top of page
griffin jd.jpg

PROJECT: THE DARK SIDE OF VIRAL POSTS - UNMASKING CLICKBAIT SCAMS

YOU MAY SHARE THIS PUBLIC DOCUMENT

 

The social media post about a young boy, approximately 2 years old, who was found and safe at a police station while authorities sought to locate his family quickly went viral. While the shocking photo of the child stirred strong emotions,

it is actually part of a clickbait scam.


Clickbait scams are a common tactic used by cybercriminals to trick people into clicking on malicious links or downloading harmful files. These scams often use sensational or misleading headlines or photos to entice users to click, which can lead to the installation of malware, the theft of personal information, or other harmful consequences.

 
 

EXAMPLES OF CLICKBAIT SCAMS INCLUDE:

  • FAKE NEWS ARTICLES:

    • These articles often contain fabricated or misleading information and are designed to generate clicks and shares on social media.

  • QUIZZES AND SURVEYS:

    • These quizzes and surveys often promise to reveal something interesting or personal about the user, but in reality, they are designed to collect personal information.

  • SHOCKING AND SENSATIONAL HEADLINES OR PHOTOS:

    • These headlines or photos often use fear, anger, or curiosity to entice users to click, even if the content is not relevant or accurate.

  • PHISHING EMAILS:

    • These emails often appear to be from legitimate sources, such as banks or social media companies, but they contain malicious links or attachments that can infect the user's device with malware.

 
  • To protect from clickbait scams, it is important to be aware of the tactics that scammers use.

  • Be wary of headlines that are too good to be true, and avoid clicking on links from unknown sources.

  • If you are unsure about a link, you can hover your mouse over it to see the full URL.

  • If the URL looks suspicious, do not click on it.

  • When you click a button to join a group, it often triggers a "click" event tied to a link or action in the background. 

  • Technically, the button is typically programmed to send a request to the platform's server, signalling your intent to join the group.

  • This action might:

    • SEND A REQUEST:

      • The button triggers a request to that specific backend, processing your request to join the group.

    • REDIRECT OR UPDATE:

      • Depending on the implementation, it may either:

        • Redirect you to the group page (if a visible link is embedded).

        • Simply update your membership status without visibly navigating to another link.

    • HIDDEN LINK MECHANISM:

      • The action often involves a URL or endpoint that isn't directly visible but is executed programmatically through the button's functionality.

  • So, while it may not always look like you're "clicking a link," the underlying process often involves a link or endpoint being accessed.

 
Notice the photos above: the same image and message are reused, but the location where the child was supposedly found varies in each instance. At the bottom of the post, you'll find an example of a hidden link mechanism disguised as a "Join the Group" button. 

The origin of all the posts came from the following page:

 

MORE EXAMPLES:

 

You can also take steps to protect your devices from malware, such as installing antivirus software and keeping your operating system and software up to date.

Be sure to back up your important files regularly if your device is infected with malware.


If you think you may have been the victim of a clickbait scam, you can report it to the Federal Trade Commission (FTC). 

You can also contact your local law enforcement agency or Specialised Security Services (SSS).

 

HOW TO IDENTIFY A FAKE POST:

  • Is it reporting a missing child, finding a pet, or finding an elderly person?

  • Did it originate from the Events Page, Marketplace, or Unknown agency?

  • Is there missing contact information?

  • Are the comments turned off?

  • Does it have a hashtag (#) with the name of the child or place?

  • Does it urge you to make the post go viral and flood social media feeds to help locate the family?


If you answer YES to these questions, it is FAKE. 

Be careful, and do not share the post.

 

Clickbait scams urge people to share posts to increase their visibility and reach, benefiting the scammers in various ways:

  • MAXIMISING EXPOSURE:

    • The more people share the post, the wider its reach, drawing in more unsuspecting users.

  • GENERATING TRAFFIC:

    • Scammers aim to direct traffic to specific pages or websites, often containing ads or malicious content, to generate revenue or gather personal information.

  • BUILDING CREDIBILITY:

    • Posts that are widely shared may seem more trustworthy, making users less likely to question their authenticity.

  • HARVESTING DATA:

    • Scammers may use the shares to identify active accounts for future targeting, including phishing attempts.

  • PROMOTING GROUPS:

    • Many scams include links or buttons to join groups, which can later be repurposed for spam or fraudulent activities.


By creating emotionally compelling content, scammers exploit people's good intentions to serve their own malicious goals.

 

TO PROTECT YOURSELF FROM CLICKBAIT SCAMS AND DATA THEFT WHILE BROWSING ONLINE, CONSIDER THE FOLLOWING SAFETY MEASURES:

  • BE SCEPTICAL OF SENSATIONAL HEADLINES:

    • If a headline looks too surprising or shocking, be cautious.

    • Scammers often use sensationalist headlines to lure people into clicking. 

    • Be sceptical of anything that seems too good to be true.

