{"id":18485,"date":"2021-06-23T21:43:52","date_gmt":"2021-06-23T17:43:52","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/twitter-impersonators\/18485\/"},"modified":"2021-06-23T21:43:52","modified_gmt":"2021-06-23T17:43:52","slug":"twitter-impersonators","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/twitter-impersonators\/18485\/","title":{"rendered":"Evil brand twins on Twitter"},"content":{"rendered":"<p>When having trouble with a product or service, where does the modern user turn? Most likely, social networks. Therefore, in addition to traditional technical support, many companies have a special team whose job it is to track public brand mentions (particularly on Twitter or Facebook). However, such mentions are of interest not only to the companies in question, but to scammers as well.<\/p>\n<h2>How cybercriminals attack social media users<\/h2>\n<p>This typical example comes from the <a href=\"https:\/\/twitter.com\/malwrhunterteam\/status\/1398612684816461824?s=20\" target=\"_blank\" rel=\"nofollow noopener\">Malware Hunter Team<\/a>: Whenever someone asks popular cryptocurrency service Blockchain.com\u2019s support team a question on Twitter, a set of bots appears in the comments and tries to slip a phishing link to the asker. Similarly, bots swoop in at the <a href=\"https:\/\/twitter.com\/malwrhunterteam\/status\/1405419842988040192?s=19\" target=\"_blank\" rel=\"nofollow noopener\">mention of TrustWallet support<\/a>.<\/p>\n<p>The pattern would seem clear, but of course, cryptocurrencies and e-wallets are far from scammers\u2019 only area of interest. Cybercriminals can try to impersonate other companies\u2019 support teams in the same way.<\/p>\n<h2>Why is Twitter fraud a problem for companies?<\/h2>\n<p>Of course you are not legally culpable if someone deceives people by hiding behind your name, but such incidents can still hit your reputation hard and result in lost clients (and thus lost profits). From clients\u2019 and customers\u2019 perspectives, they were the victims of your failure to help.<\/p>\n<h2>How to keep your clients out of harm\u2019s way<\/h2>\n<p>First, you need to verify your Twitter account \u2014 get that check mark. It won\u2019t stop evil Twitter twins, but it\u2019s a start: Your users will be able to distinguish your verified account from any fakes. Getting verified can be notoriously difficult. Start with Twitter\u2019s <a href=\"https:\/\/help.twitter.com\/en\/managing-your-account\/about-twitter-verified-accounts\" target=\"_blank\" rel=\"nofollow noopener\">detailed guide<\/a> on the topic.<\/p>\n<p>At the same time, begin or continue monitoring mentions of your brand on social media, primarily Twitter. Some of the many tools for that are <a href=\"https:\/\/www.google.com\/alerts\" target=\"_blank\" rel=\"nofollow noopener\">free<\/a>, though they\u2019re generally not that great. <a href=\"https:\/\/www.mytweetalerts.com\/\" target=\"_blank\" rel=\"nofollow noopener\">Others<\/a> may require a monthly subscription but offer numerous additional analytics features for your money. This monitoring for brand mentions (so-called <em>social listening<\/em>) will enable you at least to respond promptly to user questions and, in most cases, detect the actions of scammers.<\/p>\n<p>If you detect cybercriminals posing as your company\u2019s official channel, <a href=\"https:\/\/help.twitter.com\/en\/forms\/ipi\/trademark\" target=\"_blank\" rel=\"nofollow noopener\">report the violation<\/a> of your intellectual property to Twitter immediately. Twitter may request detailed evidence, but the process is usually pretty straightforward.<\/p>\n<p>In general, use these tips to enhance corporate safety on social media:<\/p>\n<ul>\n<li>Avoid creating unnecessary accounts for interactions between the company\u2019s representatives and its clients. Having extra accounts can lead to confusion, and it makes life easier for attackers (who can hide in a haystack of official accounts);<\/li>\n<li>Delete corporate accounts that you no longer use. If you leave them active, intruders may eventually gain access and scam users in your name;<\/li>\n<li>Change account passwords when the employees who use them leave the company. A former employee with a grudge can leak credentials to cybercriminals.<\/li>\n<\/ul>\n<p>As with any corporate accounts, protect your social media presence with a strong password and instruct employees who work with them on the <a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">basics of cybersecurity awareness<\/a>. Otherwise, they too might fall victim to a phishing attack, allowing cybercriminals into your company\u2019s Twitter account.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n","protected":false},"excerpt":{"rendered":"<p>How to protect your clients from cybercriminals impersonating your company on Twitter. <\/p>\n","protected":false},"author":700,"featured_media":18486,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916],"tags":[76,489,98,83],"class_list":{"0":"post-18485","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-phishing","10":"tag-social-engineering","11":"tag-social-networks","12":"tag-twitter"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/twitter-impersonators\/18485\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/twitter-impersonators\/23002\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/twitter-impersonators\/9219\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/twitter-impersonators\/24949\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/twitter-impersonators\/22961\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/twitter-impersonators\/22174\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/twitter-impersonators\/25546\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/twitter-impersonators\/24995\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/twitter-impersonators\/30958\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/twitter-impersonators\/9776\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/twitter-impersonators\/40357\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/twitter-impersonators\/17702\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/twitter-impersonators\/14967\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/twitter-impersonators\/26973\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/twitter-impersonators\/31123\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/twitter-impersonators\/27219\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/twitter-impersonators\/24036\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/twitter-impersonators\/29378\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/twitter-impersonators\/29171\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/social-networks\/","name":"social networks"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18485","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=18485"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18485\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/18486"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=18485"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=18485"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=18485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}