How to Beat Brand Impersonation

Best practices to tackle brand impersonation across social media, mobile apps and domains

In this webinar, the following is discussed:


Why should brands care about the impersonation challenge?


What are the 3 types of impersonation


Impersonation attack examples


How do impersonators operate


How to stop brand impersonation


How to Beat Brand Impersonation

Susanne Chishti 00:34

Good afternoon everybody and welcome to our Fintech Circle Insights Webinar, and I’m very excited today because today we speak about brand impersonation and how to beat brand impersonation, which is a key topic nowadays.

There’s so much happening to social media and so many companies need to identify how to better protect their brand. And I’m very excited today that they have chosen a company who is an expert in the field to join us for this webinar and the company is Red Points.

And you might have heard about the Red Points. They’re the very first brand intelligence platform and they combine online brand protection, copyright enforcement, impersonation removal, and also distribute their monitoring capabilities.

And by doing that, they help companies, full visibility to brand’s presence online and they’re helping 800 companies worldwide who rely on their services to really fight fakes, to fight piracy, and distribution abuse online, allowing clients to maintain control and improve their brand value and increase revenues.

Susanne Chishti 01:18
So, that’s the topic of our webinar today. And what I would like to do now is to show you the teams. I would like to welcome all team members from Red Points who join me, and we will show also you a slide deck that really explains what expertise the Red Points team brings to the table.

So, focus today on how to beat impersonation in 2021, and I am today joined by three experts from Red Points.

First of all, Daniel Shapiro. Daniel is the Vice President of Brand Relationships at Red Points; number two, Oli Bolton, and Oli is the Head of Solutions Engineering; and number three, Joan Porta, and Joan is the Vice President of Customer Success in the US.

So, super team today. Thank you very much all for joining me.

Daniel Shapiro
Thank you.

Susanne Chishti 02:18
Thank you very much. And what we want to do today is we will go through a slide deck, for about 20 minutes, and then we want to open it up for your questions. So, it will be a very interactive session and I invite all of you who are joining us today live to please type your questions into the Q&A section on the right of your screen, and we will respond to all your questions after the slides are completed.

After the presentation is finished, we’ll come to the Q&A session. We want to be able to respond to all of you individually. So, please come forward with your questions. We would be very interactive and really excited to know what you want to know more about.

And what we want to do first is to start out with a couple of polls to really understand what your background is, what your experience is so far in terms of impersonation. So, the first question you will see on your screen is about ‘have you ever fallen victim of impersonation?’ And you can either respond ‘yes’, with ‘no’ or ‘not sure’ and please choose and say submit. We will collect all your responses to come back later.

So, I, unfortunately, have been impersonated already. So, I have to say ‘yes’ here. And you can see right in the interesting sight. So, 43 percent of you have been already impersonated, the same amount has not been, and 14 percent are not sure yet if it happens because you’re totally right, sometimes you don’t even find out. It took me a few months before I found out that I got impersonated on Telegram. So, that’s really interesting.

Let’s go to the second question now. Poll #2. Here, ‘what would you do if someone impersonated your business on social media?’ So that’s, again, you know, something really concerning.

So, what would you do? Would you take legal action? Would you just panic? Would you report it as a phishing attack or as a fraud? Would you warn your community? Or All of the above? How would you respond? Again, click your response and press submit. And again, we see the results coming in. And very interesting, the currently leading is taking legal action.

So, the majority of you would take legal action followed by all of the above, which is, again, a great response, and some of you would say report it as phishing or fraud and warn the community about 12 percent at eth moment. Very interesting responses. Thank you so much for your answers.

So, what I would love to do now is to hand it over to Daniel to start this presentation. We’re excited to the presentation now and to share and listen to your expertise, Daniel.

Daniel Shapiro 05:15
Thank you so much, Susanne. And thank you all for allowing us to have a little bit of your time today. We certainly appreciate it.

Susanne gave such a great explanation of Red Points. I will just share with you, for those of you who have not heard of us before or are not familiar with our technology, but we are a brand intelligence solution designed to mitigate risk for ecommerce sites, marketplaces, social media, including social engineering, specifically targeting the fraudulent and active impersonation.

And we do that by combining both world-class technology, as well as very talented trained professionals who together make a very agile strategy for solving this fast-growing problem.

