Fraud attempts in social networks: How Facebook scams work

  • May 15, 2012
  • 6 min read


As of June 2017, the world’s largest social network Facebook boasts more than two billion users – an impressive number considering there are 7 billion people on the planet. Unfortunately, the more people that connect to a centralized platform, the more desirable a target it becomes to online criminals.

Every year, there is an increasing amount of news regarding attempted fraud, identity theft, and hacker’s attacks on Facebook. This isn’t surprising, as these actions occur in real-time, and the news is spread through social media like wildfire. Most attacks involve scams, meaning that antivirus or anti-malware software can’t always help because malicious software may not be involved. Instead, the scammers play on the naivety or greed of their victims. Therefore it is pertinent for us to explain their general techniques, so that you can avoid these scams and use Facebook safely in the future.

How Facebook scammers operate

The goal of the scammers is to get the attention of as many people as possible in order to lure the maximum number of potential victims. Sensational news is therefore commonly used as bait.

For example, the deaths of famous people such as Whitney Houston or Steve Jobs have been exploited by scammers. In both cases, the scams claimed to have red hot news about one of these celebrities, such as a video showing the diva shortly before her tragic death. Less sensational topics are also used – basically any short titbit of information that is likely to raise interest.

Once the scammer has managed to arouse the victim’s interest, they have already won half the battle. Typically the scam involves enticing the victim to click on an external link or like a Facebook app that will then take them to the sensational content. It’s easy to see where this scam is going of course – this piece of news is fake. It’s a psychological trick, as we tend to ignore the voice of reason in these situations and behave exactly like the scammers want us to.

The scammer can now proceed in several ways. Sometimes they create links to YouTube videos or websites in order to increase the number of clicks. Other common methods range from forcing you to take surveys which they receive money for, to phishing attempts and spreading malware. As this is a considerable risk to your private data and your wallet, you should be very cautious of falling for a scammer’s tricks.

Real life examples of Facebook scams

Enough of the theory, let’s take a look at some real scams that we have seen in the wild.

Example 1: Amy Winehouse

Amy Winehouse was found dead in her apartment in July 2011. Thanks to keen public interest, the first scam attempts didn’t take long to surface. The most successful scam promised a shocking video showing the deceased singer shortly before her death.


There was no such video of course. Rather, the victim was directed to the following
page:


Here the victim was then prompted to share the link in order to reach as many Facebook users as possible. Not only that, but there was also a survey to fill out, supposedly in order to win an iPad 2. After completing the survey the victim would begin to wonder where the promised video was – they may have been presented with an insignificant video or simply nothing at all. By now the scammer had achieved their goal – the enticing message had been spread, and they had earned money from the completed survey.

Example 2: Steve Jobs

The death of the well known Apple founder was also exploited by online scammers. In no time several Facebook pages had been created, some supposedly by Apple themselves, others simply in the name of a business. The content, however, was always the same:


A considerable amount of iPads was to be raffled off in memory of the recently deceased. The amount varied between 50 and 500. The intention of the scams also varied; from asking the victims to fill out surveys to redirecting them to online casino websites. These scams proved to be a classic example of how many people fall for these tricks and spread the message to their followers.

Example 3: Fake apps

This approach differs slightly from the social media scams illustrated in the first two examples.


Here we have a Facebook application that claims to show you how many people have visited your profile. The message is typically spread to your friends’ walls.


Once your interest has been aroused, the application requests permission to access all your Facebook data and functions. This ensures that the fake app continues to spread even further. The collected data can be used to send spam directly or be sold off to commercial spammers.


The aforementioned surveys are used in this example as well – easy money for the scammers. Such scam apps are of course removed by Facebook as soon as they become aware of them. The scammers are not at all deterred however, and simply continue to create new applications with different names.

Example 4: Fake friend requests

In the scams we have examined so far, Facebook itself has been abused as the means of communication. However, scammers also send fake e-mails purporting to be from Facebook, such as the following friend request.


The link doesn’t take you to Facebook, but instead to a fake replica of the site. You are then prompted to update Macromedia Flash player.


Clicking on the link and launching updateflash.exe is a fatal move, as it is actually the well-known Zeus trojan, also known as Zbot. And as if this wasn’t enough, there is also an exploit kit on the website in case the victim doesn’t launch the fake update.

This places your personal data and the security of your PC at great risk!

How to protect yourself from social media scams

All of these scam attempts would have been unsuccessful if the recipients hadn’t fallen for the initial bait. Please keep the following points in mind:

Emsisoft Endpoint Protection: Award-Winning Security Made Simple

Experience effortless next-gen technology. Start Free Trial

Have a nice (malware-free) day!

Emsi

Emsi

Emsisoft founder and managing director. In 1998 when I was 16, a so called 'friend' sent me a file via ICQ that unexpectedly opened my CD-ROM drive, which gave me a big scare. It marked the start of my journey to fight trojans and other malware. My story

What to read next