Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Seacom takes aim at regional peering costs - Prenesh Padayachee

      Seacom takes aim at regional peering costs

      21 April 2026
      Liquid dodges debt crunch - at a hefty price - Hardy Pemhiwa

      Liquid dodges debt crunch – at a hefty price

      21 April 2026
      WhatsApp to go premium with new Plus subscription

      WhatsApp to go premium with new Plus subscription

      21 April 2026
      The AI model spooking the world's biggest banks - Mythos

      The AI model spooking the world’s biggest banks

      21 April 2026
      John Ternus and the battle for Apple's soul

      John Ternus and the battle for Apple’s soul

      21 April 2026
    • World
      Adobe bets on AI agents to fend off cheaper rivals

      Adobe bets on AI agents to fend off cheaper rivals

      16 April 2026
      Google poised to lose ad crown to Meta

      Google poised to lose ad crown to Meta

      14 April 2026
      Grand Theft Data - hackers hit Rockstar Games - Grand Theft Auto

      Grand Theft Data – hackers hit Rockstar Games

      14 April 2026
      UK PM Keir Starmer declares war on doomscrolling

      UK PM Keir Starmer declares war on doomscrolling

      13 April 2026
      Big Tech is going nuclear

      Big Tech is going nuclear

      10 April 2026
    • In-depth
      Africa switches on as Europe dims the lights

      Africa switches on as Europe dims the lights

      9 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
      The R18-billion tech giant hiding in plain sight - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
    • TCS

      TCS+ | ‘The ISP for ISPs’: Vox’s shift to wholesale aggregator

      20 April 2026
      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      15 April 2026
      TCS | Donovan Marsh on AI and the future of filmmaking

      TCS | Donovan Marsh on AI and the future of filmmaking

      7 April 2026
      TCS+ | Vodacom Business moves to crack the SME tech gap - Andrew Fulton, Sannesh Beharie

      TCS+ | Vodacom Business moves to crack the SME tech gap

      7 April 2026
      TCS | MTN's Divysh Joshi on the strategy behind Pi - Divyesh Joshi

      TCS | MTN’s Divyesh Joshi on the strategy behind Pi

      1 April 2026
    • Opinion
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      R230-million in the bag for Endeavor's third Harvest Fund - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » The dark side of social media – exploring the evolving threat landscape

    The dark side of social media – exploring the evolving threat landscape

    Promoted | Last year was a record one for cybersecurity. Looking back at the final quarter, the numbers speak for themselves.
    By AvertIT Distribution24 February 2025
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    The dark side of social media - Avast Business Avert IT DistributionLast year was a record-breaking one for cybersecurity, and as we look back on the final quarter, the numbers speak for themselves.

    In the fourth quarter alone, cybersecurity teams successfully blocked 2.55 billion threats – equivalent to 321 attacks every second and a 9% increase compared to the previous year. Social engineering attacks, particularly scams, dominated the landscape, accounting for 86% of all threats. This sharp rise underscores the evolving tactics of cybercriminals who continue to adapt and refine their methods.

    The evolving cybersecurity threat landscape

    Reflecting on past predictions, the threat landscape has continued to shift dramatically. In 2021, experts noted the move from device-centric malware attacks to more human-centric threats. As we enter 2025, scam-related threats have become more technically sophisticated and psychologically manipulative. Malware still poses a significant risk, but today’s scams – manipulating individuals through social engineering – are proving far more dangerous.

    Looking ahead, the rise of artificial intelligence and large language models such as OpenAI’s Operator presents a new frontier for cybercriminals. With these tools automating tasks like paying invoices and placing online orders, attackers have begun targeting them as potential entry points. If exploited, this could redefine the cybersecurity landscape once again.

    The dark side of social media

    Our featured story for the fourth quarter, The Dark Side of Social Media, sheds light on how cybercriminals have increasingly turned social platforms into a playground for scams. Social media threats have evolved from traditional malware attacks to sophisticated frauds such as malvertising, fake e-shops and phishing scams. Facebook emerged as the leading source of these attacks, followed closely by YouTube.

    Social engineering campaigns like ClickFix and FakeCaptcha have become increasingly complex, preying on users’ emotions and trust. These scams, referred to as “scam-yourself attacks”, have led to significant harm, with more than 4.2 million users protected from FakeCaptcha scams alone in Q4 – a 130% increase compared to the previous quarter. To help mitigate this threat, we introduced a Clipboard Protection feature that blocks clipboard-based attacks before execution. Attackers linked to these scams deployed the NetSupport remote access trojan (RAT), with iterative improvements to its script, reportedly utilising AI tools like ChatGPT to enhance its capabilities.

    Ransomware and APTs

    Ransomware attacks continued their upward trajectory, increasing by 50% in Q4 2024 following a staggering 100% rise in Q3. Magniber, the most prevalent ransomware strain, was responsible for 62% of all detected cases. Countries like Mexico (+230%) and Japan (+180%), and parts of Europe, including Austria and France, saw dramatic increases in attacks.

    Alongside ransomware, advanced persistent threats (APTs) remained a critical concern. Groups like Lazarus, a North Korean APT actor, continued to target high-value individuals and organisations with zero-day exploits and social engineering techniques. In Q4, Lazarus used compromised archive files masquerading as IT skill assessments to target victims via LinkedIn messages, highlighting the persistent and evolving nature of these threats.

    …article continues below…

    Financial and mobile banking threats

    Financial threats remained persistent in Q4, with mobile banking trojans like DroidBot and ToxicPanda using increasingly sophisticated methods like NFC relay attacks to target EU users. BankBot banker also saw a 236% increase in protected users, emphasising the growing risks to mobile banking security.

    In India, cybercriminals used WhatsApp to distribute trojans disguised as utility payment apps, leading to the theft of thousands of victim credentials. Meanwhile, spyware threats surged globally, with SpyLoans campaigns continuing to prey on victims through malicious loan apps, despite law enforcement crackdowns.

    The evolution of crypto scams: CryptoCore and deepfakes

    Crypto scams took a disturbing turn in Q4 with the rise of the CryptoCore group, which leveraged deepfake technology to dupe victims. By tying fake investment schemes to high-profile events, such as the US presidential election and statements by Elon Musk, CryptoCore was able to manipulate individuals into transferring funds. These attacks, which used deepfake videos featuring public figures like Donald Trump, ultimately stole more than US$7-million in Q4 2024, marking their largest campaign to date.

    The use of deepfakes in crypto scams illustrates how cybercriminals are exploiting emerging technologies to gain trust and perpetrate fraud. These scams highlight the growing sophistication of digital fraud and the evolving methods attackers are using to deceive their victims.

    The widespread impact of scams

    Beyond large-scale attacks, scams remained a pervasive threat throughout Q4. Fake e-shops were particularly active during major shopping events, such as Black Friday and Christmas, using poisoned search results, social media ads and phishing e-mails to lure shoppers into making fraudulent purchases. These scams led to not only financial losses but also compromised personal data, resulting in identity theft and long-term credit damage.

    In addition, dating scams gained momentum, especially in Nordic countries, preying on individuals’ emotions. Meanwhile, technical support scams surged in regions like Switzerland and Japan, with attackers adjusting their tactics to align with local contexts. Malvertising, which accounted for 41% of all blocked attacks, remained a major vector for scams and malware.

    Avast and AVG’s role in protecting against evolving threats

    As cyberthreats continue to grow in complexity, Avast and AVG stand at the forefront of providing reliable, cutting-edge protection for businesses and individuals. With AI-powered threat detection, real-time security monitoring and robust defences against ransomware, scams and APTs, both Avast and AVG ensure that your digital environment remains secure.

    For IT service providers and managed service providers (MSPs), Avast and AVG offer tailored solutions through the Avast Business Hub, an all-in-one platform that simplifies security management. This platform is designed to protect users and devices from emerging threats, while reducing overhead and enhancing operational efficiency.

    By combining advanced AI technology, machine learning capabilities and a team of global cybersecurity experts, Avast and AVG help you stay one step ahead of attackers, safeguarding your business against the evolving threat landscape.

    Join us for an insightful webinar

    To help IT service providers and MSPs navigate this ever-evolving cybersecurity landscape, we’re hosting a free webinar designed to simplify security management and improve protection for clients.

    Webinar title: Secure Your Business in 2025: Avast Business Hub for IT Service Providers & MSPs
    Date and time: Thursday, 6 March 2025 | 11am – 12pm SAST
    Join via Microsoft Teams:
    Click here to join the meeting now
    Meeting ID: 363 903 282 797
    Passcode: PT2on2eT

    Learn how the Avast Business Hub simplifies security management and reduces overhead while providing comprehensive protection for your clients, covering every critical layer of security to protect your business from evolving threats – anytime, anywhere.

