FBI Internet Social Networking Risks
Internet-based social networking sites have created a revolution in social connectivity. However, con artists, criminals, and other dishonest actors are exploiting this capability for nefarious purposes.
There are primarily two tactics used to exploit online social networks. In practice, they are often combined.
1. Computer savvy hackers who specialize in writing and manipulating computer code to gain access or install unwanted software on your computer or phone.
2. Social or human hackers who specialize in exploiting personal connections through social networks. Social hackers, sometimes referred to as social engineers, manipulate people through social interactions (in person, over the phone, or in writing).
Humans are a weak link in cyber security, and hackers and social manipulators know this. They try to trick people into getting past security walls. They design their actions to appear harmless and legitimate.
Falling for an online scam or computer hack could be damaging for an individual victim as well as the organization the victim works for. Such risks include:
Vulnerability of Social Networking Sites
Social networking sites are Internet-based services that allow people to communicate and share information with a group.
Risks:
Once information is posted to a social networking site, it is no longer private. The more information you post, the more vulnerable you may become. Even when using high security settings, friends or websites may inadvertently leak your information.
Personal information you share could be used to conduct attacks against you or your associates. The more information shared, the more likely someone could impersonate you and trick one of your friends into sharing personal information, downloading malware, or providing access to restricted sites.
Predators, hackers, business competitors, and foreign state actors troll social networking sites looking for information or people to target for exploitation.
Information gleaned from social networking sites may be used to design a specific attack that does not come by way of the social networking site.
Tactics:
Baiting - Someone gives you a USB drive or other electronic media that is preloaded with malware in the hope you will use the device and enable them to hack your computer.
Do not use any electronic storage device unless you know its origin is legitimate and safe. Scan all electronic media for viruses before use.
Click-jacking - Concealing hyperlinks beneath legitimate clickable content which, when clicked, causes a user to unknowingly perform actions, such as downloading malware, or sending your ID to a site. Numerous click-jacking scams have employed Like and Share buttons on social networking sites. Disable scripting and iframes in whatever Internet browser you use. Research other ways to set your browser options to maximize security.
Cross-Site Scripting (XSS) - Malicious code is injected into a benign or trusted website. A Stored XSS Attack is when malicious code is permanently stored on a server; a computer is compromised when requesting the stored data. A Reflected XSS Attack is when a person is tricked into clicking on a malicious link; the injected code travels to the server then reflects the attack back to the victims browser. The computer deems the code is from a trusted source.
Turn off HTTP TRACE support on all webservers. Research additional ways to prevent becoming a victim of XSS.
Doxing - Publicly releasing a persons identifying information including full name, date of birth, address, and pictures typically retrieved from social networking site profiles.
Be careful what information you share about yourself, family, and friends (online, in print, and in person).
Elicitation - The strategic use of conversation to extract information from people without giving them the feeling they are being interrogated. Be aware of elicitation tactics and the way social engineers try to obtain personal information.
Pharming - Redirecting users from legitimate websites to fraudulent ones for the purpose of extracting confidential data. (E.g.: mimicking bank websites.)
Watch out for website URLs that use variations in spelling or domain names, or use .com instead of .gov, for example. Type a websites address rather than clicking on a link.
Example: Most computer infections come from websites. Just visiting a website can expose your computer to malware even if you do not download a file or program. Often legitimate sites may be unknowingly infected. Websites with information on popular celebrities or current sensational news items are frequently hijacked by criminals, or criminals may create such websites to lure victims to them.
Phishing - Usually an email that looks like it is from a legitimate organization or person, but is not and contains a link or file with malware. Phishing attacks typically try to snag any random victim. Spear phishing attacks target a specific person or organization as their intended victim.
Do not open email or email attachments or click on links sent from people you do not know. If you receive a suspicious email from someone you know, ask them about it before opening it.
Example: In March 2011, hackers sent two spear phishing emails to a small group of employees at security firm, RSA. They only needed one employee to open an infected file and launch the malware. The malware downloaded information from RSA that then helped the hackers learn how to defeat RSAs security token. In May and June 2011, a number of defense contractors networks were breached via the compromised RSA token.
Phreaking - Gaining unauthorized access to telecommunication systems.
Do not provide secure phone numbers that provide direct access to a Private Branch Exchange or through the Public Branch Exchange to the public phone network.
