• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Cookie Policy (US)
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech News
  • Tech Guide
  • Gadget & Apps

Botnets plaguing social networking sites

Updated on Jul 30, 2015 by Guest Authors

If you have been into social networking for the last couple of years, you might have noticed a surge in the frequency of what appears to be fake accounts in Facebook and Twitter.

Online marketers in particular have been facing mounting challenges from the rise of botnets in any social media platform. Aside from that, ordinary users have also been the favorite target of a network of spam-disseminating bots, or spambots.

botnet

That is so because botnets are the most widely used tools to propagate attacks on unsuspecting users who are likely to fall prey to this deceptive social engineering. Botnets are used to take control of thousands, even hundreds of thousands, of computers from their owners.

Now, cyber crooks have found a way to widen the scope of their malicious activities with the use of what they call social botnets. It’s a sort of sound bite that makes you think of a horde of criminals who are out to wreak havoc to the world.

Social botnets operate differently from traditional bots. In a nutshell, traditional botnets target computers and convert them into one of their armies to increase their number. On the other hand, social botnets work to focus their attack on social networking sites. These kinds of bot are intended to create a broad network of fake profiles whose aim is to share malicious links to try to dupe potential victims into their scheme.

These fake profiles reach large counts and various software programs to create even more networks of fake social media users. There are a few, popular methods currently used by hackers to do this.

One of the techniques used in social botnet attacks is a torrent of retweets. This means spreading malicious links contained in twitter posts through retweet storms. The alpha is created by a single fake profile and then scattered by hundreds of thousands of social botnets. The goal is to lure even a single unsuspecting user into clicking the link.

Another popular method is phishing attacks. This form of social engineering come often in emails and the sender will pretend to be someone you know in order to convince you to submit sensitive data such as email address, password, username, SSS number, even credit card number. In addition to emails, phishing campaigns can also be launched in Facebook, Twitter and other social media platforms.

For some, it is easy to identify a phishing scheme. But still a considerable number of users fall victim to this deceit.

Disclosure: As an Amazon Associate, I earn from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

Hohem iSteady Mobile Plus Gimbal Stabilizer Review – Upgrade Your Phone Videography On A Budget

Airdog X5 Air Purifier Review – Is TPA Better Than HEPA Filter?

Welock Touch43 Fingerprint Smart Lock Review

HeyChy Deep Tissue Massage Gun Review

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • Secure Your Home With SECURAM
  • C3STROM ASTRO PRO – An E-Bike with Classic Rebel Motorcycle and Modern Ride
  • Bluetti AC500 & B300S Hit Canada Market During 2023 New Year Sale
  • Hohem iSteady Mobile Plus Gimbal Stabilizer Review – Upgrade Your Phone Videography On A Budget

Copyright © 2023 ยท All Rights Reserved

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}