Close Menu
  • Latest News
    • Bitcoin
    • Ethereum
    • Altcoins
    • Meme Coins
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Gaming
  • Legal
    • Legal and Regulatory
    • Adoption
  • Analysis
  • Learn
    • Education
    • Wallets and Exchanges
  • Tools
    • Market Overview
    • Exchange Tool
  • INFO@FREE.CC
What's Hot

Crypto leaked by South Korean tax officials stolen a second time

March 6, 2026

Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

March 6, 2026

How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

March 6, 2026
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • Disclosure
Facebook X (Twitter) Instagram
Free.cc (Free Cryptocurrency)Free.cc (Free Cryptocurrency)
  • Latest News
    1. Bitcoin
    2. Ethereum
    3. Altcoins
    4. Meme Coins
    5. View All

    The Core Issue: Consensus Cleanup

    March 6, 2026

    Canada launches new multi-crypto ETF as banks enter the sector

    March 6, 2026

    Bitcoin Price Debate Ignites as Bull Trap Warning Clashes With On-Chain Data

    March 6, 2026

    Bitcoin Primed for Rally Through March if History Repeats, According to Benjamin Cowen – But There’s a Catch

    March 5, 2026

    Top Analyst Reveals What’s Next For Bitcoin, Ethereum and XRP

    March 5, 2026

    Ethereum Price Analysis: Institutional Buying Returns as Whales Accumulate

    March 5, 2026

    Ethereum Hovers at $2,150 — Can ETH Price Rally to $2,400 or Stall Below $2,200?

    March 5, 2026

    Vitalik Buterin Admits Ethereum Hasn’t Meaningfully Improved People’s Lives

    March 5, 2026

    How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

    March 6, 2026

    Bitcoin Liquidity Set To Expand With Morgan Stanley BTC ETF Option

    March 6, 2026

    Bitcoin Suppressed By Shadow Banking Rehypothecation: Saylor

    March 5, 2026

    XRP Price Retests Decade-Old Trendline That Previously Triggered 630%+ Rallies

    March 5, 2026

    Crypto Interest Rising Toward Meme Coin Sector

    January 9, 2026

    Memes Market Cap Adds $10B in Days: Fresh Capital or Dead-Cat-Bounce?

    January 5, 2026

    Meme Coin Market Surges Past $45B as Shiba Inu, PEPE, BONK Stage 54% Price Pump

    January 4, 2026

    US Ranks #1 in CoinGecko Global Meme Coin Interest Report

    December 18, 2025

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026

    Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

    March 6, 2026

    How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

    March 6, 2026

    The Core Issue: Consensus Cleanup

    March 6, 2026
  • Tech
    1. Blockchain
    2. Security and Privacy
    3. View All

    Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

    March 6, 2026

    Startale App Integrates Kyo Finance to Power Seamless Swaps on Soneium

    March 6, 2026

    ICB Network and Mokoko AI Entail Strategic Partnership to Transform Web3 Gaming Infrastructure

    March 6, 2026

    Atlasbrary and Flux Partner to Boost Scalable Web3

    March 5, 2026

    Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion

    March 4, 2026

    DOJ seizures of $580M expose how crypto investment scams scaled into shift work with quotas and scripts

    March 3, 2026

    Aeternum Botnet Shifts Command Control to Polygon Blockchain

    February 27, 2026

    Former Defense Contractor Boss Gets 7+ Years for Selling Zero Days

    February 26, 2026

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026

    Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

    March 6, 2026

    How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

    March 6, 2026

    The Core Issue: Consensus Cleanup

    March 6, 2026
  • Web 3
    1. Gaming
    2. View All

    METYA Partners With Kult Games to Expand Web3 Gaming Ecosystem

    March 6, 2026

    AurumX Collaborates with FishWar to Redefine Web3-Based Gaming Economies

    March 5, 2026

    C. Thi Nguyen: Prioritizing enjoyment over efficiency in games, the pitfalls of social media scoring systems, and how metrics can obscure true value

    March 4, 2026

    NFTs as Programmable Ownership Layers | Web3 Infrastructure Explained

    March 3, 2026

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026

    Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

    March 6, 2026

    How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

    March 6, 2026

    The Core Issue: Consensus Cleanup

    March 6, 2026
  • Legal
    1. Legal and Regulatory
    2. Adoption
    3. View All

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026

    Reform UK tops donations with millions from Thailand-based crypto investor: Report

    March 6, 2026

    Donald Trump’s crypto legacy in two words: Paul Atkins

    March 6, 2026

    International finance watchdog warns stablecoins are increasingly used in sanctions evasion and money laundering

    March 5, 2026

    XRP and XRPL get a credibility lift from Ripple’s expanding footprint

    March 5, 2026

    XRP rewrites the playbook for altcoin ETF approvals to surge in late 2026 after a wave of futures listings

    March 4, 2026

    Bitcoin ETF custody concentrates power in one place, and now a single operational failure causes dangerous ripples

    March 3, 2026

    Revolut’s stablecoin test targets its 12M UK users

    March 3, 2026

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026

    Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

    March 6, 2026

    How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

    March 6, 2026

    The Core Issue: Consensus Cleanup

    March 6, 2026
  • Analysis

    XRP Price Consolidates Under $1.5 — What Could Drive the Next Move to $2?