Why should brands care about the impersonation challenge?
Daniel Shapiro 06:00
And so, today we are going to discuss why this topic matters. And for us, it matters because impersonation is a security challenge that damages the brand reputation and creates a financial risk for organizations and for all of their stakeholders. The volume, location, sophistication of impersonations make it very very difficult for internal security teams to tackle alone.

In a matter of fact, in recent years, the growing trend is toward more sophisticated campaigns that rely on the combination of look-alike domains, fake accounts on social media, and fraudulent mobile apps.

And according to the FBI, impersonation tax has delivered losses of about $5.3 billion so far. And of course, it’s not just about the money. It is about the money, but it also can include your client’s sensitive information, it can include customer confidence and trust. And I think the biggest of all is brand loyalty and reputation damage, right?

Today, data in the UK shows that impersonation scams have increased by 84 percent in 2020 alone. These fraudsters have sought to exploit banks and caused confusion around at COVID-19 pandemic, and at least 15,000 cases were reported in the first half of the year for 2020. And that means criminals dragged in more than 58 million pounds in the first six months of last year using this particular technique. So, it’s quite challenging.

Social network companies, by the way, are very aware of the problem, and they are continuing to think about and combat the social engineering problem by vetting and verifying accounts and interacting with users to weed out impostors. The challenge, of course, is the speed of change. Opening new accounts, changing accounts once they’re vetted, are all problems. And the point here is that it takes collaboration, diligence, and technology to protect your brand.

To prevent impersonating accounts, it takes a significant effort from platforms and brands. The efforts to ruin your reputation and steal your customers’ money happens every day. It’s systematic, it’s diverse, and it’s increasingly complex. And I will have my colleague, Joan Porta, share a little bit more about the growing problem with impersonation on social media and how we think about addressing them.


What are the 3 types of impersonation
Joan Porta 08:41
Yeah. Thank you, Daniel. And hello everyone. Exactly. So, what I’ll be discussing in my section is essentially some of the learnings we’ve taken from our experience protecting brands and companies against the impersonation of brands.

Before we share some of those learnings, let me start though by explaining and making sure we all understand the topic of this discussion and what we mean by social media impersonation.

So, according to the Oxford Dictionary, an impersonation is ‘the act of pretending to be another person for the purpose of entertainment or fraud’. Today, we’re obviously not interested in impersonations for entertainment purposes such as parodies, fan pages, criticisms. Not only that the risk associated here is very low but also because these are types of impersonations that would normally be protected under free speech and they don’t constitute a trademark infringement.

So, we want to focus on impersonations as a medium to commit digital fraud. And with this in mind, we can establish our first classification based on the intended fraud, based on what are these impersonators chasing, what are they trying to achieve.
Fake news
Joan Porta 10:01
First of all, fake news. These are often spread by accounts that are impersonating politicians, celebrities, public institutions, media outlets. It’s a hub (10:10) definitely, but these would not be our focus today.
Joan Porta 10:15
Second, counterfeiters also rely heavily on social media to promote and sell fake products. So, there are accounts trying to pass off as legitimate retailers. There are aggressive advertising campaigns. Again, it’s a very interesting topic. We could talk about it for hours, but it’s probably not very relevant for financial institutions.
Phishing & scams
Joan Porta 10:36
What we want to focus on today are impersonations used to commit scams and phishing attacks against consumers. We think this is the most relevant and common digital fraud impacting the financial industry and this is what we will be talking about today. So, plain and simple. These would-be fraudsters are targeting your customers to steal, as Daniel said, their money and sensitive data.

And we know that this is a practice that has been going on for years both offline and online. And when we think about online, we talk about e-mail impersonations, we talk about fake domain names, spoof websites. The point we want to make today is that social media has become a prominent channel for cyberattacks and that any financial institution, large and small, should be monitoring it closely.

Impersonation attack examples
Joan Porta 11:27
And so, before we talk a bit more about how some of these impersonators operate in social media, I would like to share with you a few examples.

The first one, this one here, is a case that caught a lot of attention back in 2018. It was a wave of impersonation, Elon Musk’s impersonation attacks on Twitter. You can see some of the headlines. And the example on the bottom part, this was a specific example of a fraudster, that was they hacked a Twitter-verified account.

You can see the blue check on the account. And all they did then was to change the name to Elon Musk, to start using his same profile picture, and begin tweeting as if they were the CEO of Tesla. Then what they did was to link the account to a cropped currencies account, claiming that Musk was doing giveaways and they were requiring users to send their own Bitcoins to the scammer. So, a classical scam impersonating a public figure in this case.

Joan Porta 12:30
There’re a few things that are relevant and we want to highlight about this case. The first one is that when we’re talking about social media impersonations, we should not only be thinking about pages that are trying to imitate your corporate accounts, scammers will launch very sophisticated, targeted customized attacks against your brand, and they will often be impersonating also your executive and your employees.

The second point that we want to make is that this was a case that happened back in 2018. So, you would think that it was just a temporary scam and that it was quickly addressed by Tesla, by Twitter, or the social media platforms where it was happening.

But if we move into the next slide, what we see here is on the bottom part we see four fake social media accounts for Elon Musk. These were all live this morning. So, these ones exist and they’re very easy to find. If you go to Instagram, to Twitter, you will find them.

It’s worth noting not only do some of them include the work official and they pretend to be they’re tweeting or posting as if they were Elon Musk. But if you look at the number of followers, there’s one with 1.6 million followers. The other one with nearly 500,000, 300,000, 14,000. Many of them include links that are trying to redirect users to external websites. So, again, this is live and happening today.

And on top of the slide, there is a headline from a very recent article published in November 2020, but they’re explaining that the exact same problem that happened on Twitter back in 2018 – so, a massive Bitcoin scam – was now happening in one of the fastest-growing social media platforms, which is Twitch.

If we move into the next slide, our second case here, is about a technique called Deepfakes. It’s a very sophisticated form of impersonation. It’s caught a lot of attention lately. Maybe you’ve already seen, some of you have already seen, some of you maybe have used. I don’t know if we can try and play it. This is a piece of media from Tom Cruise, as you can all see it.

So, we could do a poll and ask also what the audience thinks, but I can give you the answer. As hard as it is to believe, this is not a real video from Tom Cruise. This is a video featuring an actor and there’s a lot of production work behind it and a lot of machine learning technology.

This is what’s known as deepfake, being able to imitate, replicate a public figure or a character using technology to this level where I think everyone would have thought this was a real video of Tom Cruise. This is a TikTok age which you can see the URL here. It includes other videos of Tom Cruise, and if you want to check it out, there are other videos from the same actor, and the technique is used to create the videos.

So, basically, we decided to choose these two examples. We could have chosen, there are thousands of fake financial institution pages out there that we could have shown, but we wanted to highlight these cases because we thought that even though they’re quite specific, they exemplify in our view the sophistication and the risks associated with social media.

So, most impersonation attacks today, will not reach this level of sophistication. But as technology evolves, we will, unfortunately, have to be ready to fake cases like these more and more often.

How do impersonators operate
Joan Porta 16:24
Now that we have seen a few examples, we’ll talk a little bit about some of the trends and the patterns that we’re seeing on social media lately. The first thing to say is that the way impersonators operate can be very diverse and it will vary essentially depending on the social media platform that we’re talking about or the objectives or the level of sophistication of the bad actors. But, however, there are some common behaviors that we’re seeing that we are observing and we want to share with you.

Impersonators abuse brands’ presence on social media
Joan Porta 16:55
The first one would be – I think the first takeaway is that there’s usually a correlation between the number of impersonation attacks against a brand and their social media presence.

So, on the one end, we see the brands that don’t have an official account. So, brands that don’t have any sort of official presence in a specific platform. These are very easy targets for fraudsters because they will try to take advantage of this gap to deceive the brand’s followers on that platform. Our advice here is we know there are hundreds of social media platform sites out there.

Ideally, you would want to keep an eye on all of them, but particularly you want at least focused, you want to be monitoring those ones where your customers, your audience may be. So, depending on age groups, countries, territories, industries, you may focus on some social media platforms or others, but aside from the usual suspects, I would say important to keep an eye always on LinkedIn, TikTok, Twitch, Telegram, Snapshot, VK in Russia, WeChat, and Weibo in China and the list goes on of course, but these are some of the important ones.

