Social spam explained

Social spam is unwanted spam content appearing on social networking services, social bookmarking sites,[1] and any website with user-generated content (comments, chat, etc.). It can be manifested in many ways, including bulk messages,[2] profanity, insults, hate speech, malicious links, fraudulent reviews, fake friends, and personally identifiable information.

History

As email spam filters became more effective, catching over 95% of these messages, spammers have moved to a new target – the social web.[3] Over 90% of social network users have experienced social spam in some form.[4] Those doing the “spamming” can be automated spambots/social bots, fake accounts, or real people.[5] Social spammers often capitalize on breaking news stories to plant malicious links or dominate the comment sections of websites with disruptive or offensive content.[6]

Social spam is on the rise, with analysts reporting over a tripling of social spam activity in six months.[7] It is estimated that up to 40% of all social user accounts are fake, depending on the site.[8] In August, 2012, Facebook admitted through its updated regulatory filing[9] that 8.7% of its 955 million active accounts were fake.[10]

Types

Spam

Commercial spam is a comment that has commercial content irrelevant to the discussion at hand. Many of the old email spam content resurfaced on social networks, from Viagra ads, to work-from-home scams, to counterfeit merchandise. Recent analysis showed social spammers content preferences changing slightly, with apparel and sports accounting for 36% of all posts. Others included: porn and pills (16%), SEO/web development (23%), and mortgage loans (12%).[11]

Social networking spam

Social networking spam is spam directed specifically at users of internet social networking services such as Google+, Facebook, Pinterest, LinkedIn, or MySpace. Experts estimate that as many as 40% of social network accounts are used for spam. These spammers can utilize the social network's search tools to target certain demographic segments, or use common fan pages or groups to send notes from fraudulent accounts. Such notes may include embedded links to pornographic or other product sites designed to sell something. In response to this, many social networks have included a "report spam/abuse" button or address to contact.[12] Spammers, however, frequently change their address from one throw-away account to another, and are thus hard to track.[13]

Facebook pages with pictures and text asking readers to e.g. "show your support" or "vote" are used to gather likes, comments and shares which improve the pages' ranking. The page is then slightly changed and sold for profit.[14] [15]

Bulk

Bulk submissions are a set of comments repeated multiple times with the same or very similar text. These messages, also called as spam-bombs,[16] can come in the form of one spammer sending out duplicate messages to a group of people in a short period of time, or many active spam accounts simultaneously posting duplicate messages. Bulk messages can cause certain topics or hashtags to trend highly. For example, in 2009, a large number of spam accounts began simultaneously posting links to a website, causing ‘ajobwithgoogle’ to trend.

Profanity

User-submitted comments that contain swear words or slurs are classified as profanity. Common techniques to circumvent censorship include “cloaking”, which works by using symbols and numbers in place of letters or inserting punctuation inside the word (for example, "w.o.r.d.s" instead of "words"). The words are still recognizable by the human eye, though are often missed by website monitors due to the misspelling.

Insults

User-submitted insults are comments that contain mildly or strongly insulting language against a specific person or persons. These comments range from mild name-calling to severe bullying. Online bullies often use insults in their interactions, referred to as cyberbullying. Hiding behind a screen name allows users to say mean, insulting comments with anonymity; these bullies rarely have to take responsibility for their comments and actions.[17]

Threats

User-submitted threats of violence are comments that contain mild or strong threats of physical violence against a person or group. In September 2012, Eric Yee was arrested for making threats in an ESPN comment section.[18] He started out discussing the high price of LeBron James shoes, but quickly turned into a stream of racist and insulting comments, and threats against children.[19] This is a more serious example of social spam.

Hate speech

User-submitted hate speech is a comment that contains strongly offensive content directed against people of a specific race, gender, sexual orientation, etc. According to a Council of Europe survey,[20] across the European Union, 78% of respondents had encountered hate speech online; 40% felt personally attacked or threatened; and 1 in 20 have posted hate speech themselves.

Malicious links

User-submitted comments can include malicious links that will inappropriately harm, mislead, or otherwise damage a user or computer. These links are most commonly found on video entertainment sites, such as YouTube.[21] When a user clicks on a malicious link, the result can include downloading malware to the user's device, directing the user to sites designed to steal personal information, drawing unaware users into participating in concealed advertising campaigns, and other harmful consequences.[22] Malware can be very dangerous to the user, and can manifest in several forms: viruses, worms, spyware, Trojan horses, or adware.[23]

Fraudulent reviews

Fraudulent reviews are reviews of a product or service from users that never actually used it, and therefore insincere or misleading. These are often solicited by the proprietor of the product or service, who contracts positive reviews, known as “reviews-for-hire”.[24] Some companies are attempting to tackle this problem by warning users that not all reviews are genuine.[25]

Fake friends

Fake friends occurs when several fake accounts connect or become “friends”. These users or spambots often try to gain credibility by following verified accounts, such as those for popular celebrities and public figures. If that account owner follows the spammer back, it legitimizes the spam account, enabling it to do more damage.[26]

Personally identifiable information

User-submitted comments that inappropriately display full names, physical addresses, email addresses, phone numbers, or credit card numbers are considered leaks of personally identifiable information (PII).[27]

