Millions of social media accounts are compromised each year, with attackers using stolen credentials for impersonation, romance fraud, and financial scams.
Compromise Methods
- Credential stuffing: One of the most common techniques, using leaked passwords from prior data breaches (Verizon Data Breach Investigations Report, 2023, https://www.verizon.com/business/resources/reports/dbir/)
- Phishing: Fake login pages and messages designed to steal credentials (FBI Internet Crime Report, 2023)
- Malware: Keyloggers and spyware capturing login details
- SIM swapping: Account takeover via phone number hijacking
Impact
- Reports consistently show that social media and email accounts are among the most targeted due to their role in identity and financial access (ENISA threat landscape reports).
- Usage of Compromised Accounts
- Stolen accounts are used for impersonation, scam amplification, cryptocurrency fraud, and further credential harvesting
- Cybercrime markets do facilitate the buying and selling of compromised accounts (Europol, 2023),
- Account takeover (ATO) attacks remain widespread across major platforms.