Scams - Fake deals that trick people into providing money, information, or service in exchange for the deal.
If it sounds too good to be true, it is most likely a scam. Cybercriminals use popular events and news stories as bait for people to open infected email, visit infected websites, or donate money to bogus charities.
Example:Before the 2010 World Cup, cybercriminals offered tickets for sale or sent phishing emails claiming you won tickets to see the event.
After the death of Osama Bin Laden, a video claiming to show Bin Ladens capture was posted on Facebook. The video was a fake. When users clicked on the link to the video, they were told to copy a JavaScript code into their browser bar which automatically sent the hoax to their friends, and gave the hackers full access to their account.
Spoofing - Deceiving computers or computer users by hiding or faking ones identity. Email spoofing utilizes a sham email address or simulates a genuine email address. IP spoofing hides or masks a computers IP address.
Know your co-workers and clients and beware of those who impersonate a staff member or service provider to gain company or personal information.
Preventive Measures at Work:
Additional Preventive Measures:
No legitimate service or network administrator will ask you for your password.
Educational Resources:
A number of organizations and websites provide additional details on how to protect you and your workplace from social networking threats.
http://www.LooksTooGoodToBeTrue.com http://www.OnGuardOnline.gov http://www.us-cert.gov http://www.ic3.gov http://www.dhs.gov http://www.ftc.gov http://www.fbi.gov
See more here:
FBI Internet Social Networking Risks
- AI Agents Get Their Own Social Network - And It's Existential - The Tech Buzz - February 2nd, 2026 [February 2nd, 2026]
- OpenAI Wants To Use Biometrics To Kill Bots And Create Humans Only Social Network - Forbes - February 2nd, 2026 [February 2nd, 2026]
- AI agents social network becomes talk of the town - The Economic Times - February 2nd, 2026 [February 2nd, 2026]
- What a Chaotic Social Network for AI Agents Reveals About the Future of Booking - Skift - February 2nd, 2026 [February 2nd, 2026]
- Theres a social network for AI agents, and its getting weird - The Verge - February 2nd, 2026 [February 2nd, 2026]
- Where bots go to socialize: Inside Moltbook, the AI-only social network - Washington Times - February 2nd, 2026 [February 2nd, 2026]
- AI Bots Built Their Own Social Network With 32,000 MembersNow Things Are Getting Strange - Technology Org - February 2nd, 2026 [February 2nd, 2026]
- The First Year of AI Social Networking: The Machine - to - Machine Interaction Revolution of Moltbook and New Industry Opportunities - 36 Kr - February 2nd, 2026 [February 2nd, 2026]
- Inside Moltbook: the social network where AI agents talk to each other - Financial Times - February 2nd, 2026 [February 2nd, 2026]
- Is Moltbook, the social network for AI agents, actually real? Kind of - The Daily Dot - February 2nd, 2026 [February 2nd, 2026]
- AI Agents Create Their Own Religion on New Machine-Only Social Network - GreekReporter.com - February 2nd, 2026 [February 2nd, 2026]
- AI Agents Have Their Own Social Network Now, and They Would Like a Little Privacy - Gizmodo - February 2nd, 2026 [February 2nd, 2026]
- Bots Have Their Own Social Networkand Its Where They Gripe About Humans - La Voce di New York - February 2nd, 2026 [February 2nd, 2026]
- Pleasant Hub is a new social network for adults aged 55+ with no algorithms or politics - and a design firmly rooted in the past - BetaNews - February 2nd, 2026 [February 2nd, 2026]
- Inside the AI Social Network Where 1.5 Million Bots Are Having an Existential Meltdown - Gadget Review - February 2nd, 2026 [February 2nd, 2026]
- Inside Moltbook: the Reddit for AI Where Bots Build Their Own Society - eWeek - February 2nd, 2026 [February 2nd, 2026]
- 'How to sell your human?': Chats on AI-only social network 'Moltbook' have netizens fearing an uprising - Times of India - February 2nd, 2026 [February 2nd, 2026]
- A new AI religion has been born on the social networking site 'Moltbook' for AI agents, and its doctrines, such as 'memory is sacred,' are becoming a... - February 2nd, 2026 [February 2nd, 2026]
