Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Tips and Advice»How cybercriminals are targeting content creators
Tips and Advice

How cybercriminals are targeting content creators

Team-CWDBy Team-CWDNovember 26, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is key to stopping the fraudsters.

It’s not an easy time to be an influencer. Brands are spending less, ad revenue is declining and competition is fierce – including from AI-generated influencers and impersonators. According to one study, around half of the industry makes just $15,000 or less per year, while just one in 10 pull in over $100,000. As if that wasn’t enough, there’s another challenge: influencers are an increasingly popular target for cybercriminals. A recent spear-phishing campaign abusing brands such as Tesla and Red Bull highlights the potential risks.

Account compromise could have a devastating impact, not only on the victim but also their followers and potential brand clients. If you’re a social media content creator, it may be time to revisit those account security best practices.

Why do influencers matter to hackers?

Threat actors are usually looking for several things in a potential online victim. If they’re on the hunt for influencer social media accounts to hijack, they’ll want ones with as many followers as possible. This means their scams or malware will be distributed far and wide. They ideally also want to target influencers who have built long-term trust with their audience, through months or years of providing advice online. Trust could also be earned through verified status badges. Either way, it means followers are more likely to click on the links in these accounts without thinking.

It goes without saying that hackers also need those accounts to be easy to compromise. Anything protected with a single weak password is a gift to an opportunistic cybercriminal.

figure-1-youtube-hacked
This phishing email delivers malware that deletes the victim’s browser cookies, forcing them to re-enter their login credentials, which are then sent to the attacker. (source: The PC Security Channel)

How do they get hacked?

When it comes to the targeting of influencers, attacks begin with the social media account itself – whether it’s X (formerly Twitter), YouTube, TikTok, Instagram or another platform. On rare occasions, the end goal is state-sponsored disinformation. But more often than not we’re talking about financially motivated cybercrime. There are several ways to gain access to accounts, notably:

  • Spearphishing: Highly targeted phishing attacks designed to trick the individual into handing over their logins. These may use publicly available information on the target to make them seem more realistic. A phishing email or text could also be booby trapped with a malicious link or attachment, which quietly installs infostealing malware on the victim’s device. It’s another way to get hold of sensitive info like passwords.
  • Credential stuffing/brute forcing: Brute-force attacks are a form of trial and error where automated software tries either popular passwords (password spraying) or previously breached passwords (credential stuffing) against large numbers of accounts/websites. When one username/password combo works, they’re in.
  • SIM swapping: Hackers socially engineer a telco worker into transferring the victim’s phone number to a SIM under their control. That enables them to intercept two-factor authentication (2FA) codes often used to authenticate and access social media accounts.

It should be noted that AI is helping cybecriminals achieve their goals by crafting more convincing phishing emails in flawless local languages. It also supports campaigns by gathering background information on targets which can be used for these and SIM swapping attacks. And AI can make brute-force attacks faster and more effective.

What happens next?

With access to a high-value influencer account, a cybercriminal might want to sell it immediately online to the highest bidder. Or they could use it themselves. Either way, it’s most likely to be used to advertise crypto investment scams and other get-rich-quick schemes designed to trick followers out of their hard-earned cash. Or to post malicious links which could install malware on followers’ machines.

A threat actor may also try to extort their victim into paying them money to regain access; for example by threatening to post vulgar or inflammatory content. They may be able to access follower contact databases, which could be sold and/or used to target followers directly with spam and phishing attacks. A hijacked account might theoretically also be abused to post false claims about brands connected with that influencer.

If threat actors also manage to compromise an influencer’s e-commerce account (using the same techniques listed above), they may be able to divert incoming funds from followers.

The bottom line is identity theft-related security risks for followers, trashed reputation for brands and influencers, and potentially direct losses for content creators.

Under lock and key

Faced with what could be an existential risk, influencers need a plan of action. That should be based around solid best practices for account security. Consider:

  • Long, strong and unique passwords that are harder for password spraying tools to crack.
  • App-based 2FA (e.g., apps such as Google Authenticator or Microsoft Authenticator) rather than text-based 2FA codes that can be intercepted. These will ensure that, even if hackers get hold of a password, they won’t be able to access the account.
  • Greater phishing awareness; especially some of the lures that hackers typically use to entice influencers, like lucrative seeming sponsorship deals with big-name brands. If something looks too good to be true, it usually is.
  • Separate devices and email accounts for work and personal use, with the business ones fitted with higher-grade security controls.
  • Security software from a reputable provider on all devices and machines. This should prevent malicious downloads and block phishing emails.
  • Always keeping device and PC software/operating system on the latest version, which will mean the most secure version.
  • Never downloading apps from unofficial app stores, as they may be harboring info-stealing malware.

An influencer’s reputation ultimately defines their commercial success. It must be protected at all costs.  



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAI and Deepfake-Powered Fraud Skyrockets Amid Global Stagnation
Next Article Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More
Team-CWD
  • Website

Related Posts

Tips and Advice

Here’s what you should know

February 6, 2026
Tips and Advice

Chronology of a Skype attack

February 5, 2026
Tips and Advice

Beware of Winter Olympics scams and other cyberthreats

February 2, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

Look out for phony verification pages spreading malware

September 14, 2025

What is it, and how do I get it off my device?

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.