How hackers use your social media posts to scam you

p 1 social media scam phishing ethical hacker

Scam emails aren’t what they used to be. Gone are the times of fraudulent emails crammed with typos and Nigerian princes promising riches if solely we hand over our bank cards. Right this moment’s phishing emails could be fairly convincing, usually addressed to us by identify or with particular private particulars. Trendy hackers can discover every part they want to learn about a possible goal by way of Google or social media and use this data to architect the right scam. How do I do know this? I’m a hacker, albeit an moral one who makes a residing breaking into well-known firms (with permission) to establish potential safety vulnerabilities, like a cyber Sherlock Holmes.

Cybercriminals exploit the private particulars we share on-line to try to trick or impersonate us—piecing collectively each picture we publish, location we test into, individual we tag, or pet picture we add to construct an understanding of their targets. The social engineering scams they create are designed to entice individuals to obtain malware, ship cash, share private data, or disclose log-in particulars.

This isn’t meant to scare you. Truly, it’s very doable to take pleasure in social media with out placing your self in danger. I’m going to present you how the hackers do it and the way you can acknowledge when you’re oversharing, to assist you outsmart the dangerous guys.


The truth of social media oversharing 

Oversharing on-line is extraordinarily frequent. I just lately contributed to a report from safety firm Tessian, which helps forestall individuals from falling for social engineering scams on electronic mail. The report discovered that 84% of individuals publish on social media each week, with two-fifths (42%) posting every single day. Greater than half (55%) of the individuals Tessian surveyed have public Fb profiles, whereas 67% have public Instagram accounts. Meaning anybody can see what’s posted, together with hackers. (A fast have a look at your privateness settings may also help handle this.)

The oversharing all of us do on-line is a gold mine for cybercriminals who go digital dumpster diving, particularly after we publish about our jobs. Final 12 months, many people have been posting images of our work-from-home setups, together with laptop screens containing electronic mail addresses, video name numbers, and names of coworkers or shoppers. This makes it a lot simpler for a hacker to establish coworkers that they’ll impersonate over electronic mail. Job updates, too, make it simpler to establish new staff who could also be much less in a position to inform when an electronic mail from an govt is pretend and who need to make a superb first impression.

Many social posts additionally comprise private data which will appear innocent—the names of youngsters and pets, a favourite sports activities staff, a birthday. However these particulars may also help a hacker guess your password or reply frequent safety questions. Hackers additionally know that individuals have a tendency to reuse passwords throughout accounts. As soon as they crack one password, they’ll attempt it on a number of fashionable web sites, from your checking account to your electronic mail, to see if it really works.

Anatomy of an electronic mail scam

Let’s break down precisely how this oversharing can be utilized in opposition to you. Regardless of what you see in popular culture depictions, most cybercriminals don’t really hack into firms. They hack the individuals who work there. Hacking people solely requires a convincing electronic mail, whereas hacking software program is like treading by way of a room with laser safety. Actually, Tessian’s researchers noticed a 15% improve in these sorts of social engineering assaults over electronic mail over the past six months of 2020. And all it takes is a fast on-line search.

If I’m making an attempt to hack an organization, the primary place I’m going is LinkedIn. It’s simple to discover the complete names and job titles of staff with an inexpensive LinkedIn Premium account. I search for nontechnical workers resembling gross sales or administrative staff who could also be extra vulnerable and have entry to plenty of firm knowledge. (A tip for firms: Prepare staff to be suspicious and ensure entry permissions are often checked.)

I would see on an worker’s LinkedIn or Twitter account that they’ve simply began a brand new job, which tells me they might not know their executives’ personalities and are keen to please. I can use Google or social media to study these execs’ names and spoof their electronic mail addresses, then ship a pretend electronic mail to this new worker. All it takes is an pressing electronic mail saying, “Hey, I’m in an extended assembly and forgot my nephew’s birthday. I want you to go purchase me an Amazon reward card. I’ll reimburse you.” You’d be shocked how rapidly somebody will comply with pressing instructions from a superior on the workplace, particularly in our new world of distant work, when visible cues are lacking and you can’t rapidly confirm a request with a colleague.


Easy methods to keep secure on-line

Strive Googling your identify or making a second social media account to view your personal profiles as a stranger would. Are you snug with every part you see? If not, set your social accounts to non-public and double-check that you actually know all of your followers.

Keep away from passwords which have something to do with what you share on-line. In accordance to Tessian’s survey, 85% of individuals reuse passwords. Don’t be certainly one of them. Certain, it will get laborious to bear in mind all of them, however password managers can do the heavy lifting for you (I personally use one myself).

Be skeptical of each private and work emails. If one thing feels off, click on the sender’s show identify to be sure the e-mail tackle matches, particularly on a cell phone. Ask for a second opinion from your firm’s IT staff, or affirm a request verbally with a colleague. Don’t stress about whether or not you’re bothering individuals. Safety is essential. Lastly, cease and suppose earlier than opening attachments, clicking hyperlinks, or sharing data.

Scam emails might not be as apparent as they used to be, however they do normally comprise sufficient refined hints to alert your instincts—particularly if you’ve realized what to search for. So belief your intestine. Retaining your data secure on-line isn’t about being harassed or scared. It’s about figuring out what you’re sharing, being conscious of the way it could possibly be used in opposition to you, and figuring out how to make your posts non-public.

Katie Paxton-Worry is a PhD pupil, occasional bug bounty hunter, and academic YouTuber.