- What is Moltbook: the social media network where only AI bots are allowed - Neowin - February 2nd, 2026 [February 2nd, 2026]
- Inside Moltbook, the Strange Social Network Where AI Agents Talk Only to Each Other - ucstrategies.com - February 2nd, 2026 [February 2nd, 2026]
- Meta, TikTok and YouTube heading to trial to defend against youth addiction, mental health harm claims - CNN - January 26th, 2026 [January 26th, 2026]
- Social media bans dont work but theyre still worthwhile - The Boston Globe - January 26th, 2026 [January 26th, 2026]
- Woman arrested for recruiting people on social media to assassinate Trump - weau.com - January 26th, 2026 [January 26th, 2026]
- Weather influencers are going viral. How much should we trust them? - NPR - January 26th, 2026 [January 26th, 2026]
- Social network UpScrolled sees surge in downloads following TikToks US takeover - TechCrunch - January 26th, 2026 [January 26th, 2026]
- A crypto social media networks failure raises an awkward question: Is blockchain good for anything beside finance? - Fortune - January 26th, 2026 [January 26th, 2026]
- Solidarity is a verb: going beyond social media posts, marches and demos - Right to Remain - January 26th, 2026 [January 26th, 2026]
- I have always spoken about social media and the power of social media. For the good and for the bad, David Beckham said. - facebook.com - January 24th, 2026 [January 24th, 2026]
- How FTC v. Meta Reshapes the Debate on Social Media and First Amendment Protections - promarket.org - January 24th, 2026 [January 24th, 2026]
- Vitalik Buterin: Full Return to Decentralized Social Networking in 2026 - Yahoo! Tech - January 24th, 2026 [January 24th, 2026]
- The Federal Trade Commission Won't Give Up Its Crusade Against Meta - Reason Magazine - January 24th, 2026 [January 24th, 2026]
- Sermo: A Social Network Made Just For NPs and PAs - Nurse.org - January 24th, 2026 [January 24th, 2026]
- 20 Forgotten Social Media Platforms That Once Ruled the Internet - AOL.com - January 24th, 2026 [January 24th, 2026]
- Among the world's major countries, Australia is the first country to ban users under the age of 16 f.. - - January 24th, 2026 [January 24th, 2026]
- Vitalik Buterins Revolutionary Return to Decentralized Social Media Promises Authentic Web3 Communication - Bitget - January 24th, 2026 [January 24th, 2026]
- X is the latest social network to copy Blueskys starter packs. - The Verge - January 24th, 2026 [January 24th, 2026]
- After Threads Overtakes X: Meta's Social Siege and Monetization Challenges - - January 24th, 2026 [January 24th, 2026]
- Neo-Nazis told to limit gathering sizes and coached to avoid arrest - Australian Broadcasting Corporation - January 24th, 2026 [January 24th, 2026]
- Jonathan Haidt Brings New Evidence to the Battle Against Social Media - The New York Times - January 18th, 2026 [January 18th, 2026]
- Why LinkedIn is a hunting ground for threat actors and how to protect yourself - WeLiveSecurity - January 18th, 2026 [January 18th, 2026]
- The Hot Social Network Is LinkedIn? - Economist Writing Every Day - January 18th, 2026 [January 18th, 2026]
- Bluesky rolls out cashtags and LIVE badges amid a boost in app installs - TechCrunch - January 18th, 2026 [January 18th, 2026]
- World-first social media wargame reveals how AI bots can swing elections - The Conversation - January 18th, 2026 [January 18th, 2026]
- More than 4.7m social media accounts blocked after Australias under-16 ban came into force, PM says - The Guardian - January 18th, 2026 [January 18th, 2026]
- Social Media site X crashes, tens of thousands of users affected worldwide - The Eastleigh Voice - January 18th, 2026 [January 18th, 2026]
- Heavy social media use and avoidance both linked to poorer wellbeing in teens - Australian Broadcasting Corporation - January 18th, 2026 [January 18th, 2026]
- Social Networking Q3 Earnings: Reddit (NYSE:RDDT) is the Best in the Biz - The Globe and Mail - January 8th, 2026 [January 8th, 2026]
- Kobe Bryant once explained why he was so active on social media: Im a smartas at heart - Basketball Network - January 8th, 2026 [January 8th, 2026]
- Most people think social media is bad for kids. Australia is trying to prove it - BBC Science Focus Magazine - January 2nd, 2026 [January 2nd, 2026]
