top of page
griffin jd.jpg

PROJECT: PROFILE HACKING VS PROFILE CLONING

YOU MAY SHARE THIS PUBLIC DOCUMENT
 

How to differentiate between the two and what you can do to combat the problem.

 

In a recent interview with Martin Bester on Jacaranda FM,


Mr Bolhuis spoke about the increase in cybercrime, especially the latest trend of social media account cloning:


LISTEN TO THIS INSIGHTFUL INTERVIEW:

 

THE DIFFERENCE BETWEEN HACKING AND CLONING:


HACKING EXPLAINED:

  • When a person’s account is hacked, it means that the specific account that the person uses on a day-to-day basis is taken over by another person.

  • The person is then locked out of his/her account, and it can no longer be used by the original user.

  • The person who hacked the account then assumes full control of the account and changes the login details to prevent the original user from recovering the account.

  • Brute force hacking on a social media account is complicated to accomplish; thus, the hackers make use of another method called manipulation to gain access to a person’s social media account.

  • Manipulation is achieved by baiting the user to click on a link or by simply asking the user to complete a task.

  • This is usually done by private message.

  • Listed below are two examples:

  • “Good day, is this you in this video? Click on the link to see...”

  • “Good day, my Facebook is blocked. I must enter a code that is being sent to one of my friends, and I chose you because I trust you. Can you help?”

  • Through manipulation, the fraudster entices you to act, leading to further actions.

  • Eventually, your account is taken over, the login details are changed, and you cannot access your account anymore.



CLONING EXPLAINED:

  • Cloning a social media account is when a fraudster saves the details and photos from a legitimate account, then creates a new account and gives it the exact same name as the legitimate account.

  • The photos and information are saved on the cloned account just as they are saved on the legitimate account.

  • This makes it hard for the average person to differentiate between the legitimate account and the cloned account.

  • Fraudsters target celebrities, well-known individuals and even businesses.

  • The fraudster offers a product for sale or advertises a service or investment opportunity.

  • An unsuspecting individual believes that the offer is presented by the actual celebrity or business and because of the reputation and popularity of the person or business, the individual is more likely to purchase or invest without doing a thorough investigation.


 

It is important to note that nobody is safe or immune from having their account cloned, even the profile of Mr Mike Bolhuis has been cloned on several occasions by fraudsters.


 

Unfortunately, social media networks do not offer proper verification methods to avoid the cloning of accounts, but you do have options available to combat the problem: 


  • Educate yourself about the differences between hacking and cloning - knowledge is power, and we have many projects available with educational content about the subject.

  • Never allow yourself to be driven by greed or curiosity.

  • If you do not know about or foresee a possible trap, you will play directly into the hands of the fraudsters.

  • Always investigate before you initiate, most people who are caught, initiated before they investigated.

  • Contact Cybersecurity professionals like the SSS specialists in this field, to assist you in safeguarding your online accounts.

  • There are measures that you can take to increase your online safety.

  • Our Cybercrime team can assist you with that.

  • Raising awareness about cybercrime prevents crime.

  • Read our projects, share them with your friends and with your community.

  • If you notice that your account is cloned, or you notice that a friend’s account is cloned, warn them, ask all your friends to report the cloned account.

  • Never be reckless with your phone or with your online presence. You would not leave your house with the doors unlocked, have the same mindset with your phone and your online accounts.

 
Specialised Security Services invites the public to the Mike Bolhuis Daily Projects WhatsApp Group. This group is important in delivering insights into the latest crime trends, awareness, warnings and the exposure of criminals.

HOW TO JOIN THE MIKE BOLHUIS DAILY PROJECTS WHATSAPP GROUP:

• Follow the link to our WhatsApp group:

• "JOIN" to ensure you never miss our daily updates.

• You will receive automatic notifications as soon as a new project is posted.

 
CONTACT MR MIKE BOLHUIS FOR SAFETY AND SECURITY MEASURES, PROTECTION, OR AN INVESTIGATION IF NEEDED.

ALL INFORMATION RECEIVED WILL BE TREATED IN THE STRICTEST CONFIDENTIALITY AND EVERY IDENTITY WILL BE PROTECTED.
 

Regards,

Mike Bolhuis

Specialist Investigators into

Serious Violent, Serious Economic Crimes & Serious Cybercrimes

PSIRA Reg. 1590364/421949

Mobile: +27 82 447 6116

Fax: 086 585 4924

Follow us on Facebook to view our projects -


EXTREMELY IMPORTANT: All potential clients need to be aware that owing to the nature of our work as specialist investigators there are people who have been caught on the wrong side of the law - who are trying to discredit me - Mike Bolhuis and my organisation Specialised Security Services - to get themselves off the hook. This retaliation happens on social media and creates doubt about our integrity and ability. Doubt created on social media platforms is both unwarranted and untrue. We strongly recommend that you make up your minds concerning me and our organisation only after considering all the factual information - to the exclusion of hearsay and assumptions. Furthermore, you are welcome to address your concerns directly with me should you still be unsatisfied with your conclusions. While the internet provides a lot of valuable information, it is also a platform that distributes a lot of false information. The distribution of false information, fake news, slander and hate speech constitutes a crime that can be prosecuted by law. Your own research discretion and discernment are imperative when choosing what and what not to believe.


STANDARD RULES APPLY: Upon appointment, we require a formal mandate with detailed instructions. Please take note that should you not make use of our services – you may not under any circumstance use my name or the name of my organisation as a means to achieve whatever end.


POPI ACT 4 of 2013 South Africa: Mike Bolhuis' "Specialised Security Services" falls under Section 6 of the act. Read more here:

 
SSS TASK TEAM:
 
 

Copyright © 2023 Mike Bolhuis Specialised Security Services, All rights reserved.


Our mailing address is:

Mike Bolhuis Specialised Security Services

PO Box 15075 Lynn East

Pretoria, Gauteng 0039

South Africa

Add us to your address book


THIS PUBLIC DOCUMENT WAS INTENDED TO BE SHARED, PLEASE DO SO.

0 views0 comments

Recent Posts

See All

留言


bottom of page