On the other hand, so we said, if you don’t have any presence, you could be a target, but we also observe that brands that have a very active presence on social media, tend to be also prime targets for impersonators. It is because scammers know that there’s a large base of customers that they can do fraud and they’re going to try to take advantage of that.

So, again, don’t think that just because you have an official account on Instagram and your account is verified, there’s no risk there. There may still be hundreds and thousands of fake profiles in the platform and you still need to monitor and take action.

Beware of impersonation on company employees
Joan Porta 18:46
In connection to these, the way we normally see impersonators operating is they tend to use the same photos, names, descriptions, bios, posts, hashtags of your official accounts. So, it’s critical to monitor those assets. When you’re running searches, try to use the same hashtags and see who else is using those hashtags in that social media platform. If you’re using specific keywords or images for your promotional campaigns, try to monitor those assets also.

Besides using these official assets, they will often do it in conjunction or using terms such as official, support, customer service, authorized agent. So, monitoring all these keywords is also important, and very often they do it while promoting brochures, sweepstakes, and fake giveaways. So, again, you need to make sure that you’re not only monitoring your brand but you’re also using all these terms and assets to avoid bad actors falling under the radar.

Impersonators exploit newly created accounts
Joan Porta 19:48
Another common misbehavior that we’re seeing or another thing taken for granted is that even when you find a page or an account that has very few posts or followers, it doesn’t mean, it doesn’t imply that it’s risk-free. They may be sending private messages or they may be running very aggressive advertising campaigns to their victims in order to take them into external websites where they will be committing the fraud.

So, again, you see the fake profile with zero followers, zero posts, they’re just using your logo and branding on the accounting, it doesn’t mean that it’s not harmful. They can still be targeting your customers, and again, ready to be directing them outside the social media platform and committing their illegal activities there.

What else leading to this, also connected, many social media platforms, and some people don’t know this, but a lot of social media platforms, when you set up a new account, it may take some days until that account is visible on the search results.

So, if you go to Facebook for instance and you search and you try to find a page, if this page was created within the last two or three days, it may not pop up in your results, and fraudsters that know this, these are the most sophisticated actors, they’re going to try to take advantage of these windows where they’re very hard to detect to launch very aggressive attacks, again, usually using private messaging or targeted advertising campaigns. So, there are ways to monitor advertising campaigns also and something you should definitely keep in mind.

The type of social network will strongly determine the form of impersonation
Joan Porta 21:26
And finally, to close, I would say the type of social network will strongly determine the form of impersonation. So, for instance, on LinkedIn, we usually see what we usually see are impersonations of company executives, employees, very often sales representatives, Asians trying to target customers, making it as if they were part of your company organization.

Other social media platforms with saying instant messaging apps, we’re going to be seeing groups mostly there. Sometimes they can be private groups, harder to access, sometimes they’re public groups. On Facebook, Twitter, the impersonations usually take in the form of a page or an account, but we sometimes see them using profiles, groups, events.

So, I think understanding this complexity, understanding for each platform the structure, the users, and the audience that it has is critical in order to adapt your protection strategy accordingly and make sure that you’re targeting all the fraudsters that are out there.

These was the main behaviors we wanted to share. Happy to answer more questions at the end, but now I will be handing it over to our colleague, Oliver. He is our technical expert and Oli is going to share with us some of the technologies and tools that can be deployed in the fight against online impersonations.

How to stop brand impersonation
Oliver Bolton 23:00
Awesome. Thanks for that, Joan. Super interesting. So, when it comes to actually stopping the impersonators, most platforms on which the impersonations actually exist do give you the tools in order to report them, but in general, the responsibility of identifying and then ultimately reporting those fake accounts is on those that are being affected by them.

Oliver Bolton 23:29
So, in this regard, the first piece of advice that we’ve got, which is super key, be proactive about the problem. No one else is going to solve it for you basically.

So, the idea of the Red Points system is such that we can really provide that type of system with being able to automate certain areas. So, in very serious cases, the use of technology for daily tracking and reporting of these violations is a must. So, being able to have a solution that’s consistently on this daily basis monitoring and detecting these new incidences out there and combining that with the use of the broad words that Joan was just mentioning.