Notes and References

  1. Social spam detection . 5th International Workshop on Adversarial Information Retrieval on the Web (AIRWeb '09). Benjamin Markines. Ciro Cattuto. Filippo Menczer. Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web - AIRWeb '09 . 2009. 41–48. 10.1145/1531914.1531924. 9781605584386 .
  2. Rao. Sanjeev. Verma. Anil Kumar. Bhatia. Tarunpreet. 2021-12-30. A review on social spam detection: Challenges, open issues, and future directions. . en. 186. 115742. 10.1016/j.eswa.2021.115742.
  3. Web site: Tynan . Dan . Social spam is taking over the Internet . ITworld . 2012-04-03 . 2016-08-05.
  4. Web site: Archived copy . 5 November 2012 . 15 October 2011 . https://web.archive.org/web/20111015164357/http://www.barracudalabs.com/SNS/ . dead .
  5. Web site: What is Social Spam? (And How to Avoid Creating It) . Constant Contact . 2012-03-20 . 2016-08-05.
  6. Web site: Impermium – Google Impermium. 1 October 2016. https://web.archive.org/web/20121015023418/http://www.impermium.com/blog/2011/08/31/debut-impermium-index-reveals-surprising-trends-in-social-web-spam-attacks/. 15 October 2012. dead.
  7. Web site: Franceschi-Bicchierai . Lorenzo . Social Media Spam Increased 355% in First Half of 2013 . Mashable . 2013-10-01 . 2016-08-05.
  8. Web site: Olga Kharif . 'Likejacking': Spammers Hit Social Media . https://web.archive.org/web/20120525203801/http://www.businessweek.com/articles/2012-05-24/likejacking-spammers-hit-social-media . dead . May 25, 2012 . Businessweek . 2012-05-25 . 2016-08-05.
  9. Web site: Form 10-Q . Sec.gov . 2016-08-05.
  10. Web site: Kelly . Heather . 83 million Facebook accounts are fakes and dupes . CNN . 2012-08-03 . 2016-08-05.
  11. Web site: Impermium – Google Impermium. 1 October 2016. https://web.archive.org/web/20120915020255/http://www.impermium.com/blog/2011/10/31/halloween-edition-of-impermium-index-reveals-social-web-spam-goblins-galore/. 15 September 2012. dead.
  12. Web site: How do I report spam on Facebook? | Facebook Help Center . Facebook . 2016-08-05.
  13. Web site: Why is it so difficult to catch a spammer? . Spam Reader . 2016-08-05.
  14. Web site: Yahoo News: Why 'Liking' Facebook virals makes scammers rich . Yahoo . 2012-10-24 . 2016-08-05.
  15. Web site: Coles . Sarah . How 'Liking' a page on Facebook makes cash for spammers . AOL . 2016-07-15 . 2016-08-05 . https://web.archive.org/web/20160529005520/http://money.aol.co.uk/2012/10/25/liking-a-page-on-facebook-makes-cash-for-spammers/ . 2016-05-29 . dead .
  16. Web site: Martin Bryant . New Twitter spam-bomb offers A Job With Google . The Next Web . 2009-09-01 . 2016-08-05.
  17. Web site: Complaint Box - Online Insults. Alison. Hendrie. 5 February 2010. 1 October 2016.
  18. Web site: Kelly Dwyer . ESPN aids authorities in arresting a man accused of making threats against children in a post about LeBron James | Ball Don't Lie - Yahoo Sports . Sports.yahoo.com . 2012-09-19 . 2016-08-05.
  19. Web site: Wilson . Simone . Eric Yee, Yale Dropout, Allegedly Threatened to Shoot Valencia Schoolkids, Aurora Style, in ESPN Chatroom . Blogs.laweekly.com . 2012-09-18 . 2016-08-05.
  20. http://act4hre.coe.int/eng/Studies-and-Research/Survey kernel (1) / Error - Young People against hate speech online
  21. Web site: Video sites pose highest risk of malicious links in 2011 . Kaspersky . 2012-03-01 . 2016-08-05.
  22. Web site: Socializing with malware on Facebook and Twitter... . BullGuard . 2015-08-27 . 2016-08-05.
  23. Web site: Malware – Good to Know – Google . www.google.com . 17 January 2022 . https://web.archive.org/web/20111019154620/http://www.google.com/goodtoknow/online-safety/malware/ . 19 October 2011 . dead.
  24. Web site: Hsu . Tiffany . Yelp's new weapon against fake reviews: User alerts . Los Angeles Times . 2012-10-18 . 2016-08-05.
  25. Web site: Fiegerman . Seth . Yelp Cracks Down on Fake Reviews With New Consumer Alerts . Mashable . 2012-10-18 . 2016-08-05.
  26. Book: Ghosh . Saptarshi . Viswanath . Bimal . Kooti . Farshad . Sharma . Naveen Kumar . Korlam . Gautam . Benevenuto . Fabricio . Ganguly . Niloy . Gummadi . Krishna Phani . Understanding and combating link farming in the twitter social network . 2012-04-16 . Proceedings of the 21st international conference on World Wide Web . https://doi.org/10.1145/2187836.2187846 . WWW '12 . New York, NY, USA . Association for Computing Machinery . 61–70 . 10.1145/2187836.2187846 . 978-1-4503-1229-5.
  27. Web site: Get a high paying social media job today . 10 November 2022 .