An episode from December 4, 2022 that was lost on YouTube

The Invisible Threat: How A TikTok Challenge Became A Cybersecurity Nightmare

Ryan Williams Sr.
4 min readJun 20, 2024

--

In the ever-evolving digital landscape, social media platforms like TikTok have become breeding grounds for new trends and challenges. While these trends can be entertaining and engaging, they also present significant cybersecurity risks. A recent example is the “Invisible Challenge” on TikTok, which has been exploited by malicious actors to spread malware, potentially compromising personal privacy and security on a massive scale. This discussion is based on a lost episode from December 4, 2022, where Ryan Williams Sr. and Shannon Tynes originally highlighted these issues.

Understanding the Threat

The “Invisible Challenge” involves applying a filter that makes the user’s body appear invisible, leaving only a silhouette. However, cybercriminals have seized this opportunity to trick users into downloading malware. According to research from Checkmarx, this malware, hidden in Python packages, steals sensitive information from users who fall for this deceptive trick.

How It Works

Threat actors lure users to a Discord server where they are directed to a GitHub repository hosting the malicious software. The malware can then unfiltered the invisible effect, exposing potentially compromising images of users, often shared in a state of undress. This has far-reaching implications not only for personal privacy but also for broader cybersecurity concerns.

The Broader Implications

This incident underscores a multi-faceted problem:

  1. Privacy and Security on TikTok: Despite its popularity, TikTok has been flagged for various security concerns, especially by government bodies. The platform collects vast amounts of data, raising significant privacy issues. “Government agencies have repeatedly warned about the dangers of TikTok,” noted Ryan, “Despite these warnings, many users remain unaware of the potential risks.”
  2. Vulnerability of Users: Many users, driven by the fear of missing out (FOMO), are quick to participate in viral challenges without considering the potential risks. This makes them prime targets for cybercriminals. “People have such FOMO,” Ryan said. “They want to be part of the challenge, and in their excitement, they overlook the security risks.”
  3. Malware and Data Theft: The sophisticated methods used by attackers to disguise malware highlight the ongoing challenge in cybersecurity. Users need to be vigilant about downloading software, even from seemingly reputable sources. As Ryan emphasized, “This is why social media can be dangerous. The moment you download that malware, your personal information is at risk.”

Parental and Personal Responsibility

For parents, it is crucial to educate children about the dangers of participating in online challenges, especially those involving personal exposure. Similarly, adults must exercise caution and think critically about the applications and software they download. “You need to police what your kids are downloading and participating in,” advised Shannon. “It’s not just about fun; it’s about safety.”

Moving Forward

As cybersecurity professionals, it is our responsibility to stay informed about these threats and educate the public. The allure of social media and viral trends can be strong, but awareness and caution are our best defenses. “We have to be proactive,” Ryan stated. “Understanding these threats and spreading awareness is key to protecting ourselves and our communities.”

Conclusion

The “Invisible Challenge” on TikTok is a stark reminder of the ever-present cybersecurity risks in our digital age. By understanding these threats and taking proactive measures, we can protect ourselves and our loved ones from falling victim to malicious actors. “Stay informed, stay vigilant, and most importantly, stay safe,” Ryan concluded.

Stay tuned for more updates and discussions on cybersecurity. Don’t forget to check out our episodes throughout the week, and please help us reach our goal of 500 subscribers!

Thank you for reading and stay tuned for more episodes of The Other Side of the Firewall podcast on Monday, Tuesday, Wednesday, and Fridays, as well as, the Ask A CISSP podcast every Thursday. Please like, share, and, subscribe.

Stay safe, stay secure!

Ryan is a retired Air Force veteran who brings over 20 years of experience in network infrastructure, project management, and cybersecurity consulting to his current role at BuddoBot . At Buddobot, he is dedicated to supporting national security by helping organizations transition from costly, reactive, and automated IT and security practices to proactive and robust security solutions.

Shannon, also a retired Air Force veteran, has more than two decades of expertise in network security and vulnerability management. He now serves as an Information System Security Officer (ISSO) for the U.S. Space Force, where he continues to enhance national security protocols.

Daniel is an Air Force veteran with over 15 years of combined experience in IT, cybersecurity, information assurance, and government risk compliance. He has held various roles, including IT administrator, cybersecurity engineer, senior information system security manager, and currently serves as a senior security consultant for Booz Allen Hamilton. In this latest role, Daniel leverages his expertise to address unique and complex challenges in the cyber and IT domains, enhancing his customers’ capabilities.

--

--

Ryan Williams Sr.

Cybersecurity Professional | CISSP | PMP® | Founder & Host of The Other Side of the Firewall & Ask A CISSP Podcasts | Retired U.S Air Force Vet | DE&I Advocate