So, it’s the idea of having a core set of keywords that are obviously relevant to the original accounts and being able to broaden the spectrum to encapsulate all of these ones with the misspellings, with the additional numbers, the digits added to the end, and having a system to be able to do that for you is going to give you that proactive approach.

Not only that but it’s also recommended that, as Joan was saying, the monitoring of the hashtags and all of this is super important. Now, if you can have a system to do that for you, it definitely lightens the load, put it that way.

Now, when it comes to the local recognition, the idea of the trends that we’re spotting in terms of how impersonators are advertising these profiles, the trends are just that. There’s always a particular image that seems to be appearing through that.

So, by combining the technologies of broad keyword terms and then being able to identify those that are of most importance with technology, such as logo recognition, this helps bring to the floor those that you really want to review before taking action and requesting that they’re taking them. It reduces the false positives.

Secondly, one thing that I failed to mention as well is of course the importance of the whitelist. So, having this whitelist and knowing where the original accounts are, it means that anything outside of those that are original is then going to be at least suspicious.

The last thing that I really want to touch on is about being able to apply a risk and similarity score. So, with Red Points what we’re able to do is use algorithms based on the additional information that we extract from the original profile, such as names, descriptions, photos, number of followers, hashtags, post creation dates. All of this data can be used and manipulated in order to generate the likelihood of it being an infringing account or not. There’s always add-on to kind of helping you to prioritize and choose your best enforcement strategy.

Really all it comes down to is that a comprehensive brand protection strategy should monitor your brand usage beyond social media, most Joan just touched on. It’s a case of not just social media but you want to be looking at the domain names and any additional websites that fall outside of that. And then there are also app stores as well.

So that’s really it from me. I’ll pass you back over to Daniel to wrap up.

Daniel Shapiro 27:12
Thank you, Oli. I appreciate it. I think to summarize both Joan’s presentation and sort of Oliver’s discussion on how our technology works and how we partner with and collaborate with brands, Fintech companies, I would say, that social media represents a growing problem, affecting thousands of brands, individuals across many many platforms. And as discussed, the associated risks, which include revenue loss for sure, but also notably again – I’ll just say it. I know we’ve repeated a few times, but the reputational damage is significant. Customer loyalty. There are so many competitive institutions out there that losing a customer who has fallen victim to an impersonation perhaps is the most damaging of all, as your brand loyalty, your brand reputation, it’s critical. All of us work so hard to make sure our brands are impeccable, and this is just one of those things that really take aim at it.

And then brands must take a proactive approach. You have to do something. Not doing something is not a solution, and you need something that is both comprehensive and scalable in order to put in place to help identify and remove this fraudulent activity as soon as possible. And of course, we think it takes a combination of both technology and expertise in order to really leverage what we think is the intellectual property solution or enforcement for such a problem.

So, with that said, I hope this has been informative, I hope it helps, and we look forward to answering some of your questions. Susanne, I will turn it over to you to guide us through the Q&A at this point.

Susanne Chishti
Excellent. That’s really super helpful. Thank you very much, Joan. And I would like to thank all of you for the super interesting webinar, for answering all our questions, and for sharing your expertise and knowledge. Also, we have a live audience who was able to participate. Now, for those or behalf of our, except for the audience who have joined the webinar, and then listen to it afterwards, so thank you from all of them for sharing your knowledge and expertise.

And as I said before, everybody who signs up for this webinar will receive the slide deck. If you would like to get in touch with the Red Points team, you’ve got the names on the information. So, it’s Daniel Shapiro, Joan Porta, and Oliver Bolton. You can reach out to all three of them on LinkedIn directly with questions. You can also email us at We will connect you to the Red Points team for any follow-up questions.

So, thank you very much for everybody for joining us, and I wish you all a wonderful day wherever you are and goodbye. Thank you.

Daniel Shapiro
Thank you, Susanne.

Joan: Thank you.

Oliver: Thank you.

Read the full transcript


Susanne Chishti

Founder and CEO – FINTECH Circle

Daniel Shapiro

VP of Brand Relationships at Red Points

Joan Porta

VP of Customer Success US at Red Points

If you have 15 mins, you can see Red Points in action with your brand

Step 1 Step 2 Step 3

What's your work email?

Step 1 Step 2 Step 3

More about yourself

Step 1 Step 2 Step 3

Pick a date