Twitter's Blue Tick Used To Promote Fake Accounts

Twitter recently released Twitter Blue and almost immediately, users started taking advantage of the new tool. Accounts were created impersonating politicians including President Biden and celebrities, as well as other notable people. Several also surfaced purporting to be brands, announcing fake news.

Now the social media platform’s new ‘Blue’ subscription service appears to have been paused for new users, after many fake accounts with blue ticks were launched, impersonating famous people and companies.

Shortly after, the company's share price fell 5% on the New York Stock Exchange, with many drawing a link between the false tweet and the fall in share price. The service was brought in by its new owner, Elon Musk, to  replace the old system whereby users had to undergo a verification process to prove they were who they say they are, in order to obtain a blue tick.

In one example, parody accounts of former British and American leaders, Tony Blair and George W. Bush, were created with the blue tick, making crass jokes about the decision to go to war in Iraq. Even Twitter itself wasn’t spared from the wave of jokes. It was impersonated, with a tweet announcing that Twitter Blue would now be free, which was fake.

 Nintendo, Lockheed Martin, Musk’s own Tesla and SpaceX were also impersonated as well as the accounts of various professional sports figures. Users have even been parodying Pope Francis to and the pharmaceutical giant Eli Lilly & Co was forced to apologise after an impostor account tweeted that insulin was free.

For advertisers who have put their business in Twitter on hold, the fake accounts could be the last straw as Musk’s rocky run atop the platform, laying off half the workforce and triggering high-profile departures, raises questions about its survivability.

While parody accounts are nothing new on the platform, having blue ticks next to their names certainly is. Previously only the genuine person or company would have had the mark, making it easier to distinguish who is a parody and who isn’t. In response, Musk has said from now on parody accounts must clearly state what they are in their titles, and not just in their bios.

There are fears that harmful fake news and not just comedic impersonations, could also spiral out of control under the new system.

As Twitter has hundreds of millions of active users, with many using the site as their principal source of news and information, fake news could spread fast.

Euronews:     Guardian:    Washingtonpost:   Techcrunch:     EconomicTimes:    NDTV:

You Might Also Read: 

British Girl’s Suicide Puts Spotlight On Social Media:

 

« Outsourcing IT Systems & Data Management Can Be A False Economy
Ensure Your Organisation’s Staff Has Cyber Security Awareness For 2023 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

April 4, 2024 | 11:00 AM PT: Join this webinar to find out about six emerging trends dominating the cloud cybersecurity landscape.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Beyond Security

Beyond Security

Beyond Security is a leader in automated vulnerability assessment and compliance solutions - enabling customers to accurately assess and manage security weaknesses in their networks and applications.

CloudCodes Software

CloudCodes Software

CloudCodes is a cloud security solutions provider focused on providing cloud security solutions to enterprise customers.

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

ISGroup (Information Security Group)

ISGroup (Information Security Group)

ISGroup services include network penetration testing, Web application penetration testing, ethical hacking, vulnerability assessments, code review and associated training.

SecLytics

SecLytics

SecLytics is the leader in Predictive Threat Intelligence. Our SaaS-based Augur platform leverages behavioral profiling and machine learning to hunt down cyber criminals.

AdaptiveMobile Security

AdaptiveMobile Security

AdaptiveMobile Security, a world leader in mobile network security, protecting more than 2.2 billion subscribers worldwide.

Tata Consultancy Services

Tata Consultancy Services

Tata Consultancy Services is a global leader in IT services, consulting & business solutions including cyber security.

Idaptive

Idaptive

Idaptive delivers Next-Gen Access through a zero trust approach. Idaptive secures access everywhere with single sign-on, adaptive MFA, EMM and analytics.

AppTec

AppTec

AppTec is a leading software vendor in the field of Unified Endpoint Management and Mobile Security.

Celerium

Celerium

Celerium transforms cyber defense for both companies and industry sectors by leveraging cyber threat intelligence to defend against cyber threats and attacks.

ForAllSecure

ForAllSecure

ForAllSecure’s mission is to make the world’s software safe by pioneering autonomous cybersecurity tools that automatically find and fix vulnerabilities in run-time executable software.

SOFTwarfare

SOFTwarfare

SOFTwarfare deliver high-quality, reliable and secure enterprise application integrations through RESTful APIs for Cyber, Ops & Dev.

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

SEEDS conducts research and develops innovative cybersecurity technologies, tools, and methodologies that advance the energy sector’s ability to survive cyber incidents.

FYEO

FYEO

FYEO is a threat monitoring and identity access management platform for consumers, enterprises and SMBs.

Cyber Command - Romania

Cyber Command - Romania

Cyber Command represents the military authority responsible for the development, protection and resilience of military IT networks and services that support the Romanian Force Structure.

Tarlogic

Tarlogic

Tarlogic works to protect and defend your security with the highest quality technical team with next generation solutions to achieve the best protection.