Cybercrime in Social Media


Download 65.71 Kb.
bet4/10
Sana22.06.2023
Hajmi65.71 Kb.
#1646134
1   2   3   4   5   6   7   8   9   10
Bog'liq
Cybercrime in Social Media

Buying illegal items: By creating fake profiles, cybercriminals use social media to trade illegal or banned items.
  • Common tricks used by fraudsters on social media


  • We all are active on social media nowadays for various reasons; professionals use social media to hire people to showcase their professional skills and achievements. Likewise, students and housewives have reasons to be active on social media. People are even addicted to it, and many countries now have addiction centers to treat the social media addiction of people. Therefore, there are plenty of opportunities for cybercriminals to trap and dupe ordinary, innocent citizens. Since the internet has no boundaries, cybercriminals can reach their target from any country. Some common types of social media crimes are lottery and free gift card scam, free shopping voucher scam, cryptocurrency (bitcoin) scam, collection of your personal information from social media websites. Cybercriminals advertise their posts or send emails to lure innocent people. They say that you have won a lottery or free gift coupons. Sometimes, they clone's the identity of an individual to commit the crime.



  • Figure 3.6: Social media frauds

  • Some of the common tricks used by fraudsters are as follows:

    • Look over your keyboard when you type the password

    • Use your mobile phone or laptop to check browsers for saved passwords

    • Installation of malware and keystroke logging software into your devices

    • Look for login credentials in public cybercafés computer

    • Creation of social media accounts in someone else's names and posting their publicly available photographs

    • Cracking Wi-Fi passwords and committing cybercrime using the real owner's name

    • Avail medical treatment on your health insurance

    • Stalking of one's activities on social media, commenting, and messaging even though not being on the contact list

    • Sending a friend request to the victim's contacts to access his/her complete profile information

    • Posting proposals, vulgar comments, pictures, or videos on victim's profile page

    • Spreading rumors, false information, defamatory comments, swear words among victims' friends, and contact list on social media

    • Tricking teens into sending obscene pictures and later blackmailing them

    • Unwanted game invites, pokes, pings, or comments asking for dates, and so on

    • Hacking, stealing victim account's password and messaging, proposing, posting obscene content using their profiles resulting in their contacts believing the user does it

    • Phone on behalf of banks or bank wallets such as Paytm, BHIM, and so on

    • Persuade customers to download and install some thirdparty applications

    • Ask for OTP

    • Sending mails and asking to fill in KYC details or click on a link

    • Giving reference examples of victim's contact lists or believable references for persuading victims

    • Misuse of photocopies to get a driving license or passport
  • 1   2   3   4   5   6   7   8   9   10




    Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
    ma'muriyatiga murojaat qiling