Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Your social media account hasn’t been hacked, it’s been cloned!
  • Cyber Attacks
  • Data Breach
  • Malware

Your social media account hasn’t been hacked, it’s been cloned!

4 years ago Tyler Reguly
Your social media account hasn’t been hacked, it’s been cloned!

A recent Facebook post from a family member made me realize that I needed to write about an overused term. A term, that when used, causes chaos and concern. I don’t blame the family member for using it, I’ve seen it used hundreds of times over the past few years and I’ve seen IT and cybersecurity professionals respond without correcting, even, on occasion, offering bad advice.

So, what is the term? Hacked. We all know what it means when we hear that a website was hacked or a company was hacked. Depending on the context, synonyms could be defaced (although that seems less common these days) or breached. At the end of the day, however, the term “hacked” is completely valid and used correctly in those situations. So, when is it used incorrectly? When it is used to describe a fake social media profile.

Here’s the situation, one that we’ve all seen dozens of times. “Don’t open messages from me, I’ve been hacked!” or “Don’t open messages from <insert person here>, they’ve been hacked!” There are definitely times when people’s legitimate accounts are used to spam out malicious links and, in those cases, “I’ve been hacked!” feels appropriate. I believe, however, that context matters, and a duplicate social media profile should not be referred to as “hacked” and the actions associated with an account breach should not be taken.

So, what is a duplicate social media profile? If you have been living under a rock or are sane enough to avoid social media, you may not have encountered this phenomenon. It occurs when someone takes your publicly visible social media photo and creates a new account using your name. They then spam out messages or friend requests to everyone on your contact list. This is why restricting access to your profile picture and friends list are such important privacy steps (and yes, before you go look, this is 100% a ‘do as I say and not as I do’ moment).

Previously, this was very common within a single social media network, but with the integrated Facebook-Instagram messaging system, cross platform instances are definitely seeing an uptick. Once you are responding to the fake profile or have accepted the friend request, malicious links or a scam conversation can begin. Also, if you’ve now given access to your profile by accepting a friend request, the malicious individuals (or bots) now have the ability to harvest your information and propagate the scam.

So, why am I against calling this “hacking” or saying the account is “hacked?” Simply put… it isn’t the correct term. The word hack implies certain things and to the general public, those things generally include resetting your passwords, running malware scans, and, for people who go to extremes, wiping the computer.

Over the past few years, we’ve acknowledged more and more that changing passwords regularly is a bad thing. If you frequently have your profile cloned and used, you become guilty of the very thing that we’re trying to push enterprises away from. Since the person did not gain access to your account, changing your password simply does not make sense. However, when someone posts “Oh know, my account was hacked!”, a dozen people will reply with “Quick! Change all your passwords.”

While this may seem like a minor pet peeve, I believe it is a bigger issue. If people believe these are accounts that are hacked, it creates a false sense of insecurity which can potentially be just as dangerous as a false sense of security. Rapidly changing passwords is not good and these types of events are definitely on the rise.

So, as a reminder, your account has not been hacked… someone copied your profile in an attempt to leverage the personal connection you have with others and take advantage of them. One of the clearest indicators of this is that the messages come from a different account and appear in a different chat or they involve a new friend request. The best thing you can do is report the person, tell others who get the requests to report the person, block the account, and move on. Beyond that, there’s really nothing else to do.

The post ” Your social media account hasn’t been hacked, it’s been cloned!” appeared first on TripWire

Source:TripWire – Tyler Reguly

Tags: Facebook, Instagram, Privacy, TripWire

Continue Reading

Previous Sysrv-K Botnet Targets Windows, Linux
Next Russian Conti Ransomware Gang Threatens to Overthrow New Costa Rican Government

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access

4 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

Stealer Backdoor Found in 3 Node-IPC Versions Targeting Developer Secrets

4 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

ThreatsDay Bulletin: PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories

5 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Ghostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt Strike

7 hours ago [email protected] (The Hacker News)
  • Data Breach
  • Vulnerabilities

PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure

10 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

How AI Hallucinations Are Creating Real Security Risks

10 hours ago [email protected] (The Hacker News)

Recent Posts

  • Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access
  • Stealer Backdoor Found in 3 Node-IPC Versions Targeting Developer Secrets
  • ThreatsDay Bulletin: PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories
  • Ghostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt Strike
  • PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT