{"id":55,"date":"2023-05-16T20:44:14","date_gmt":"2023-05-16T20:44:14","guid":{"rendered":"https:\/\/madlabs.dsu.edu\/digforce\/blog\/?p=55"},"modified":"2024-10-15T15:04:54","modified_gmt":"2024-10-15T15:04:54","slug":"cloned-vs-hacked","status":"publish","type":"post","link":"https:\/\/blogs.dsu.edu\/digforce\/2023\/05\/16\/cloned-vs-hacked\/","title":{"rendered":"Cloned vs. Hacked"},"content":{"rendered":"\n<p>While many refer to account cloning as being hacked, it is actually not the same term. When an account is hacked, it becomes compromised and the user may lose the ability to log in to their profile, might find activity on their account they did not create, or notice changes on their account they did not make. Having any account hacked can be stressful, as it exposes potentially private information, so it\u2019s important to report it if there is any indication an account was compromised. The chances of getting that account back may vary depending on the website or platform, but by reporting the hack, it would likely prevent the hacker from seeing any more of the user\u2019s personal information and kick them out of their account before they do any more damage.<\/p>\n\n\n\n<p>Meanwhile, cloning is when people copy the information on an already-existing account and use it to create a new, identical one. Unless it is posted on the account publicly, they usually do not have access to any important, personal information on their victims &#8211; they are only able to copy what is publicly available to everyone on the site (photos, public posts, groups, etc.). For example, if a user has their friends list set as \u2018private\u2019 instead of \u2018public\u2019, then the impersonator cannot see who they are friends with. If someone is impersonating a real account, users are able (and encouraged) to report the cloned account for impersonation so it can be investigated and taken down before it affects anyone else.<\/p>\n\n\n\n<p>People may impersonate a user\u2019s account for many reasons, but they usually do not have good intentions. While it\u2019s not hacking, account cloning can be used as a way of targeting someone\u2019s friends and family members via social engineering \u2013 which is (usually) a malicious technique someone uses to manipulate people into giving out their personal information. By making it seem like the account is from the real user, they may be able to manipulate others into giving them money or information by sending infected links, files, or messages. Depending on what the fake user sends, they could infect victims\u2019 devices with malware, steal their personal information, or make their victims send money to them; However, the user could also simply use the account to destroy victims\u2019 reputation.<\/p>\n\n\n\n<p>To prevent account cloning, users should update their privacy settings to prevent strangers from seeing their posts, friends list, profile, and more. How to do this varies site-to-site, but these settings can usually be found in the Privacy and or Security settings of the app, website, or platform in use. Changing any settings related to personal information or activity from \u2018public\u2019 or \u2018everyone\u2019 to \u2018just friends\u2019 or \u2018just me\u2019 will keep data from being publicly broadcasted. By restricting privacy settings to \u2018just friends\u2019 or \u2018just me\u2019, will help keep the account secure by limiting who can see a user\u2019s profile, who can view or comment on their posts or stories, and prevent the account from broadcasting all their information to strangers. This will help to prevent the account from being cloned and also reduce chances of being hacked, as other users cannot see anything about the profile. Keeping privacy settings secure even helps protect the user\u2019s friends from being hacked or cloned as well &#8211; by limiting who can see their friends list, hackers cannot connect with those users to send them malicious links, files, or use those friends account to look at tagged posts. This essentially blocks strangers from seeing the majority of a user\u2019s profile, so if someone tries to clone the account, they won\u2019t be able to add much information, which makes it easier to tell who has the real profile.<\/p>\n\n\n\n<p>If a user\u2019s profile is targeted and cloned, the first thing they should do is to report the fake profile to the platform\u2019s admins &#8211; this will get the process moving to get the fake account taken down. Next, users should inform any connected friends and family an account is impersonating them and to not accept any friend requests or messages from it. Finally, users should check their privacy settings to see what is marked as public and private \u2013 by following the earlier steps and preventing any personal information from being shown as public (friends list, where they live, work, or go to school, who can see their posts or stories, etc.) they can secure their account from strangers wanting to clone their profile.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While many refer to account cloning as being hacked, it is actually not the same term. When an account is hacked, it becomes compromised and&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/blogs.dsu.edu\/digforce\/2023\/05\/16\/cloned-vs-hacked\/\">Continue reading<span class=\"screen-reader-text\">Cloned vs. Hacked<\/span><\/a><\/div>\n","protected":false},"author":21,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[21,20,23,22],"ppma_author":[53],"class_list":["post-55","post","type-post","status-publish","format-standard","hentry","category-digital-forensics","tag-cloned","tag-consumer-education","tag-impersonation","tag-social-media","entry"],"authors":[{"term_id":53,"user_id":21,"is_guest":0,"slug":"hayleycrawford","display_name":"Hayley Crawford","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/5ca34fd6287aabe7cca65c40287cb988?s=96&d=mm&r=g","author_category":"","first_name":"Hayley","last_name":"Crawford","user_url":"","job_title":"","description":""}],"_links":{"self":[{"href":"https:\/\/blogs.dsu.edu\/digforce\/wp-json\/wp\/v2\/posts\/55"}],"collection":[{"href":"https:\/\/blogs.dsu.edu\/digforce\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.dsu.edu\/digforce\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.dsu.edu\/digforce\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.dsu.edu\/digforce\/wp-json\/wp\/v2\/comments?post=55"}],"version-history":[{"count":1,"href":"https:\/\/blogs.dsu.edu\/digforce\/wp-json\/wp\/v2\/posts\/55\/revisions"}],"predecessor-version":[{"id":56,"href":"https:\/\/blogs.dsu.edu\/digforce\/wp-json\/wp\/v2\/posts\/55\/revisions\/56"}],"wp:attachment":[{"href":"https:\/\/blogs.dsu.edu\/digforce\/wp-json\/wp\/v2\/media?parent=55"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.dsu.edu\/digforce\/wp-json\/wp\/v2\/categories?post=55"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.dsu.edu\/digforce\/wp-json\/wp\/v2\/tags?post=55"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.dsu.edu\/digforce\/wp-json\/wp\/v2\/ppma_author?post=55"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}