Social media influencers targeted by identity thieves

Social media influencers are attractive targets for identity thieves.
With large followings and a literal influence on their followers, it's no wonder they are targeted by scammers and spreaders of fake news.
Such a person influences the financial investment decisions of their followers by doling out advice or recommendations.
This comes in the form of get-rich-quick schemes, cryptocurrency related advice, stock investment, financial planning, or just about anything people can do to make money.
On the platforms that matter these days, like YouTube, TikTok and Instagram, the number of followers of some of the well-known finfluencers far exceeds the numbers of followers of some of the biggest broking houses.
In May of 2023, India banned a YouTube finfluencer with over a million followers from the securities markets for a year for allegedly providing advisory services-daily stock investment/trading calls-without registering with the regulator.
With enough followers that heed their advice, these finfluencers also can have an effect on the financial markets.
As an exit scam in which you make one big whopper and then disappear, that's a very profitable strategy.
Most influencers are in it for the long run and don't want to ruin the reputation they built.
In October of 2023, the Federal Trade Commission warned people with a lot of social media followers they might be the target of scammers.
Typically, the scammers say they'll send you free products and pay you large amounts of money to promote those products in your social media posts.
What the scammers are really after can vary from cleaning out the influencers' bank accounts to taking over their social media accounts.
The scammers will then leave the influencer behind with an account that has a bad reputation and lost a good part of its followers.
The governments of ten nations have called on social media operators to improve their ability to detect and prevent fraud on their platforms.
In a communiqué issued as a result of the Global Fraud Summit, which also included representatives from INTERPOL, the Financial Action Task Force, the UN Office on Drugs and Crime, and the European Union, the partakers listed 29 action points that should help reduce online fraud.
Australia also reported progress towards their vision of making Australia the world's hardest target for scammers with, for example, a 38% decrease in losses due to investment scams.
What can influencers do to protect themselves Check your digital footprint.
If you want to find out how much of your data has been exposed online, you can try our free Digital Footprint scan.
SCAN NOW. We don't just report on threats - we help protect your social media.
Protect your social media accounts by using Cyrus, powered by Malwarebytes.


This Cyber News was published on www.malwarebytes.com. Publication date: Tue, 19 Mar 2024 12:43:07 +0000


