Skip to content

Social Media Monitoring

ShadowMap monitors major social media platforms for fake accounts, impersonation profiles, and unauthorized use of your brand. Social media impersonation is a growing vector for phishing, fraud, and reputation damage -- this module gives your team the ability to detect, investigate, and take down fraudulent accounts across all major platforms.

Overview

Social Media

Monitored Platforms

ShadowMap scans the following platforms for brand impersonation:

PlatformWhat Is Detected
FacebookPages and profiles using your brand name, logo, or executive identities
Twitter / XAccounts impersonating your brand or employees
InstagramProfiles using your brand imagery or name variations
TikTokAccounts leveraging your brand for fake promotions or scams
YouTubeChannels impersonating your brand or re-uploading your content
TelegramGroups or channels fraudulently using your brand identity

Each platform icon is displayed next to the account for quick visual identification.

Data Per Account

Each social media finding is displayed as a card with the following information:

FieldDescription
Account NameDisplay name of the detected account
Account HandleThe account's username or URL
Profile ImageThe account's profile picture
DescriptionThe account's bio or description text
PlatformWhich social media platform (shown as platform icon)
Followers / SubscribersFollower count (shown as "Followers" for most platforms, "Subscribers" for YouTube)
Confidence ScoreNumerical risk score indicating likelihood of impersonation
KeywordThe brand keyword that triggered the detection
ExecutiveIf linked to a monitored executive, the executive's name is shown
Organization TagsDetected organizations associated with the account
First SeenWhen ShadowMap first detected this account (relative time)

Status Tabs

Findings are organized into workflow tabs:

TabDescription
OnlineAccounts currently active and potentially impersonating your brand (default landing tab)
Takedown On-GoingAccounts for which a takedown request has been submitted to the platform
TakendownAccounts that have been successfully removed by the platform
Customer PagesAccounts confirmed as owned by your organization (marked "Owned By Us")
InvestigatingAccounts under active investigation by your team
ReviewedAccounts investigated and marked as false positives or non-threats

Actions

Single-Item Actions (via three-dot menu on each card)

  • Owned By Us -- Mark as a legitimate account belonging to your organization. This moves the account to the "Customer Pages" tab and prevents it from being flagged in future scans
  • Mark as Investigating -- Place under active investigation (available from Online tab)
  • Mark as Reviewed -- Dismiss as a false positive after investigation
  • Request Takedown -- Initiate a takedown request to the social media platform

Bulk Actions (multi-select)

Select multiple accounts using checkboxes and use the action bar:

  • Owned By Us -- Bulk-mark selected accounts as legitimate
  • Mark As Investigating -- Bulk-move to investigation status (from Online tab)
  • Mark As Reviewed -- Bulk-dismiss as false positives
  • Mark As Online -- Bulk-move back to Online status (from Reviewed tab)

Additional Features

  • Export -- Download all findings in Excel format with applied filters
  • Search Filters -- Filter by platform, keyword, status, risk score, executive, and other fields using ShadowMap's Filter Query Parser (FQP)
  • Comments -- Add internal notes to any social media finding for team collaboration
  • Account Details Modal -- Click any card to view the full account details in a modal overlay
  • Total Count -- The header displays the total number of findings matching current filters

How Detection Works

ShadowMap detects social media impersonation through:

  • Brand keyword monitoring -- Searching platform APIs and public listings for your brand name and variations
  • Executive name matching -- Cross-referencing social profiles against your monitored executives list
  • Visual similarity -- Comparing profile images and cover photos against your official brand assets
  • Content analysis -- Analyzing posts and descriptions for brand-related content from unauthorized accounts
  • Network analysis -- Identifying clusters of fake accounts that share infrastructure or behavioral patterns

Typical Scenarios

Scenario 1: Fake Customer Support Account

An attacker creates a Twitter account named "@YourBrand_Support" and responds to customer complaints, directing them to a phishing site. Detection keyword: your brand name. Action: Request Takedown immediately.

Scenario 2: Executive Impersonation on LinkedIn

A fake LinkedIn profile impersonates your CEO, connecting with employees and partners to gather intelligence or request wire transfers. Detected via Executive Monitoring integration. Action: Mark as Investigating, notify the executive, then Request Takedown.

Scenario 3: Fraudulent Facebook Page

A Facebook page uses your logo and company name to sell counterfeit products. High follower count amplifies brand damage. Action: Request Takedown, document with comments, export evidence.

Scenario 4: Legitimate Partner Account

A marketing partner creates an authorized co-branded Instagram account. Flagged by keyword match. Action: Mark as "Owned By Us" to prevent future false alerts.

  1. Start with the Online tab -- review newly detected accounts
  2. Prioritize by follower count -- accounts with more followers cause more damage
  3. Check the Executive field -- impersonation of named executives requires immediate escalation
  4. Click through to account details for deeper investigation
  5. Mark legitimate accounts as "Owned By Us" immediately to reduce noise
  6. Request takedowns for confirmed impersonation accounts
  7. Move uncertain cases to Investigating while gathering more information
  8. Review the Takedown On-Going tab weekly to follow up on pending requests

ShadowMap by Security Brigade