<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.lifutechnologies.co.za/blogs/tag/fakebook/feed" rel="self" type="application/rss+xml"/><title>Lifu Technologies - Blog #Fakebook</title><description>Lifu Technologies - Blog #Fakebook</description><link>https://www.lifutechnologies.co.za/blogs/tag/fakebook</link><lastBuildDate>Thu, 16 Apr 2026 13:32:02 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Fakebook: How Attackers Use Social Media Impersonation to Scam Bank Customers]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Fakebook</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Images/Fakebook logo.png"/>While social media impersonation is old news to security teams, BlueVoyant cyber threat analysts have identified an advanced campaign targeting banking customers using a new method: spoofed customer service accounts.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_zOKdOazhRb-o48tsJq2Dog" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Iy5ECe7zRKe9cWzpeAecXQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_aJASnZlFT7adBXjwe-ErlQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_mEy76RKiR42J978hj4_hzg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_mEy76RKiR42J978hj4_hzg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Deep dive into the characteristics, scope, and tactics the attackers used to deploy this sophisticated campaign. </span></h2></div>
<div data-element-id="elm_oS1NiYV6Y4Qqg2OUY2Ec6A" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_oS1NiYV6Y4Qqg2OUY2Ec6A"] .zpimage-container figure img { width: 789px !important ; height: 260px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_oS1NiYV6Y4Qqg2OUY2Ec6A"] .zpimage-container figure img { width:789px ; height:260px ; } } @media (max-width: 767px) { [data-element-id="elm_oS1NiYV6Y4Qqg2OUY2Ec6A"] .zpimage-container figure img { width:789px ; height:260px ; } } [data-element-id="elm_oS1NiYV6Y4Qqg2OUY2Ec6A"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Fakebook%20-%20Tactics.png" width="789" height="260" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_VwC35bb3RNiwX2UytXDCRw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_VwC35bb3RNiwX2UytXDCRw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p><strong>Download now to learn:</strong></p><p>How threat actors are able to set up spoofed accounts and target customers</p><p>The methods they use to gain access to sensitive data, like bank account numbers, and dupe users into providing their payment card information or a direct deposit</p><p>Best practices for remediation and recommendations for preventing this type of scam</p></div><p></p></div>
</div><div data-element-id="elm_4-466IAxQhO9pJWiYbgtuA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_4-466IAxQhO9pJWiYbgtuA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/files/HowAttackersUseSocialMediaImpersonationReport.pdf" download><span class="zpbutton-content">Download</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 08 May 2023 22:32:39 +0200</pubDate></item></channel></rss>