Cyber News related to Social media influencers targeted by identity thieves

Beijing fosters foreign influencers to spread its propaganda The Register - China is offering foreign influencers access to its vast market in return for content that sings its praises and helps to spreads Beijing's desired narratives more widely around the world, according to think tank the Australian Strategic Policy ...
1 year ago Theregister.com
Social media influencers targeted by identity thieves - Social media influencers are attractive targets for identity thieves. With large followings and a literal influence on their followers, it's no wonder they are targeted by scammers and spreaders of fake news. Such a person influences the financial ...
11 months ago Malwarebytes.com
The Latest Identity Theft Methods: Essential Protection Strategies Revealed - Identity theft has evolved far beyond the days of stolen mail and dumpster diving. Today's identity thieves employ sophisticated techniques, including account takeovers and government benefit fraud, making it essential for you to stay vigilant to ...
1 year ago Hackread.com
AI and the Evolution of Social Media - A decade ago, social media was celebrated for sparking democratic uprisings in the Arab world and beyond. In a 2022 survey, Americans blamed social media for the coarsening of our political discourse, the spread of misinformation, and the increase in ...
11 months ago Securityboulevard.com
Taking the complexity out of identity solutions for hybrid environments: Identity Fabric and orchestration - For the past two decades, businesses have been making significant investments to consolidate their identity and access management platforms and directories to manage user identities in one place. Instead, businesses must learn how to consistently and ...
1 year ago Securityintelligence.com
Speaking Freely: Lynn Hamadallah - There's been a lot of censorship for example on social media, which I've experienced myself when posting content in support of Palestine. The argument put forward was that those cases represented instances of free speech rather than hate speech. You ...
10 months ago Eff.org
Identity as a Service - Let us introduce Identity as a Service, a revolutionary identity management strategy that aims to improve security, simplify user interfaces, and enable frictionless access to online resources. Organizations can use IDaaS platforms to access identity ...
1 year ago Feeds.dzone.com
How Strata Identity and Microsoft Entra ID solve identity challenges in mergers and acquisitions - In particular, there is an immediate and profound impact on the identity and access management postures of both companies. While most combined organizations aspire to eventually consolidate their identity systems, this is a challenging and ...
1 year ago Microsoft.com
Unmasking Identity Theft: Detection and Mitigation Strategies - In an increasingly digital world, the threat of identity theft looms large, making it imperative for individuals to be proactive in detecting potential breaches and implementing effective mitigation measures. This article delves into key strategies ...
1 year ago Cybersecurity-insiders.com
Best of 2023: Why is everyone getting hacked on Facebook? - Importantly, phishing relies on the victim trusting the scammer and taking an action - like clicking a link or sending bank account information - in order for the scammer to get what they want. It's not your imagination - social media scams really ...
1 year ago Securityboulevard.com
Protecting Your Digital Space: A Guide on How to Stay Cyber Safe on Social Media - In the age of digital inter-connectedness, social media has become an integral part of our daily lives, enabling us to connect, share, and communicate globally. As cyber threats continue to evolve, it's crucial to adopt proactive measures to ensure ...
1 year ago Cybersecurity-insiders.com
31 Alarming Identity Theft Statistics for 2024 - Identity theft is a prevalent issue that affects millions of people annually. Although the numbers are startling, we've selected the 31 most concerning identity theft statistics to help you understand how to secure your identity. In 2022, the FTC ...
1 year ago Pandasecurity.com
Social Engineering: The Art of Human Hacking - Social engineering exploits this vulnerability by manipulating human psychology and emotions to gain unauthorized access to systems and data. Rather than directly breaking cyber defenses, social engineering tactics exploit human vulnerabilities - ...
1 year ago Offsec.com
Exploring How Virtual Worlds Change Social Media Experiences - Humans have always desired to connect with one another, from the days of sending letters to the current age of social media. As technology has advanced, so have the ways we communicate. We are now seeing a shift in the way tech giants are embracing ...
2 years ago Hackread.com
What is Azure Identity Protection and 7 Steps to a Seamless Setup - As a result, tools such as Microsoft's Azure Identity Protection have become a staple in protecting against compromised identities, account takeover, and misuse of privileges. Azure Identity Protection is a security service that provides a robust ...
9 months ago Securityboulevard.com
Unseen Threats: Identity Blind Spots and Misconfigurations in Cybersecurity - It's rather obvious to most in the IT sector that cybercriminals consistently and successfully exploit stolen or weak online identities to gain unauthorized access to businesses of all types. It's these identities in an enterprise that are clearly ...
1 year ago Cybersecurity-insiders.com
What is identity management? Definition from SearchSecurity - Identity management is the organizational process for ensuring individuals have the appropriate access to technology resources. Identity management is an essential component of security. Identity management includes authenticating users and ...
10 months ago Techtarget.com
Social Engineering Attacks: Tactics and Prevention - Social engineering attacks have become a significant concern in today's digital landscape, posing serious risks to the security and sensitive information of individuals and organizations. By comprehending these tactics and implementing preventive ...
1 year ago Securityzap.com
Social Justice: a global perspective - Today, we commemorate World Day of Social Justice and honor those across the globe who stand for the equitable access to opportunities within societies where individuals' rights are recognized and protected. I have the distinct honor of leading the ...
1 year ago Feedpress.me
Hacker Conversations: Stephanie 'Snow' Carruthers, Chief People Hacker at IBM X-Force Red - Social engineering is effectively hacking human thought processes. Social engineering is a major factor in the overall process but is not directly part of repurposing electronic systems. A social engineer is usually classified as a hacker, and is ...
11 months ago Securityweek.com
SailPoint unveils two sets of new offerings to help companies grow their identity security program - SailPoint unveiled two sets of new offerings designed to give customers options as they build their identity program, while driving customer success throughout their identity journey. First, the company is extending the family of SailPoint Identity ...
1 year ago Helpnetsecurity.com
The Role of Identity Data Management in Achieving CISA'S Strategic Goals - At the heart of this growing risk is identity, with over 60% of all breaches today involving identity exploitation. As organizations continue to expand their digital footprints, driven by a move towards cloud resources and remote systems, their ...
11 months ago Cyberdefensemagazine.com
Kids Online Safety Shouldn't Require Massive Online Censorship and Surveillance: 2023 Year in Review - Many of these bills would run roughshod over the rights of young people and adults in the process. There's also good news: so far, none of these dangerous bills have been passed at the federal level, or signed into law. That's thanks to a large ...
1 year ago Eff.org
Reducing credential complexity with identity federation - Help Net Security - Organizations also need to ensure compatibility between different platforms and protocols, and effectively merge user identities across multiple IdPs to avoid security gaps or identity conflicts. From a security perspective, federated authentication ...
5 months ago Helpnetsecurity.com
States Attack Young People's Constitutional Right to Use Social Media: 2023 Year in Review - Legislatures in more than half of the country targeted young people's use of social media this year, with many of the proposals blocking adults' ability to access the same sites. Courts blocked several of these laws for violating the First ...
1 year ago Eff.org

Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)