The Cost of Cybercrime on Our Emotional Wellbeing

F5 Ecosystem | October 10, 2022

I don't give a damn about my reputation.

Joan Jett & the Blackhearts had the luxury of belting out those lyrics before the modern internet age, back when counterculture was subversive, cool, and edgy.

Today, counterculture is mainstream. And our online reputations are everything. Our digital personas are deliberately curated, highly visible, and tightly managed as we wed ourselves ever closer to the devices in our pocket.

So, when accounts get taken over because of credential stuffing and bad actors take advantage, the results can be devastating on a very personal level.

Panic, embarrassment, and shame.

These are real feelings resulting from things that occur in our digital world.

This is especially true in the case of social media account takeover, which the Identity Theft Resource Center (ITRC) has dubbed an “Account Takeover Epidemic.”

According to the ITRC, who in 2021 had just short of 15,000 identity crime victims contact them for support services (a record in and of itself), there was a 1044% increase in social media account takeovers from 2020 to 2021. A stunning statistic.

As a follow up, the ITRC conducted a survey of social media account takeover victims and found that 66% reported experiencing strong emotional reactions to losing control of their social media account: 92% felt violated, 83% worried and anxious, 78% angry, 77% vulnerable, and 7% suicidal.

In the spirit of World Mental Health Day, these are important stats to consider within the cybersecurity space. And while it may be easy for some to view social media identity theft as a mere inconvenience, these figures demonstrate how closely tied one’s online reputation is to their emotional wellbeing.

Take a couple friends of mine, Trevor and Stacey, both of whom had their social media accounts hacked by presumably the same credential stuffing attack in July 2022. Neither had set up their 2-factor authentication.

Both friends are successful professionals who were active on social media, and one happened to be a moderate crypto enthusiast.

The bad actors posted on their Instagram stories a not-so-subtle message about getting involved in a bitcoin mining scheme. It was a screenshot of an iPhone lock screen which included a picture from their profile (in the case of Trevor, a picture of he and his wife from his profile) and displayed a bogus text message from BofA, followed by a screenshot from his supposed bank account:

While it doesn't take a cybersecurity expert to recognize this was a scam, it could nonetheless prove to be an effective phishing tactic since it is coming from the trusted source’s actual account within a social ecosystem not known for abuse.

Curious about the sophistication of these attackers—and because I'll never pass up an opportunity to speak directly to our black-hatted counterparts—I responded to the story to see how effective their messaging was:

I know, I know. I'm such a good friend, right?

It was an awful ordeal for both individuals. Trevor was able to use Instagram's facial recognition verification process, which scans your face and compares it against their endless library of tagged photos. He was able to regain access within 27 hours and set up his 2-factor authentication.

Stacey, on the other hand, left social media altogether. The ordeal was just too much of an embarrassment and created so much anxiety for her that she just up and left. Decided the whole persona in a digital realm thing was not for her.

This is not unusual. A study from 2020 suggests 28% of consumers will stop using a website if their account was hacked.

Panic, embarrassment, and shame.

Not the sort of feelings we want customers’ end users to have when they rely on our products. And while this example may be specific to social media, the sentiment is something we can all share.

Whether it’s social media, fintech, ecommerce, or any other organization with an exploitable user base, credential stuffing is a cat-and-mouse game that is here to stay—and with eyebrow-raising impact.

According to Javelin Strategy and Research in their 2021 Identity Fraud Study, account takeover (ATO) fraud resulted in over $6B in total losses in 2020. Companies create new defenses, hackers develop tools to bypass these safeguards, and the cycle continues.

So how can businesses fight back?

In a recent Aite Group report, risk executives from financial institutions, fintech lenders, and ecommerce companies were interviewed to learn how they are protecting themselves from the escalating volume of ATO attacks.

Among the key takeaways:

  • Most consumers use the same handful of usernames and passwords across websites, creating a vulnerability exploited by organized crime rings.
  • The available attack surface continues to expand, making detection and mitigation more complex.
  • Organizations need a solution that leverages real-time data analytics to keep pace with automated attacks and block malicious activity before it affects the business.
  • Firms with robust defenses will see attack volume decrease as criminals focus their attacks on easier targets.

Looking beyond the obvious bottom-line impacts of ATO attacks, it’s important to remember these crimes have a real human impact.

Stopping fraud isn’t only about saving money. It is just as critical for preventing the kind of human trauma that is surreptitiously corroding the fundamental fibers of a more ideal digital future. As in the physical world, what we want requires safety, security, and trust.

Share
Tags: 2022

About the Author

Ian Lauth
Ian LauthSr. Manager Product Marketing Al

More blogs by Ian Lauth

Related Blog Posts

The everywhere attack surface: EDR in the network is no longer optional
F5 Ecosystem | 11/12/2025

The everywhere attack surface: EDR in the network is no longer optional

All endpoints can become an attacker’s entry point. That’s why your network needs true endpoint detection and response (EDR), delivered by F5 and CrowdStrike.

F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift
F5 Ecosystem | 11/11/2025

F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift

F5 collaborates with Red Hat to deliver a solution that combines the high-performance app delivery of F5 NGINX with Red Hat OpenShift’s enterprise Kubernetes capabilities.

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture
F5 Ecosystem | 10/28/2025

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture

F5’s inclusion within the NVIDIA Cloud Partner (NCP) reference architecture enables secure, high-performance AI infrastructure that scales efficiently to support advanced AI workloads.

F5 Silverline Mitigates Record-Breaking DDoS Attacks
F5 Ecosystem | 08/26/2021

F5 Silverline Mitigates Record-Breaking DDoS Attacks

Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.

Volterra and the Power of the Distributed Cloud (Video)
F5 Ecosystem | 04/15/2021

Volterra and the Power of the Distributed Cloud (Video)

How can organizations fully harness the power of multi-cloud and edge computing? VPs Mark Weiner and James Feger join the DevCentral team for a video discussion on how F5 and Volterra can help.

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
F5 Ecosystem | 12/08/2020

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies

David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.

Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us