  • VERIFY URLs:

    • Do your research before clicking on any links.

    • Before clicking on any link, hover your mouse over it to see the actual URL.

    • Ensure it matches the expected domain and does not have misspellings or unusual extensions.

  • USE RELIABLE SOURCES:

    • Get your news and information from trusted websites and platforms.

    •  Check multiple sources to confirm the legitimacy of sensational news.

  • UPDATE SOFTWARE REGULARLY:

    • Keep your browser, antivirus software, and operating system up to date to protect against vulnerabilities that scammers might exploit.

  • AVOID CLICKING ON UNFAMILIAR LINKS:

    • Refrain from clicking links or downloading attachments in emails or messages from unknown sources.

  • CHECK PRIVACY SETTINGS:

    • Review and adjust the privacy settings on your social media and browsing accounts to control who can access your information and limit your data exposure.

  • INSTALL SECURITY SOFTWARE:

    • Use reliable security software to help detect and block malicious websites and downloads.

  • EDUCATE YOURSELF AND OTHERS:

    • Stay informed about common scams and share this knowledge with friends and family to increase awareness.

  • ENABLE TWO-FACTOR AUTHENTICATION (2FA):

    • For added security on your accounts, use 2FA where available to protect against unauthorised access.

  • BE WARY OF PRESSURE TACTICS:

    • Scammers often create a sense of urgency. 

    • Take your time to verify the information before reacting.

  • THINK BEFORE YOU SHARE:

    • Be careful about what information you share online.

  • USE STRONG PASSWORDS:

    • Use strong passwords and avoid using the same password for multiple accounts.

  • PHISHING SCAMS:

    • Be aware of phishing scams, which often use clickbait tactics.

 

By being vigilant and using these strategies, you can better protect yourself from potential scams and significantly reduce your risk of falling victim to clickbait scams or data theft attempts.

 

Specialised Security Services invites the public to the Mike Bolhuis Daily Projects WhatsApp Channel.

This channel is important in delivering insights into the latest crime trends, awareness, warnings and the exposure of criminals.


  • How to Join the WhatsApp Channel:

    1. Make sure you have the latest version of WhatsApp on your device.

    2. Click on the link below to join the Mike Bolhuis Daily Projects WhatsApp Channel:

    - https://whatsapp.com/channel/0029VarjftF8PgsI4pODE929

    3. Follow the prompts to join the channel.

    4. Make sure you click on "Follow", then click on the "bell"-icon (🔔)

 
CONTACT MR MIKE BOLHUIS FOR SAFETY AND SECURITY MEASURES, PROTECTION, OR AN INVESTIGATION IF NEEDED.

ALL INFORMATION RECEIVED WILL BE TREATED IN THE STRICTEST CONFIDENTIALITY AND EVERY IDENTITY WILL BE PROTECTED.
 

Regards,

Mike Bolhuis

Specialist Investigators into

Serious Violent, Serious Economic Crimes & Serious Cybercrimes

PSIRA Reg. 1590364/421949

Mobile: +27 82 447 6116

Fax: 086 585 4924

Follow us on Facebook to view our projects -


EXTREMELY IMPORTANT: All potential clients need to be aware that owing to the nature of our work as specialist investigators there are people who have been caught on the wrong side of the law - who are trying to discredit me - Mike Bolhuis and my organisation Specialised Security Services - to get themselves off the hook. This retaliation happens on social media and creates doubt about our integrity and ability. Doubt created on social media platforms is both unwarranted and untrue. We strongly recommend that you make up your minds concerning me and our organisation only after considering all the factual information - to the exclusion of hearsay and assumptions. Furthermore, you are welcome to address your concerns directly with me should you still be unsatisfied with your conclusions. While the internet provides a lot of valuable information, it is also a platform that distributes a lot of false information. The distribution of false information, fake news, slander and hate speech constitutes a crime that can be prosecuted by law. Your own research discretion and discernment are imperative when choosing what and what not to believe.


STANDARD RULES APPLY: Upon appointment, we require a formal mandate with detailed instructions. Please take note that should you not make use of our services – you may not under any circumstance use my name or the name of my organisation as a means to achieve whatever end.


POPI ACT 4 of 2013 South Africa: Mike Bolhuis' "Specialised Security Services" falls under Section 6 of the act. Read more here: https://mikebh.link/fntdpv

 
SSS TASK TEAM:
 
 

Copyright © 2015- PRESENT | Mike Bolhuis Specialised Security Services | All rights reserved.


Our mailing address is:

Mike Bolhuis Specialised Security Services

PO Box 15075 Lynn East

Pretoria, Gauteng 0039

South Africa

Add us to your address book


THIS PUBLIC DOCUMENT WAS INTENDED TO BE SHARED, PLEASE DO SO.

7,156 views0 comments

Recent Posts

See All

Kommentare


bottom of page