Year-long analysis from Norton Labs finds nearly three-quarters of phishing sites imitate Facebook
Norton LifeLock’s global research team, Norton Labs, published its quarterly Consumer Cyber Safety Pulse Report, detailing the top consumer cybersecurity insights and takeaways from April through June 2022. Leveraging the company’s global threat telemetry, the analysis includes new findings on how cybercriminals are using social media phishing attacks to steal people’s private information.
Norton Labs analyzed a full year of phishing attacks on the top social media platforms, and while plenty of fake login pages designed to trick victims into inputting their login credentials were found, the diversity and complexity of lures went far beyond that one technique.
Latest ITechnology News: PC Matic Achieves FedRAMP Authorization
“Threat actors use social media for phishing attacks because it’s a low-effort and high return way to target billions of people around the world,” said Darren Shou, head of technology, NortonLifeLock. “As social media is intertwined in our daily lives, it’s key to know how to spot the signs of a scam, and keep a sharp eye on where requests for your information are coming from. Even better, consider strong, multi-layered security that can be on the lookout for you.”
Norton Labs uncovered the top tactics cybercriminals use to get victims to reveal personal information, and while classic login phishing pages are still the most common ploy, cybercriminals are finding new ways to deceive social media users. Tactics include account lockouts – making it seem that a victim’s account has been locked luring victims to reveal login credentials or install malware on the promise of increasing follower count; and verified badge scams – prompting users to login to obtain, or not to lose, their verified status on the platform.
Latest ITechnology News: Bitdefender Technologies Now Support Amazon GuardDuty for Advanced Threat Detection
Another phishing campaign tactic aims to intercept temporary codes to break into profiles with two-factor authentication enabled. These tokens are generally tied to the victim’s device and allow the scammer to perform privileged operations such as modifying personal details or login credentials.
This quarter, Norton also found that it’s never too early for scammers to take advantage of the back-to-school season. As school-aged children enjoy their summer, cybercriminals are already at work, using the back-to-school time to inspire a variety of financial scams, such as bogus offers of scholarships and financial aid.
Latest ITechnology News: GoodAccess Partners with phoenixNAP, a Global IT Services Provider
[To share your insights with us, please write to sghosh@martechseries.com]