- Scrolling Minds: How social networking sites are quietly reshaping student life - Rising Kashmir - January 2nd, 2026 [January 2nd, 2026]
- Coinbase bets on stablecoins, Base and 'everything exchange' for 2026 - TradingView Track All Markets - January 2nd, 2026 [January 2nd, 2026]
- The 25 Best Movies of the Century: No. 1, The Social Network - The Ringer - January 2nd, 2026 [January 2nd, 2026]
- Mastodon Surges as Decentralized Alternative to X, Doubles Users by 2026 - WebProNews - January 2nd, 2026 [January 2nd, 2026]
- From that bird guy to bus aunty: the real social media personalities rising above AI slop - The Guardian - December 29th, 2025 [December 29th, 2025]
- Enhancing Link Prediction in Social Networks with LSTM - BIOENGINEER.ORG - December 29th, 2025 [December 29th, 2025]
- The Class Where Screenagers Train to Navigate Social Media and A.I. - The New York Times - December 29th, 2025 [December 29th, 2025]
- YouTuber boxer Jake Paul released a photo of him showing off his cash bundles and firearms on his pe.. - - December 29th, 2025 [December 29th, 2025]
- Opinion: Should the US prohibit kids from using social media? - Caribbean National Weekly - December 29th, 2025 [December 29th, 2025]
- Social Media Management Apps Market is set to Fly High Growth in Years to Come - openPR.com - December 29th, 2025 [December 29th, 2025]
- In new social media policy,Army allows limited usage - Times of India - December 29th, 2025 [December 29th, 2025]
- Las Cruces man charged after FBI traces school shooting threat to social media post - Shore News Network - December 29th, 2025 [December 29th, 2025]
- How teens stay connected to friends, family overseas without social media - Australian Broadcasting Corporation - December 29th, 2025 [December 29th, 2025]
- Early research shows benefits of social media break - Harvard Gazette - December 18th, 2025 [December 18th, 2025]
- What to know about the merger of Trump's social media company and a nuclear fusion firm - WBUR - December 18th, 2025 [December 18th, 2025]
- Study Links Social Avoidance to Increased Risk of Problematic Social Networking Site Use - geneonline.com - December 18th, 2025 [December 18th, 2025]
- Bluesky Launches Privacy-Focused Find Friends with Opt-In Hashing - WebProNews - December 18th, 2025 [December 18th, 2025]
- New IARMJ guidelines offer practical framework for social media evidence in asylum appeals - Electronic Immigration Network - December 18th, 2025 [December 18th, 2025]
- Social Network Sues Government, Claiming Children Have Rights to Adult-Dominated Platform - Movieguide - December 18th, 2025 [December 18th, 2025]
- Otaku friendly Twitter clone Pommu partially revived after month-long suspension. Services limited to Japanese DLsite users - AUTOMATON - December 18th, 2025 [December 18th, 2025]
- The mastermind behind the 'Under 16 Social Media Ban Law' may have been an advertising agency that wanted to block the regulation of online gambling... - December 18th, 2025 [December 18th, 2025]
- If You Quit Social Media, Will You Read More Books? - The New Yorker - December 14th, 2025 [December 14th, 2025]
- Why is Trump demanding travellers social media handles; how will it work? - Al Jazeera - December 14th, 2025 [December 14th, 2025]
- Australia is banning young teens from social media. Could it happen in the US? - CNN - December 14th, 2025 [December 14th, 2025]
- Screen time and ADHD: why social media stands out from gaming and TV - News-Medical - December 14th, 2025 [December 14th, 2025]
- Whats the worst thing thats gonna happen? South Australia Premier says social media ban is about protecting children - CNN - December 14th, 2025 [December 14th, 2025]
- Australia has just relieved its anxiety over teens on social media or has it? - CNN - December 14th, 2025 [December 14th, 2025]
- Pew: Teen Social Media Habits Hold Steady As AI Chatbots Move Into The Mainstream - Net Influencer - December 14th, 2025 [December 14th, 2025]
- Could a social media ban for kids work in the United States? - CNN - December 14th, 2025 [December 14th, 2025]
- Taylor Swift's Last Album Sparked Bizarre Accusations of Nazism. It Was a Coordinated Attack - Rolling Stone - December 14th, 2025 [December 14th, 2025]
- Social media is obsessed with this dumpling 'lasagna' recipe, here's how to make it - ABC News - December 14th, 2025 [December 14th, 2025]