberg Apparently Bought Jesse Eisenberg's "The Social Network" T-Shirt, And I'm A Little Weirded Out - BuzzFeed - April 5th, 2025 [April 5th, 2025]
- Is X Going To Pay The Price? Europe Is Preparing Historic Sanctions Against Elon Musk. - Cointribune - April 5th, 2025 [April 5th, 2025]
- Truth Social owner Trump Media becomes first company listed on NYSE Texas handing early win to exchange - New York Post - April 5th, 2025 [April 5th, 2025]
- Mark Zuckerberg wears iconic t-shirt from The Social Network, reveals he got it in auction - Mint - April 5th, 2025 [April 5th, 2025]
- Immigration officials look to collect social media handles from those seeking benefits. Is this new? - The Tribune-Democrat - April 5th, 2025 [April 5th, 2025]
- Cryptocurrency and Extremism: How Social Network Analysis is Used to Track Extremist Cryptocurrency Donations - GNET - March 25th, 2025 [March 25th, 2025]
- New bill would require warning labels on social media platforms - KSTP - March 25th, 2025 [March 25th, 2025]
- Japan Grapples with Risks of Social Media in Pursuing Options for Protecting Children Online - Nippon.com - March 25th, 2025 [March 25th, 2025]
- Gabe Newell had his eyes on a social network in the '90s that 'was not in a games context at all'meaning Valve-owned social media could've been a very... - March 25th, 2025 [March 25th, 2025]
- Tired of traditional social media? Here are 4 reasons why Substack is my go-to social media app - ZDNet - March 25th, 2025 [March 25th, 2025]
- Skip the post-trip laundry stress with the new features of Wingle, a free in-flight networking app for travellers - indulgexpress - March 25th, 2025 [March 25th, 2025]
- Social media's impact: Driving business strategies from marketing to ROI - ZAWYA - March 25th, 2025 [March 25th, 2025]
- What Is Meta AI? Everything You Should Know About the Social Network Giant's AI Tools - CNET - March 25th, 2025 [March 25th, 2025]
- The art and science of going viral in 2025 - Computerworld - March 25th, 2025 [March 25th, 2025]