Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Infrastructure

Fake Twitter Followers Selling by the Thousands

The market for fake Twitter followers is going strong.

The market for fake Twitter followers is going strong.

According to new research from Barracuda Networks, the number of sellers they have seen hawking Twitter followers on eBay has gone up from 20 in June to 52. The average price per thousand followers is currently $11.

That can translate into big money for the sellers, as the average number of followers per person purchasing them was 48,885. This is actually a drop-off from June, when the number was 52,432.

“Most fake accounts automatically tweet through Twitter.com instead of using a third party or mobile app,” the firm noted in as blog post. “Ninety-eight percent of tweets from fake accounts are sent via twitter.com vs. 24 percent of tweets from real accounts.”

Advertisement. Scroll to continue reading.

Sixty-three percent of Fake Accounts are created by duplicating profiles from real users. Often, attackers add victims to a Twitter List to get their attention.

Daniel Peck, research scientist told SecurityWeek there was little that Twitter could do “algorithmically” to detect and flag the duplicated accounts due to the finite number of usernames available to for people to create an account.

In some cases, fake accounts are used to spread spam and malware. However, sometimes people are looking to buy fake followers for other reasons as well. Most of the time, it revolves around gaining clout and appearing to be popular, Peck said. For instance a musician trying to look like he has more fans to impress venues or labels, or a software startup looking like they have more people interesting in what they’re producing to look more attractive to advertisers and investors, he noted.

“In summary people still have a large appetite for having a large number of fake followers in order to seem more popular,” according to the firm. “Fraudsters are cashing in on this in a big way and even lowering prices to compete against each other.”

“Lastly, we see the attackers continuing to innovate to find ways to monetize the increasingly popular platform of Twitter,” the blog post continued. “This is the situation that we are seeing with most social networks and new applications. Not only is this abuse continuing on Facebook and Twitter but we also see it on emerging social networks like Tinder and others. As more users are present in any ecosystem, the attackers focus their efforts there.”

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Security Infrastructure

Comcast jumps into the enterprise cybersecurity business, betting that its internal security tools and inventions can find traction in an expanding marketplace.

Management & Strategy

Hundreds of companies are showcasing their products and services this week at the 2023 edition of the RSA Conference in San Francisco.

Security Infrastructure

XDR's fully loaded value to threat detection, investigation and response will only be realized when it is viewed as an architecture

Funding/M&A

Identity and access governance vendor Saviynt has closed a $205 million financing round.

Cloud Security

The term ‘zero trust’ is now used so much and so widely that it has almost lost its meaning.

ICS/OT

Security orchestration, automation and response (SOAR) provider Swimlane on Monday announced the launch of a security automation solution ecosystem for operational technology (OT) environments.

Identity & Access

The National Security Agency (NSA) has published a series of recommendations on how to properly configure IP Security (IPsec) Virtual Private Networks (VPNs).