Twitter's Blue Tick Used To Promote Fake Accounts

Twitter recently released Twitter Blue and almost immediately, users started taking advantage of the new tool. Accounts were created impersonating politicians including President Biden and celebrities, as well as other notable people. Several also surfaced purporting to be brands, announcing fake news.

Now the social media platform’s new ‘Blue’ subscription service appears to have been paused for new users, after many fake accounts with blue ticks were launched, impersonating famous people and companies.

Shortly after, the company's share price fell 5% on the New York Stock Exchange, with many drawing a link between the false tweet and the fall in share price. The service was brought in by its new owner, Elon Musk, to  replace the old system whereby users had to undergo a verification process to prove they were who they say they are, in order to obtain a blue tick.

In one example, parody accounts of former British and American leaders, Tony Blair and George W. Bush, were created with the blue tick, making crass jokes about the decision to go to war in Iraq. Even Twitter itself wasn’t spared from the wave of jokes. It was impersonated, with a tweet announcing that Twitter Blue would now be free, which was fake.

 Nintendo, Lockheed Martin, Musk’s own Tesla and SpaceX were also impersonated as well as the accounts of various professional sports figures. Users have even been parodying Pope Francis to and the pharmaceutical giant Eli Lilly & Co was forced to apologise after an impostor account tweeted that insulin was free.

For advertisers who have put their business in Twitter on hold, the fake accounts could be the last straw as Musk’s rocky run atop the platform, laying off half the workforce and triggering high-profile departures, raises questions about its survivability.

While parody accounts are nothing new on the platform, having blue ticks next to their names certainly is. Previously only the genuine person or company would have had the mark, making it easier to distinguish who is a parody and who isn’t. In response, Musk has said from now on parody accounts must clearly state what they are in their titles, and not just in their bios.

There are fears that harmful fake news and not just comedic impersonations, could also spiral out of control under the new system.

As Twitter has hundreds of millions of active users, with many using the site as their principal source of news and information, fake news could spread fast.

Euronews:     Guardian:    Washingtonpost:   Techcrunch:     EconomicTimes:    NDTV:

You Might Also Read: 

British Girl’s Suicide Puts Spotlight On Social Media:

 

« Outsourcing IT Systems & Data Management Can Be A False Economy
Ensure Your Organisation’s Staff Has Cyber Security Awareness For 2023 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Odix

Odix

Odix security software neutralizes file embedded targeted cyber attacks before they enter your organization’s network.

Panaseer

Panaseer

Panaseer is an enterprise cybersecurity automation and data analytics company that helps organizations stop preventable breaches by ensuring security controls are working effectively.

Swiss Cyber Storm

Swiss Cyber Storm

Swiss Cyber Storm is a non profit organization hosting the international Swiss Cyber Storm Conference and running the Swiss part of the European Cyber Security Challenges.

Auxilium Cyber Security

Auxilium Cyber Security

Auxilium Cyber Security is independent information security consultancy company.

Digital Law

Digital Law

Digital Law is the only UK law firm to specialise solely in online, data and cyber law.

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

CSRI solves the cyber security threats of tomorrow, today. We work with industry and government leaders on innovative research that has real-world impact.

Xperience

Xperience

Xperience solves our clients’ toughest challenges by delivering business efficiency through digital transformation solutions across cloud, managed IT, CRM and ERP.

BaaSid

BaaSid

BaaSid is next generation security technology for data security & security authentication based on De-centralized & Blockchain.

National Cybersecurity Alliance

National Cybersecurity Alliance

The National Cybersecurity Alliance is a non-profit organization on a mission to create a more secure, interconnected world.

TrustCloud

TrustCloud

TrustCloud is a global company specializing in the orchestration and custody of secure digital transactions including identification, signature, payments, and electronic custody.

Total Secure Technology

Total Secure Technology

Total Secure Technology provides trusted Managed IT Security and Managed IT Services for organizations looking to increase their cybersecurity defensive posture.

Irys Technologies

Irys Technologies

Irys Technologies specialize in pioneering digital transformation solutions designed to streamline communications and enhance maintenance and operational efficiency for a variety of sectors.

Invictus International Consulting

Invictus International Consulting

Invictus International Consulting are a recognized leader in full-spectrum cyber technology solutions designed to protect the security of our nation's global defense and critical infrastructure.

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.

Nuke From Orbit

Nuke From Orbit

Nuke's mission is to put you back in control of your digital identity when your smartphone gets stolen.

EasySec Solutions

EasySec Solutions

EasySec Solutions provides a cyber-security platform, based on a combination of the zero trust model and the software-defined security management.