Wednesday, January 27, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

The hacker’s paradise: Social networks net criminals $3bn a year in illicit profits

February 26, 2019
in Internet Security
The hacker’s paradise: Social networks net criminals $3bn a year in illicit profits
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

Many of us at some point or another have used a social network. They can help us connect and retain relationships with each other no matter where we are in the world, but they can also be a source of harassment, trolling, and an overall negative and stressful digital environment.

Despite these issues, privacy concerns, and a constant battle between operators and the spread of misinformation, social networking has become entrenched in our daily lives.

You might also like

10-years-old Sudo bug lets Linux users gain root-level access

F5 Networks fiscal Q1 revenue, profit beat expectations, revenue outlook higher as well

Apple fixes another three iOS zero-days exploited in the wild

For some hackers, these networks have also become core tools in fraudulent and criminal schemes.

On Tuesday, Bromium and Dr. Mike McGuire, senior lecturer in Criminology at the UK’s Surrey University, released a report which explores how threat actors are abusing today’s social media platforms.

The six-month study, called “Social Media Platforms and the Cybercrime Economy” is the second installment of the “Web for Profit” series and suggests that social media networks — including Facebook, Twitter, LinkedIn, and Instagram — have given attackers the means to “amplify, persuade and spread malware more quickly than email or other attack vectors.”

The connections between users who have made social networks popular are the same links which attackers now exploit at will.

It is the trust element which social accounts have — and cold emails do not — which can enable what is known as “chain exploitation;” the abuse of trusted connections to spread tailored attacks across specific platforms.

It is not only phishing messages and the posting of malicious links which are attack vectors for attackers on social networks. Malvertising, plugins, and the sharing of malicious content are also proving popular and contributing to an industry which is earning criminals roughly $3.25 billion per year.

See also: Key takeaways from damning UK report on Facebook’s world of “digital gangsters”

The researchers estimate that up to 40 percent of malware infections on social media originate from malvertising, while at least 30 percent come from plugins and malicious applications.

According to the report, one in five organizations have been exposed to malware distributed via social networking channels, and reports of cybercrime relating to these platforms increased by over 30,000 percent between 2015 and 2017 in the United States alone. It is estimated that up to 1.3 billion social media users may have had their data compromised within the past five years.

Threat actors are also making use of social media networks in the same ways as today’s businesses when it comes to sales, marketing, and recruitment.

TechRepublic: How to help CISOs understand their role in cloud security

The researchers behind the report found that cybercriminals are marketing and touting their wares openly — including the sale of botnet hires and data trades — and are also forging connections for illicit purposes such as money laundering and fraud. The sale of criminal education is rife, too, with tutorials and malware tech support on offer across Twitter and Facebook.

Social networks are also being used for the purposes of criminal recruitment. According to the research, since 2016, there has been a 36 percent increase in the hire of money mules who are often recruited through adverts luring individuals with offers of short-term roles worth a hefty paycheck.

“These platforms have brought money laundering to the kind of individuals not typically associated with this crime — young millennials and generation Z,” says McGuire. “Data from UK banks suggests there might be as many as 8,500 money mule accounts in the UK owned by individuals under the age of 21, and most of this recruitment is conducted via social media.”

CNET: Microsoft says Russian hackers targeted European researchers
 
Despite the risks, banning the use of social media platforms in the workplace and for the company’s benefit can impact communication channels between consumers and vendors, reduce the range of sales and promotional channels available, and may not match today’s consumer expectations that reputable companies will manage a social media presence.
 
“Businesses must resist knee-jerk reactions to ban social media use altogether,” says Gregory Webb, CEO of Bromium. “Instead, organizations can reduce the impact of social media-enabled attacks by adopting layered defenses that utilize application isolation and containment. This way, social media pages with embedded but often undetected malicious exploits are isolated within micro separate virtual machines, rendering malware infections harmless. Users can click links and access untrusted social-media sites without risk of infection.”

Previous and related coverage

Credit: Source link

Previous Post

Hackers Actively Exploiting Latest Drupal RCE Flaw Published Last Week

Next Post

JavaScript Proxy

Related Posts

10-years-old Sudo bug lets Linux users gain root-level access
Internet Security

10-years-old Sudo bug lets Linux users gain root-level access

January 27, 2021
F5 Networks fiscal Q1 revenue, profit beat expectations, revenue outlook higher as well
Internet Security

F5 Networks fiscal Q1 revenue, profit beat expectations, revenue outlook higher as well

January 27, 2021
Apple fixes another three iOS zero-days exploited in the wild
Internet Security

Apple fixes another three iOS zero-days exploited in the wild

January 27, 2021
Firefox support for Flash ends on January 26
Internet Security

Firefox 85 removes Flash and adds protection against supercookies

January 27, 2021
Tesla sues ex-employee over alleged ‘brazen’ theft of confidential code, files
Internet Security

Tesla sues ex-employee over alleged ‘brazen’ theft of confidential code, files

January 26, 2021
Next Post
How to Change the WordPress Admin Login Logo

JavaScript Proxy

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

New machine learning tool predicts schizophrenia
Machine Learning

New machine learning tool predicts schizophrenia

January 27, 2021
10-years-old Sudo bug lets Linux users gain root-level access
Internet Security

10-years-old Sudo bug lets Linux users gain root-level access

January 27, 2021
In the Wake of the SolarWinds Hack, Here’s How Businesses Should Respond
Internet Privacy

In the Wake of the SolarWinds Hack, Here’s How Businesses Should Respond

January 27, 2021
ModelOps vs. MLOps – Data Science Central
Data Science

ModelOps vs. MLOps – Data Science Central

January 27, 2021
Based on Machine Learning, PRAISE Score Balances Risks in Post-ACS Care
Machine Learning

Based on Machine Learning, PRAISE Score Balances Risks in Post-ACS Care

January 27, 2021
Page Experience: What Marketers Should Know
Marketing Technology

Page Experience: What Marketers Should Know

January 27, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • New machine learning tool predicts schizophrenia January 27, 2021
  • 10-years-old Sudo bug lets Linux users gain root-level access January 27, 2021
  • In the Wake of the SolarWinds Hack, Here’s How Businesses Should Respond January 27, 2021
  • ModelOps vs. MLOps – Data Science Central January 27, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates