{"id":7874,"date":"2021-09-10T07:00:10","date_gmt":"2021-09-10T07:00:10","guid":{"rendered":"https:\/\/carecomputers.co.uk\/?p=7874"},"modified":"2021-09-10T07:00:10","modified_gmt":"2021-09-10T07:00:10","slug":"how-cybercriminals-use-social-media-to-target-organisations","status":"publish","type":"post","link":"https:\/\/creativeideasfactory.co.uk\/carenew\/how-cybercriminals-use-social-media-to-target-organisations\/","title":{"rendered":"How cybercriminals use social media to target organisations"},"content":{"rendered":"<p>In order for businesses to avoid a cyberattack, it is important to understand the tactics cybercriminals are using, and what employees can do to stop them in their tracks. If a hacker wants to gain unauthorised access to an organisation\u2019s network, there are many different tactics they could use. Some of these include finding and exploiting unpatched vulnerabilities in a system or network, however this takes more time and expertise than other methods. For cybercriminals, often the easiest and most effective way of targeting a business is to use social engineering methods to manipulate users into breaching security policies or giving away sensitive information. For a social engineering attack to work, the most important stage is the cybercriminal\u2019s research of the target organisation and its employees. This research stage is made simple due to the prolific nature of social media. In this article we will discuss how cybercriminals use social media to target organisations, and what you can do to avoid a cyberattack.<\/p>\n<p><strong>Stage One: Finding a target organisation<\/strong><\/p>\n<p>In the past, the prime targets for cyberattacks were large organisations as the payoff from a data breach or ransomware attack would be greater than that of a smaller business. However, now all businesses are at risk of a cyberattack. For a cybercriminal, often targeting smaller businesses is more profitable as they typically have a weaker security posture, whilst still having access to a significant amount of customer data. Once a cybercriminal has decided on a target organisation, they will then begin to research the employees to formulate an attack.<\/p>\n<p><strong>Stage Two: Researching the employees<\/strong><\/p>\n<p>Once the cybercriminal has found a target organisation, they are able to view all the employees on LinkedIn. Through their name they can also find Facebook, Instagram and Twitter accounts. These social networking platforms give details about hobbies, family members and even locations employees frequent, through geo-tagged posts. Having this wealth of information makes it easier to deceive the victim and potentially gives answers to password recovery questions, such as \u2018What is your mother\u2019s maiden name?\u2019. Unless the victim has strong privacy settings on their social media accounts, all this information can be accessed without the victim\u2019s knowledge, as they do not need to be followed or added as a friend.<\/p>\n<p><strong>Stage Three: The attack<\/strong><\/p>\n<p>With this information there are many attack vectors that may be effective for a cybercriminal to gain access to a secure business network, or to infect a business with ransomware. One method may be to target the employee\u2019s personal email address with a spear phishing email relating to one of their hobbies or stores they frequent with a malicious link to reset their password on an online account. If the victim resets their password by using their previous password, and that password is the same as their work account, this gives the hacker access to their work account. From here it is simple to launch a ransomware attack or access customer data.<\/p>\n<p>Another method cybercriminals may use is a direct phishing attack to the victim\u2019s work email. Through the prior research a cybercriminal may pose as one of the businesses\u2019 vendors or customers in order to persuade the victim to click a malicious link giving the hacker access to a network or work account. Once they have access to a work account, from the social media research the hacker can easily launch another spear phishing attack from the victim\u2019s email, targeting someone in the organisation with greater access to customer data.<\/p>\n<p><strong>Stage Four: The aftermath<\/strong><\/p>\n<p>Both a ransomware attack and a data breach can be devastating for a business. A data breach has short term consequences of potential fines and fees, along with the potential cost of a forensic investigation. More worryingly, is the long-term consequence of eroding customer trust and a loss of reputation, which can be difficult to recover from.<\/p>\n<p>A ransomware attack may be extremely costly if the ransom is paid out to decrypt the data. Sometimes it is possible to decrypt the data without paying the ransom, however this often leads to significant downtime and the potential to lose data.<\/p>\n<p><strong>How to avoid a cyberattack<\/strong><\/p>\n<p>In the previous example of a fictious cyberattack there are three key takeaways for businesses trying to avoid an attack. Firstly, employees should be conscious about what information is being shared on social media. This is not to say that individuals should not post on social networking platforms, but they should restrict their privacy settings so only trusted friends and colleagues can view their information and posts. Secondly, businesses should educate employees on how to spot phishing emails and general cybersecurity awareness. This education and awareness may stop a cyberattack before it is too late. Finally, businesses should consider investing in a comprehensive cybersecurity solution that decreases the chance of a ransomware attack or data breach. If you want to find out more about how you can keep your business safe, get in contact with us today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In order for businesses to avoid a cyberattack, it is important to understand the tactics cybercriminals are using, and what employees can do to stop them in their tracks. If a hacker wants to gain unauthorised access to an organisation\u2019s network, there are many different tactics they could use. Some of these include finding and [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":7875,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[18,39],"tags":[],"class_list":["post-7874","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-social-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How cybercriminals use social media to target organisations<\/title>\n<meta name=\"description\" content=\"In order for businesses to avoid a cyberattack, it is important to understand the tactics cybercriminals are using, and what employees can\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How cybercriminals use social media to target organisations\" \/>\n<meta property=\"og:description\" content=\"In order for businesses to avoid a cyberattack, it is important to understand the tactics cybercriminals are using, and what employees can\" \/>\n<meta property=\"og:url\" content=\"https:\/\/creativeideasfactory.co.uk\/carenew\/how-cybercriminals-use-social-media-to-target-organisations\/\" \/>\n<meta property=\"og:site_name\" content=\"Care Computers\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-10T07:00:10+00:00\" \/>\n<meta name=\"author\" content=\"Simon Spencer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simon Spencer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/how-cybercriminals-use-social-media-to-target-organisations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/how-cybercriminals-use-social-media-to-target-organisations\\\/\"},\"author\":{\"name\":\"Simon Spencer\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#\\\/schema\\\/person\\\/bfcdaddfd6c3617490c1f1693891b74e\"},\"headline\":\"How cybercriminals use social media to target organisations\",\"datePublished\":\"2021-09-10T07:00:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/how-cybercriminals-use-social-media-to-target-organisations\\\/\"},\"wordCount\":840,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/how-cybercriminals-use-social-media-to-target-organisations\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Security\",\"social media\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/how-cybercriminals-use-social-media-to-target-organisations\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/how-cybercriminals-use-social-media-to-target-organisations\\\/\",\"url\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/how-cybercriminals-use-social-media-to-target-organisations\\\/\",\"name\":\"How cybercriminals use social media to target organisations\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/how-cybercriminals-use-social-media-to-target-organisations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/how-cybercriminals-use-social-media-to-target-organisations\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2021-09-10T07:00:10+00:00\",\"description\":\"In order for businesses to avoid a cyberattack, it is important to understand the tactics cybercriminals are using, and what employees can\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/how-cybercriminals-use-social-media-to-target-organisations\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/how-cybercriminals-use-social-media-to-target-organisations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/how-cybercriminals-use-social-media-to-target-organisations\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/how-cybercriminals-use-social-media-to-target-organisations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How cybercriminals use social media to target organisations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#website\",\"url\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/\",\"name\":\"Care Computers\",\"description\":\"Managed IT Support and Services Provider in Windsor, Berkshire\",\"publisher\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#organization\",\"name\":\"Care Computers\",\"url\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/care-computers-logo.svg\",\"contentUrl\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/care-computers-logo.svg\",\"caption\":\"Care Computers\"},\"image\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#\\\/schema\\\/person\\\/bfcdaddfd6c3617490c1f1693891b74e\",\"name\":\"Simon Spencer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/93f3a12865826337de95458c27581b1d2b53bee5a81ad9c0aee757e53c4089f5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/93f3a12865826337de95458c27581b1d2b53bee5a81ad9c0aee757e53c4089f5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/93f3a12865826337de95458c27581b1d2b53bee5a81ad9c0aee757e53c4089f5?s=96&d=mm&r=g\",\"caption\":\"Simon Spencer\"},\"url\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/author\\\/simon-spencer\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How cybercriminals use social media to target organisations","description":"In order for businesses to avoid a cyberattack, it is important to understand the tactics cybercriminals are using, and what employees can","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"How cybercriminals use social media to target organisations","og_description":"In order for businesses to avoid a cyberattack, it is important to understand the tactics cybercriminals are using, and what employees can","og_url":"https:\/\/creativeideasfactory.co.uk\/carenew\/how-cybercriminals-use-social-media-to-target-organisations\/","og_site_name":"Care Computers","article_published_time":"2021-09-10T07:00:10+00:00","author":"Simon Spencer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Simon Spencer","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/how-cybercriminals-use-social-media-to-target-organisations\/#article","isPartOf":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/how-cybercriminals-use-social-media-to-target-organisations\/"},"author":{"name":"Simon Spencer","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#\/schema\/person\/bfcdaddfd6c3617490c1f1693891b74e"},"headline":"How cybercriminals use social media to target organisations","datePublished":"2021-09-10T07:00:10+00:00","mainEntityOfPage":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/how-cybercriminals-use-social-media-to-target-organisations\/"},"wordCount":840,"commentCount":0,"publisher":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#organization"},"image":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/how-cybercriminals-use-social-media-to-target-organisations\/#primaryimage"},"thumbnailUrl":"","articleSection":["Security","social media"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/creativeideasfactory.co.uk\/carenew\/how-cybercriminals-use-social-media-to-target-organisations\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/how-cybercriminals-use-social-media-to-target-organisations\/","url":"https:\/\/creativeideasfactory.co.uk\/carenew\/how-cybercriminals-use-social-media-to-target-organisations\/","name":"How cybercriminals use social media to target organisations","isPartOf":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#website"},"primaryImageOfPage":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/how-cybercriminals-use-social-media-to-target-organisations\/#primaryimage"},"image":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/how-cybercriminals-use-social-media-to-target-organisations\/#primaryimage"},"thumbnailUrl":"","datePublished":"2021-09-10T07:00:10+00:00","description":"In order for businesses to avoid a cyberattack, it is important to understand the tactics cybercriminals are using, and what employees can","breadcrumb":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/how-cybercriminals-use-social-media-to-target-organisations\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/creativeideasfactory.co.uk\/carenew\/how-cybercriminals-use-social-media-to-target-organisations\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/how-cybercriminals-use-social-media-to-target-organisations\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/how-cybercriminals-use-social-media-to-target-organisations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/creativeideasfactory.co.uk\/carenew\/"},{"@type":"ListItem","position":2,"name":"How cybercriminals use social media to target organisations"}]},{"@type":"WebSite","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#website","url":"https:\/\/creativeideasfactory.co.uk\/carenew\/","name":"Care Computers","description":"Managed IT Support and Services Provider in Windsor, Berkshire","publisher":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/creativeideasfactory.co.uk\/carenew\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#organization","name":"Care Computers","url":"https:\/\/creativeideasfactory.co.uk\/carenew\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#\/schema\/logo\/image\/","url":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-content\/uploads\/2025\/01\/care-computers-logo.svg","contentUrl":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-content\/uploads\/2025\/01\/care-computers-logo.svg","caption":"Care Computers"},"image":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#\/schema\/person\/bfcdaddfd6c3617490c1f1693891b74e","name":"Simon Spencer","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/93f3a12865826337de95458c27581b1d2b53bee5a81ad9c0aee757e53c4089f5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93f3a12865826337de95458c27581b1d2b53bee5a81ad9c0aee757e53c4089f5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93f3a12865826337de95458c27581b1d2b53bee5a81ad9c0aee757e53c4089f5?s=96&d=mm&r=g","caption":"Simon Spencer"},"url":"https:\/\/creativeideasfactory.co.uk\/carenew\/author\/simon-spencer\/"}]}},"_links":{"self":[{"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/posts\/7874","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/comments?post=7874"}],"version-history":[{"count":0,"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/posts\/7874\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/media?parent=7874"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/categories?post=7874"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/tags?post=7874"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}