Report Incident
× Home Cybertech Africa 2023 2 DPO Rw-CSIRT Website About Rw-CSIRT Alerts Advisories About NCSA Documentation News & Events Topics Contact us Opportunities Privacy Policy

5 social media scams – and how to protect against them

Due to the growing amount of users and mass amount of information we share on social media platforms, these networks have become the most convenient avenue for malicious actors to lure users into digital harm.
 
Cybercriminals use scams and tricks to bait online users into revealing personal information, sending them money or experiencing another kind of online misfortune. To help you protect yourself, here are 5 common social media scams and how to protect yourself against them.
 
1. Fake profiles
Fake profiles are extremely prevalent on social media. In most cases, the fake profiles are made to be appealing to users so that they are more likely to be deceived and give into the malicious actor’s requests. These fake profiles may send you a phishing link, ask you for personal information, ask you to send money or cause another form of harm to your well-being.
 
To protect against fake profiles, always take time verify who you are connecting with online. Become familiar with the signs of a suspicious profile, such as;
 
  • The profile photo is a default, a picture of a model or a blurry image
  • The username features a lot of numbers
  • An uncompleted biography or biography that features suspicious links
  • The profile only retweets or shares content without creating anything new
  • A low number of followers despite having content
 
2. Hidden URLS
Hidden URLS are very common on Twitter and hide the true destination of a shortened link. While a shortened link may take you to a true destination, it may also take you to a dangerous site that attempts to install malware. Before you click on a shortened link attempt to reveal the full URL through these methods;
  • Type the shortened URL in the address bar of your web browser and add the characters described below to see a preview of the full URL:
    • tinyurl.com. Between the "http://" and the "tinyurl," type preview. 
    • bit.ly. At the end of the URL, type a +. 
    • goo.gl. At the end of the URL, type a +. 
  • Use a URL checker site which allows you to enter a short URL and see the full version.
 
3. Photo of you scam
This is a common phishing scheme on social media that aims to entice unsuspecting users into clicking on a dangerous link. In its most basic format, an unfamiliar contact will send you a message that states there is a photo of you online, but this scam has taken many different forms that may references a blog or story instead of a photo. This scam plays on our natural tendency to need to protect our reputation.
 
To protect yourself against this scam;
 
  • Put your profile on private so that strangers can not message you without your consent
  • Avoid clicking on shortened links. Attempt to reveal the full URL as a precaution
 
4. Work from home and money-making schemes
Malicious actors behind fake profiles will regularly use social media to advertise false job opportunities that allow users to make unrealistically large amounts of money in a short time. These opportunities also advertise the ability to work from home, and can feature fake testimonies from people claiming to have benefitted from the scheme. Once a user expresses interest in the offer, they are asked to provide money as an administrative fee or asked to disclose personal information.
 
To prevent falling victim to a get rich quick scheme, become familiar with the signs;
  • The amount of money to be made is unrealistic
  • There is a need to provide a fee upfront
  • Success stories seem too good to be true
 
5. SOS or help messages
If a friend in your network has been hacked, malicious actors can use this relationship to pretend there is an emergency and contact you for immediate help. In some cases, these messages will say that the friend is stuck in a foreign country and needs urgent help, in others that the person has fallen sick and needs money urgently for hospital treatment. These examples are similar to traditional phishing messages, which always communicate the need for urgency.
 
It is important to be aware that scams like this exist before you take action, as acting on impulse can lure you into the trap of the cybercriminal. If you receive a message similar to these from a friend’s profile, check with them through a different source, such as over the phone or through email so that you verify the story. You can also check with other family and friends of this contact to gain their input on whether the request is genuine.
 

02 March 2022

© 2024 National Cyber Security Authority