• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Cookie Policy (US)
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech News
  • Tech Guide
  • Gadget & Apps

How to spot and avoid Spammers in Twitter

Updated on Mar 29, 2015 by Guest Authors

Spammers abound in Twitter, and you are only one click away from falling for their deceitful tactics. They normally set up fake accounts to follow yours, and in turn will ask you to follow back. Their goals vary, from feeding their ego to conducting spam operations.

The second has been the subject of Symantec’s recent probe on a scam operator that targets Twitter users to sell a diet pill product. The spammer has reportedly begun with the manipulative campaign last year and now takes hold of almost 750,000 fake Twitter accounts, which are being used to sell the Green Coffee Bean Extract pill.

twitter-spam

We know for a fact that a miracle diet does not exist as it requires a workout to burn your fats away if you want to lose weight. But as to how the spammer succeeded in making its victims believe in its product is puzzling.

It turns out that the spammer relied on affiliate programs to carry out the spam campaign and earn money for every referral made. What are those affiliate programs? Those are fake accounts of popular brands such as media outlets CNN and TMZ, and celebrities like Vicky Pattinson and Nicole LaValle used to convince users of the pill’s legitimacy. In the process, the spammer also succeeded in attracting real Twitter users to follow the fake accounts.

The scam that is the product has been spread using main accounts classified as Mockingbirds and Parrots. These types of accounts impersonate celebrities and other users by stealing their photos and even lifting their Tweets in order to reach wider audience. Then the stolen posts are being retweeted by the Parrot accounts. But Twitter has a way of detecting spammy posts. So these Mockingbirds and Parrots accounts were eventually suspended. However, the spam operator has Eggs accounts in place to recover from the suspension. This type of account is like a new Twitter account, and it is evident because those accounts have not a single post in its feed. So Twitter has no way of suspecting that they are part of a spam campaign.

The Eggs accounts are then converted to Parrots and then to Mockingbirds once Twitter suspends a Mockingbird account. Most of the time the Eggs accounts are set up only to follow the Mockingbirds and Parrots to indicate that these accounts have huge following.

In order to verify that you are following a real account, look for the blue check badge that indicates an account is vetted by Twitter to be real. Also, do not follow a user that follows you out of no reason at all. Be suspicious of their motives.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

New iDPRT Printers – SP450, SP420, and Zeva 1966 Photo Printer Reviewed

Munbyn P44S Wireless Thermal Label Printer Review

Master & Dynamic MW75 Wireless Headphones Review – Get Lost in the Music

3DMakerPro Mole 3D Scanner Review – Affordable, Portable, and Easy To Use

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • New iDPRT Printers – SP450, SP420, and Zeva 1966 Photo Printer Reviewed
  • Munbyn P44S Wireless Thermal Label Printer Review
  • POLYWOOD Classic Folding Adirondack vs Member’s Mark Adirondack Chair – Which Is Better?
  • BLUETTI’s New Expandable Outdoor Solar Generator AC60 & B80

Copyright © 2023 ยท All Rights Reserved

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}