Over the past few years, social media has become a breeding ground for cybercriminals to spread malware and carry out phishing attacks. Facebook, being one of the most widely used social media platforms, is a prime target for hackers. However, hackers are now using a new tactic to trick unsuspecting users – misusing verified pages to distribute Bard AI malware.
Verified pages on Facebook are used by businesses and public figures to establish their credibility and authenticity on the platform. The verification process involves confirming the identity of the page owner and ensuring that they meet specific criteria set by Facebook.
Once verified, the page is marked with a blue tick, indicating its authenticity. However, cybercriminals have found a way to misuse this feature by renaming verified pages to trick users into thinking that they are interacting with a legitimate entity.
One such example that I found is the recent case of hackers renaming verified pages to “Bard AI” and using them to distribute malware.
In this attack, the hackers created several pages that claimed to belong to legitimate companies. They then changed the page names to “Bard AI” and used them to distribute malware to unsuspecting users. The malware was disguised as software updates or plugins and was designed to steal sensitive information from the user’s device.
The use of verified pages adds a new layer of sophistication to the hackers’ tactics, making it even harder for users to identify fake pages. The blue tick that appears next to the page name makes it easier for hackers to gain users’ trust and convince them to download the malware.
Facebook and other social media platforms must also take steps to prevent the misuse of verified pages and ensure that users can trust the authenticity of the pages they interact with on their platforms.
Bijay Pokharel
Related posts
Recent Posts
Subscribe
Cybersecurity Newsletter
You have Successfully Subscribed!
Sign up for cybersecurity newsletter and get latest news updates delivered straight to your inbox. You are also consenting to our Privacy Policy and Terms of Use.