Boycott Similac

Authenticity analysis of the profiles spreading negative Twitter conversation on Similac.

Analysis of over 20,000 Twitter accounts who commented on Similac and Abbott found that just over 5% of comments were from inauthentic users. However, in total, nearly a quarter of comments were negative, with much of the negative commentary coming from authentic users, many of whom regularly comment on parenting matters. Two inauthentic users who drove negative commentary were heavily tied into a community of inauthentic accounts.

#National Security

Share this report
Tweet from Robert Reich stating that 89% of the U.S. baby formula market is dominated by four companies, warning that high concentration magnifies supply shocks like the Similac recall and urging stronger antitrust enforcement against Abbott
Share this report

Fill up the form below and receive the full report directly to your inbox

Related reports

Burger King – Social Media Analysis

June 5, 2024

Cyabra analyzed the main narratives and fake accounts driving negative sentiment toward Burger King.

Line graph tracking Burger King–related social media profiles between 25 May and 23 June 2024, displaying 862 total profiles with a peak surge at the end of May; green line represents 524 authentic profiles (60%) and red line represents 337 inauthentic profiles (39%)

#Brand Reputation

Morocco Trade Deals Cancellation over Western Sahara

October 2, 2021

High level of inauthentic profiles within discussions regarding EU-Moroccan trade deals.

Tweet from account named davide asserting Western Sahara has always been Moroccan and criticizing Algeria, overlaid with a red 'FAKE' stamp indicating misinformation

#National Security

DeepSeek AI: Coordinated Fake Campaign

February 9, 2025

Cyabra uncovered a network of fake profiles promoting the hype around DeepSeek AI.

Two clustered bubble charts comparing social-media account networks, highlighting account sizes and sentiment colors in an analysis of the DeepSeek AI coordinated fake campaign

#National Security, Threat Actors