Twitter's Blue Tick Used To Promote Fake Accounts

Twitter recently released Twitter Blue and almost immediately, users started taking advantage of the new tool. Accounts were created impersonating politicians including President Biden and celebrities, as well as other notable people. Several also surfaced purporting to be brands, announcing fake news.

Now the social media platform’s new ‘Blue’ subscription service appears to have been paused for new users, after many fake accounts with blue ticks were launched, impersonating famous people and companies.

Shortly after, the company's share price fell 5% on the New York Stock Exchange, with many drawing a link between the false tweet and the fall in share price. The service was brought in by its new owner, Elon Musk, to  replace the old system whereby users had to undergo a verification process to prove they were who they say they are, in order to obtain a blue tick.

In one example, parody accounts of former British and American leaders, Tony Blair and George W. Bush, were created with the blue tick, making crass jokes about the decision to go to war in Iraq. Even Twitter itself wasn’t spared from the wave of jokes. It was impersonated, with a tweet announcing that Twitter Blue would now be free, which was fake.

 Nintendo, Lockheed Martin, Musk’s own Tesla and SpaceX were also impersonated as well as the accounts of various professional sports figures. Users have even been parodying Pope Francis to and the pharmaceutical giant Eli Lilly & Co was forced to apologise after an impostor account tweeted that insulin was free.

For advertisers who have put their business in Twitter on hold, the fake accounts could be the last straw as Musk’s rocky run atop the platform, laying off half the workforce and triggering high-profile departures, raises questions about its survivability.

While parody accounts are nothing new on the platform, having blue ticks next to their names certainly is. Previously only the genuine person or company would have had the mark, making it easier to distinguish who is a parody and who isn’t. In response, Musk has said from now on parody accounts must clearly state what they are in their titles, and not just in their bios.

There are fears that harmful fake news and not just comedic impersonations, could also spiral out of control under the new system.

As Twitter has hundreds of millions of active users, with many using the site as their principal source of news and information, fake news could spread fast.

Euronews:     Guardian:    Washingtonpost:   Techcrunch:     EconomicTimes:    NDTV:

You Might Also Read: 

British Girl’s Suicide Puts Spotlight On Social Media:

 

« Outsourcing IT Systems & Data Management Can Be A False Economy
Ensure Your Organisation’s Staff Has Cyber Security Awareness For 2023 »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Asavie

Asavie

Asavie provide solutions for Enterprise Mobility Management and secure IoT Connectivity.

Secure-NOK

Secure-NOK

Secure-NOK provides products and solutions that detect and remove security attacks and harmful events in industrial networks and control systems.

4iQ

4iQ

4iQ fuses surface, social, deep and dark web sources to research and assess risks to people, infrastructure, intellectual property and reputation.

Ipsidy

Ipsidy

Our identity platform enables mobile users to more easily authenticate their identity to a mobile phone or portable device of their choosing.

SecureBrain

SecureBrain

SecureBrain software and services help protect against Japanese-specific cybercrime and global internet security threats such as online fraud, phishing, drive-by downloads and malware attacks.

Tier1Asset (T1A)

Tier1Asset (T1A)

T1A is Europe’s leading IT refurbisher. We offer certified data erasure using blancco on site and at our facilities, providing environmentally sound disposal of your used equipment.

AppOmni

AppOmni

AppOmni is the only SaaS CSPM solution that gives teams all the tools they need to be successful – from security posture management to monitoring and detection to continuous compliance.

Censys

Censys

Our customers rely on Censys data to get the global visibility they need of their attack surfaces in order to proactively prevent nation-state attacks and emerging threats.

SOC.OS Cyber Security

SOC.OS Cyber Security

SOC.OS is an alert correlation and triage automation tool. It correlates and prioritises your alerts, boosting productivity, enhancing threat visibility and shortening mean time to respond.

Trustify

Trustify

Trustify is a Managed Security Service Provider offering a suite of world-class Cyber Risk Management services.

OpenAVN (DefenseArk)

OpenAVN (DefenseArk)

Defending your life online, keeping your data safe and private. We detect digital threats magnitudes faster than the leading antivirus software.

Iconium Software

Iconium Software

DataLenz by Iconium offers continuous and real-time tracking of your data assets delivering you the tools you need to successfully reach and maintain your target security standards.

watchTowr

watchTowr

Continuous Attack Surface Testing, with the watchTowr Platform. The future of Attack Surface Management.

CipherStash

CipherStash

CipherStash is a complete data governance and breach prevention platform.

Protos Labs

Protos Labs

Protos Labs enables insurers & enterprises to make better cyber risk decisions through holistic, real-time risk management tools.

Cognna

Cognna

Cognna's innovative platform is designed to empower you and your team, providing the tools you need to detect, prevent, and resolve threats with ease.