    March 5, 2026

    Israel’s weekly $3B Iran war cost equals over 41,000 Bitcoin

    March 5, 2026

    Chainlink Price Gains Attention After Visa e-HKD Pilot and LINK Chart Signals Possible Breakout

    March 5, 2026

    Can the Bulls Push the Price to $1.16 as $1 Resistance is Back in Focus

    March 5, 2026

    Bitcoin investors may not need altcoins to diversify if tokenized stocks move on-chain

    March 5, 2026
  • Learn
    1. Education
    2. Wallets and Exchanges
    3. View All

    What Is Strategy (MSTR)? The Bitcoin Treasury Company

    February 21, 2026

    What Are Prediction Markets? How Polymarket, Kalshi and Myriad Work

    February 13, 2026

    What Is Farcaster? The Decentralized Social Media Protocol

    February 10, 2026

    What Is Venice AI? The Privacy-Focused Chatbot

    January 13, 2026

    Crypto platform aims to let retail investors buy IPO shares at the same price as Wall Street insiders

    March 6, 2026

    The company holding all Bitcoin ETF coins is losing money, resurfacing questions about centralization

    February 21, 2026

    The Bitcoin CME gap will now close forever in May leaving a return to $84k hanging

    February 21, 2026

    Robinhood’s $221 million crypto revenue drop shows crypto winter isn’t on chain and retail already moved

    February 16, 2026

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026

    Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

    March 6, 2026

    How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

    March 6, 2026

    The Core Issue: Consensus Cleanup

    March 6, 2026
  • Tools
    • Market Overview
    • Exchange Tool
  • INFO@FREE.CC
Free.cc (Free Cryptocurrency)Free.cc (Free Cryptocurrency)
Home»Security and Privacy»Social Media Phishing – The 2023 Cybersecurity Threat
Social Media Phishing – The 2023 Cybersecurity Threat
Security and Privacy

Social Media Phishing – The 2023 Cybersecurity Threat

October 5, 2025No Comments6 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

According to a report, more than half of the world uses social media, and that’s a lot. Most of us use it to tell others what we’re up to, where we’re from, when our birthday is, and what we like. Businesses also rely on social media to sell things, market their brand, and talk to customers. 

But hackers see all this as significant information and can exploit it to trick us into giving them our personal information. They do this through phishing attacks.  

The Federal Trade Commission recently shared a report revealing $8.8bn was lost to scams in 2022. That’s 30% more than in the previous year.  

Therefore, precautions are necessary. But before that, you should know what a social media phishing attack looks like and how a hacker tricks you.    

What is Social Media Phishing   

Phishing is when cybercriminals impersonate a fake identity to trick victims into sharing their sensitive information by creating a false sense of security and urgency. However, when phishers attack through platforms like Instagram, Facebook, Twitter and LinkedIn, it is called social media phishing. Cyber-criminals target social media because it can give them access to numerous linked accounts of family, friends and clients.

How a Phishing Scam Looks on Social Media  

To combat a phishing attempt, it’s crucial to detect it in real-time. Stay informed about prevalent phishing schemes and remain vigilant for suspicious social media activity.  

Phishing Through Emails  

In 2021, more than 90% of organizations in the UK became victims of the email phishing attack.  

Social media platforms often send emails to update users about security protocols or account-related information. Unfortunately, users trust these emails when they originate from legitimate social media sites. These email templates are often standard and familiar, making them an easy target for spoofing.  

See also  Multifaceted Phishing Scheme Deceives Bitpanda Customers

Due to users’ tendency to disregard the design elements of these emails, hackers benefit from this behavior by incorporating fraudulent links and buttons within the message body. When clicked, these links direct users to malicious sites where scammers steal sensitive information.   

Scammers often employ tactics, such as setting up fraudulent password reset scams or initiating malware downloads, to trick people into giving away their personal information. 

Fake LinkedIn Jobs   

Scammers can also exploit LinkedIn by creating bogus company pages and job scams. These scams begin with fraudulent job postings and gathering sensitive information. Then, cyber-criminals use this information in future phishing attacks.  

