Post Now, Pay Later: How Social Media Triggers Cybercrime

Chioma was a regular girl living her best life. A graduate from the University of Lagos, a new job at a fintech company, and finally earning enough to afford the lifestyle she had always wanted. Every milestone deserved a post right?

As an avid instagram user, her feed was a perfect timeline of success: graduation photos with her full name and year of study, her new apartment address tagged in her stories, vacation pics from her trip to Dubai with flight details, even screenshot of her salary alert (with the amount blurred, but bank name clearly visible). Her 2,000 followers loved the authenticity.

What she didn't know was that one of those "followers" wasn't a fan at all.

Someone she'd never met was methodically collecting every piece of information she shared, building a detailed profile that would soon turn her dream life into a nightmare.

Six months later, Chioma's bank accounts were empty, her identity was being used to scam others, and she was getting calls from debt collectors about loans she never took. All because she shared just a little too much.

Digital Stalking: The New Age

We used to worry about strangers following us home. Now, we invite them into our lives through accepted friend requests and every time we post.

Social media has become the ultimate reconnaissance tool for cybercriminals, and we're practically handing them our personal security blueprints.

Think about your recent posts. Did you share:

  • Your location at specific times?

  • Photos of your new purchases or income?

  • Details about family members or relationships?

  • Your work schedule or travel plans?

  • Pictures of your home, car, or workplace?

Each post might seem harmless on its own, but together, they create a detailed map of your life that cybercriminals can exploit.

How "Harmless" Posts Led to a Two Million Naira Loss

Emeka, a software developer, was proud of his growing career and wanted to share his journey with friends. His LinkedIn and Instagram were filled with professional updates. (At this point, you’ve probably realised that you’re in a similar situation).

  • Monday: "New project kickoff meeting! Excited to work with NeuraForge"

  • Wednesday: "Team lunch at Transcorp Hilton with the amazing developers I work with"

  • Friday: "Thank God it's Friday! Weekend trip to Calabar, here I come!"

  • Sunday: "Beautiful resort in Calabar! Who else loves this place?" (location tagged)

What seemed like innocent professional sharing gave scammers everything they needed. They learned where Emeka worked, the names of his colleagues, his travel schedule, and even his favorite hangout spots.

While he was enjoying his weekend in Calabar, the HR department received a call from scammers pretending to be from the bank, claiming there was an urgent issue with his salary account. Using the information from his posts, they sounded legitimate enough that HR provided additional details about his employment.

Within hours, the scammers had enough information to successfully impersonate Emeka and take out a mobile loan in his name. By the time he returned from his trip, ₦2,000,000 in fraudulent loans had been processed using his identity.

How Your Posts Become Mines Of Information

Cybercriminals don't need your password if you're giving them everything else for free:

  1. Personal identifiers
  • Full name and nicknames

  • Date of birth

  • Phone numbers (through business posts)

  • Email addresses

  • Home address or neighborhood address

  1. Answers to security questions
  • Pet names and breeds

  • School names and graduation years

  • Your mother's maiden name (through family photos with tags)

  • The model of your first car

  • The names of your Childhood friends

  1. Financial information
  • Bank names (through salary alerts, payment screenshots)

  • Income level (though lifestyle posts, purchase photos)

  • Shopping habits and favorite stores

  • Investment activities (through crypto posts, trading screenshots)

  1. Behavioral patterns
  • Daily routines and schedules (Yes, your gym progress posts and such)

  • Travel patterns and favorite destinations

  • Work schedule and colleagues

  • Family relationships and dynamics

The Psychology of Oversharing

Why do we share so much? Social media taps into basic human needs:

  • Validation: Likes and comments make us feel good

  • Connection: Sharing makes us feel closer to others

  • Achievement: We want to celebrate our wins

  • FOMO: Fear of missing out on trends and conversations

The problem is that our desire to connect and share has outpaced our understanding of the risks. We treat social media like we're talking to close friends, forgetting that our "audience" includes complete strangers, bots, and yes, cybercriminals.

Smart Sharing: How to Stay Social Without Becoming a Target

You don't have to go off the grid to stay safe. Here's how to share smartly:

  1. Audit your privacy settings!
  • Review who can see your posts, photos, and personal information

  • Turn off location tags on posts

  • Limit who can tag you in posts

  • Make your friend list private

  1. Think before you post!

Ask yourself:

  • Could this information be used to impersonate me?

  • Am I giving away my location or routine?

  • Would I be comfortable with a stranger knowing this?

  • Could this put me or my family at risk?

  1. Master the art of Vague Sharing!
  • Instead of "Flying to Dubai tomorrow at 6 AM on Emirates," try "Excited for an upcoming trip!"

  • Replace "Just got my salary! N500k this month!" with "Grateful for this job!"

  • Change "Home alone this weekend while family travels" to "Enjoying some quiet time"

  1. Use social media’s built-in safety features.
  • Create close friends lists for sensitive content

  • Use temporary posts that disappear after 24 hours

  • Share memories after events, not before or during

  • Turn off read receipts and last seen features

  1. Be very careful with:
  • Financial information: Never show bank details, salary amounts, or financial apps

  • Travel plans: Share vacation photos after you return, not while you're away

  • Personal documents: Blur or hide ID numbers, addresses, and sensitive details

  • Family information: Be protective of children's and elderly relatives' data

Your Digital Life Has Real-World Consequences

Social media should enhance your life, not endanger it. The goal isn't to become paranoid or stop sharing altogether – it's to be intentional about what you share and who can see it.

Remember: Once something is online, it's potentially there forever. That innocent post about your morning routine could be the missing piece a scammer needs to impersonate you. That tagged location could tell a burglar when your house is empty. That family photo could give someone enough information to manipulate your relatives.

The criminals are getting smarter and more sophisticated. It's time we do the same. Your online presence should reflect your best self – smart, successful, and security-conscious.

Share your joy, celebrate your achievements, and connect with your community. Just do it in a way that doesn't hand criminals the keys to your life.

Stay social, stay smart and stay safe.

27
Subscribe to my newsletter

Read articles from Oghenemaro Ikelegbe directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Oghenemaro Ikelegbe
Oghenemaro Ikelegbe

I am a passionate, self-starting individual and with a goal-driven and ambitious mindset. I value collaboration and strive to foster a cohesive work environment that encourages collective success. Balancing professional pursuits with personal values, I prioritize religion, relationships, and loved ones. In leisure time, I enjoy reading and taking walks, finding joy in simplicity and continuous learning.