Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Infrastructure

Fake Twitter Followers Selling by the Thousands

The market for fake Twitter followers is going strong.

The market for fake Twitter followers is going strong.

According to new research from Barracuda Networks, the number of sellers they have seen hawking Twitter followers on eBay has gone up from 20 in June to 52. The average price per thousand followers is currently $11.

That can translate into big money for the sellers, as the average number of followers per person purchasing them was 48,885. This is actually a drop-off from June, when the number was 52,432.

“Most fake accounts automatically tweet through Twitter.com instead of using a third party or mobile app,” the firm noted in as blog post. “Ninety-eight percent of tweets from fake accounts are sent via twitter.com vs. 24 percent of tweets from real accounts.”

Advertisement. Scroll to continue reading.

Sixty-three percent of Fake Accounts are created by duplicating profiles from real users. Often, attackers add victims to a Twitter List to get their attention.

Daniel Peck, research scientist told SecurityWeek there was little that Twitter could do “algorithmically” to detect and flag the duplicated accounts due to the finite number of usernames available to for people to create an account.

In some cases, fake accounts are used to spread spam and malware. However, sometimes people are looking to buy fake followers for other reasons as well. Most of the time, it revolves around gaining clout and appearing to be popular, Peck said. For instance a musician trying to look like he has more fans to impress venues or labels, or a software startup looking like they have more people interesting in what they’re producing to look more attractive to advertisers and investors, he noted.

“In summary people still have a large appetite for having a large number of fake followers in order to seem more popular,” according to the firm. “Fraudsters are cashing in on this in a big way and even lowering prices to compete against each other.”

“Lastly, we see the attackers continuing to innovate to find ways to monetize the increasingly popular platform of Twitter,” the blog post continued. “This is the situation that we are seeing with most social networks and new applications. Not only is this abuse continuing on Facebook and Twitter but we also see it on emerging social networks like Tinder and others. As more users are present in any ecosystem, the attackers focus their efforts there.”

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Security Infrastructure

Security vendor consolidation is picking up steam with good reason. Everyone wants to improve security efficiency and effectiveness while paying for less.

Management & Strategy

Hundreds of companies are showcasing their products and services this week at the 2023 edition of the RSA Conference in San Francisco.

Cloud Security

The term ‘zero trust’ is now used so much and so widely that it has almost lost its meaning.

Security Infrastructure

Instead of deploying new point products, CISOs should consider sourcing technologies from vendors that develop products designed to work together as part of a...

Security Infrastructure

Comcast jumps into the enterprise cybersecurity business, betting that its internal security tools and inventions can find traction in an expanding marketplace.

Audits

The PCI Security Standards Council (SSC), the organization that oversees the Payment Card Industry Data Security Standard (PCI DSS), this week announced the release...

Security Infrastructure

XDR's fully loaded value to threat detection, investigation and response will only be realized when it is viewed as an architecture