Scammers sometimes take things a step further by offering victims a fictitious job and sending them a fraudulent initial paycheck by mail. After the victim deposits the check, the scammer will provide a reason for asking the victim to return a portion of the funds. Once the check bounces, the scammer disappears with the victim’s money.  

Malicious Direct Messages  

Social media platforms such as Instagram and Facebook provide easy direct messages. Many apps also have an in-app messaging feature, which scammers can exploit to create fraudulent profiles and impersonate someone close to the victim, such as a family member or friend.  

By taking advantage of the direct communication channel and the user’s trust, these scammers fabricate fake scenarios and ask for help. Often, these requests involve emergency payments or passwords to private accounts.  

Crypto Scams  

A common social media phishing scam is a cryptocurrency investment or giveaway scam. These fraudulent activities are promoted on Facebook and Twitter and propagated through fake celebrity profiles.  

See also  British Army Social Media Accounts Hijacked

In 2021 alone, these fake accounts stole over $2m through cryptocurrency scams. 

These impostors create social media accounts that look legitimate, and they use persuasive language, often with a sense of urgency, to convince people to send them cryptocurrency. These scams are so convincing that even famous figures like Elon Musk and former US president Barack Obama have had their profiles impersonated by cyber-criminals. 

Fraudulent Quizzes  

Cyber-criminals often pose seemingly harmless questions on social media platforms, such as asking about your first job or first car. Though these posts may seem innocent, they can be used as security questions to gain access to your personal information.  

This issue is particularly prevalent on Facebook but also other social media platforms.  

Cyber-criminals, working individually or collaboratively, can exploit quizzes, surveys on Twitter and Instagram, and ‘get to know you’ videos on TikTok.  

Customer Support Scam  

Online chats are instant and easier than phone calls. This makes them popular among younger consumers who prefer text messages over waiting. Many companies are expanding their service options by offering dedicated support accounts to cater to these preferences.  

Unfortunately, scammers can easily deceive people by using a stolen logo and company description to create fake accounts that look like genuine companies. They then ask for help. They might direct targets to fake login pages and steal their login credentials. Some scammers even ask for upfront payment for repair services they don’t provide.   

How to Prevent Phishing on Social Media  

Phishing attacks are growing rapidly, and so is the risk of victimization. However, there are some practical and easy ways to stay safe.    

  • Don’t publicly share your personal information on social media. You may want to know if a set of random questions can perfectly guess your age. However, these simple questions can drastically affect you.  
  • Always check the URL and source of the message/email. Have you contacted them before? Are there any signs of phishing in the email, such as typosquatting or doubtful email addresses?  
  • Use a combination of security measures such as anti-virus software, encryption, strong passwords and two-factor authentication. Also, don’t use the same password for multiple social media accounts.  
  • When applying for a job, always verify the authenticity of job postings or communications received through the platform.
  • Don’t add unknown people to your social media accounts.  
  • Don’t click on a suspicious link. To update your personal details, refer to the social media platform directly instead of clicking an email link.  
  • If you own a company, inform your clients and employees about your communication practices and the channels you use to connect with them.  
See also  Bitcoin - Why the $524M BTC rush is latest threat to ETH's rally

Conclusion  

Along with the increasing use of social media, privacy theft risks are also increasing. Cybercrime is evolving and getting worse with each passing year. To remain safe, you should know how to spot a phishing technique and avoid being a victim.  

Editorial image credit: ashadhodhomei / Shutterstock.com

Cybersecurity Media phishing Social threat
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

C. Thi Nguyen: Prioritizing enjoyment over efficiency in games, the pitfalls of social media scoring systems, and how metrics can obscure true value

March 4, 2026

Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion

March 4, 2026

DOJ seizures of $580M expose how crypto investment scams scaled into shift work with quotas and scripts

March 3, 2026

Social Engineering in Web3 Gaming: How Scammers Target Discord and DMs

March 2, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Humanity launches Proof of Trust to fight AI fraud

February 21, 2026

Ethereum adoption breaks records – So why is ETH below $4.3K?

October 1, 2025

Stay ahead with the latest crypto news, market updates, blockchain insights, and trends. Your trusted source for everything happening in the digital asset world.


We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

Crypto leaked by South Korean tax officials stolen a second time

March 6, 2026

Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

March 6, 2026

How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

March 6, 2026
Get Informed

Subscribe to Updates

Get the latest creative news From Free.cc directly in your Inbox!

  • Contact
  • Privacy Policy
  • Terms & Conditions
  • Disclosure
© 2026 free.cc - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.