    Conclusion

    The threats we’ve observed in Q4 2024 serve as a reminder of the constantly evolving and increasingly sophisticated nature of cybersecurity risks. From social media scams to AI-driven attacks, cybercriminals continue to find new ways to exploit vulnerabilities and deceive individuals and businesses alike. As we look to 2025, staying ahead of these threats will require continuous vigilance, innovation and collaboration across the cybersecurity ecosystem.

    Stay safe and secure in the new year!

    About Gen
    Gen is a global company dedicated to powering digital freedom with a family of trusted brands including Norton, Avast, LifeLock, Avira, AVG, ReputationDefender and CCleaner. Our trust-based solutions help protect nearly 500 million users in more than 150 countries.

    Contact AvertITD via WhatsApp
    Our new WhatsApp support channel enables instant communication for partners and customers. Whether you need quick assistance, have questions about Avast or AVG licences, or want to discuss business requirements, you can now reach out directly for immediate help. This service ensures rapid responses across Africa, eliminating the need for lengthy e-mails or waiting for callback appointments.

    Real-time support through live chat
    In addition to WhatsApp, AvertITD has introduced a live chat feature on our updated website. This allows you to connect instantly with knowledgeable representatives who can answer your questions, assist with Avast and AVG solutions, and offer personalised guidance. The chat feature ensures you receive fast and efficient support without having to navigate through complex menus. By combining WhatsApp and live chat, AvertITD guarantees that partners and customers can easily access expert support, whenever they need it.

    About Avert IT Distribution
    Partnering with AvertITD means investing in your success and growth. As a world-class distributor, we offer a superior range of cybersecurity solutions to protect your clients and your reputation.

    Founded in 2004, AvertITD has continued to expand and evolve. We are proud to serve partners across Africa, prioritising accountability, integrity and commitment in all that we do. These principles are embedded in everything you, as a reseller, offer to your customers.

    To become an AvertITD reseller, complete this form or contact sales on +27(0)10-007-4430 (Johannesburg) or +27(0)21-007-2655 (Cape Town), or e-mail [email protected]. Find AvertITD on LinkedIn. Or send us a message on WhatsApp.

    • Read more articles by Avert IT Distribution on TechCentral
    • This promoted content was paid for by the party concerned

    Don’t miss:

    Cybersecurity predictions for 2025: charting the course ahead

    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Advanced Persistent Threats AI-powered threat detection APT Avast and AVG cybersecurity Avast Distributor Africa Avert IT Distribution AVG Distributor Africa CryptoCore deepfake scams Cybersecurity threats 2024 Mobile banking threats Ransomware 2024 Social media scams
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleLoad shedding to ease after worst power cuts in a year
    Next Article Starlink in race with Chinese rivals to dominate satellite internet

    Related Posts

    Avast Business and Avert IT Distribution rewrite the SMB cybersecurity playbook

    Avast Business and Avert IT Distribution rewrite the SMB cybersecurity playbook

    15 April 2026
    AnyDesk - high-performance remote access built for the modern enterprise

    AnyDesk – high-performance remote access built for the modern enterprise

    23 March 2026
    How Avast and Gen Digital are raising the bar in cybersecurity

    How Avast and Gen Digital are raising the bar in cybersecurity

    10 February 2026
    Add A Comment

    Comments are closed.

    Company News
    Africa's AI dream needs bricks and gigawatts - Gary Galolo, head of technology, media, and telecommunications and digital infrastructure finance at Nedbank CIB

    Africa’s AI dream needs bricks and gigawatts

    21 April 2026
    Fibre: the backbone of South Africa's digital health ecosystem - Mweb

    Fibre: the backbone of South Africa’s digital health ecosystem

    16 April 2026
    New man to accelerate wholesale connectivity in the DRC - Gaetan Soltesz, FAST Congo

    New man to accelerate wholesale connectivity in the DRC

    15 April 2026
    Opinion
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Africa's AI dream needs bricks and gigawatts - Gary Galolo, head of technology, media, and telecommunications and digital infrastructure finance at Nedbank CIB

    Africa’s AI dream needs bricks and gigawatts

    21 April 2026
    Seacom takes aim at regional peering costs - Prenesh Padayachee

    Seacom takes aim at regional peering costs

    21 April 2026
    Liquid dodges debt crunch - at a hefty price - Hardy Pemhiwa

    Liquid dodges debt crunch – at a hefty price

    21 April 2026
    WhatsApp to go premium with new Plus subscription

    WhatsApp to go premium with new Plus subscription

    21 April 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}