Online Social Networks(OSN) are an integral part of today’s Web. Hacktivist,Politicians, celebrities, revolutionists, and others use OSNs as carrier for their message to a wide audience.
The downside is that these powerful tools can be used to spread disinformation and propaganda. The next generation of social engineering attacks is even more deceptive; they employ an automation software called a socialbot that controls a profil in an OSN, and has the ability to execute basic online social activities.
In the attached paper, is demostrated how vulnerable OSNs are to a large-scale infltration by socialbots: computer programs that control OSN accounts and mimic real users. Adopting a traditional web-based
botnet design and built a Socialbot Network (SbN): a group of adaptive socialbots that are orchestrated in a command-and-control fashion. In the abstract are proposed tge results obtained using the following OSN Vulnerabilities:
The results show that OSNs, such as Facebook, can be infiltrated with a success rate of up to 80% depending on users’ privacy settings, a successful infiltration can result in privacy breaches where even more users’ data are exposed when compared to a purely public access, and in practice, OSN security defenses, such as the Facebook Immune System, are not effective enough in detecting or stopping a large scale infiltration as it occurs. I believe that large-scale infiltration in OSNs is only one of many future cyber threats, and defending against such threats is the first step towards maintaining a safer social Web for millions of active web users.
References:
The Socialbot Network: When Bots Socialize for Fame and Money
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.