SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
A STUDY OF MALICIOUS
ATTACKS ON FACEBOOK

   Maria Patricia M. Revilla
   Commtouch, Philippines


              October 2011




    Copyright is held by Virus Bulletin Ltd, but made available on this site for
           personal use free of charge by permission of Virus Bulletin
                           (http://www.virusbtn.com).
A STUDY OF MALICIOUS ATTACKS ON FACEBOOK REVILLA




       A STUDY OF MALICIOUS                                        The popularity, number of subscribers, and level of activity
                                                                   have made Facebook an attractive tool for attackers who use
       ATTACKS ON FACEBOOK                                         social engineering in order to spread malicious content or earn
                Maria Patricia M. Revilla                          money unethically. Over the years, social engineering has been
                Commtouch, Philippines                             enormously effective as it succeeds in convincing users to
                                                                   unknowingly act in the interests of cybercriminals. Spam and
                                                                   email scams have been used to deceive users, for example,
           Email Patriciar@commtouch.com                           offering seemingly legitimate employment, while putting
                                                                   victims to work as money mules who unwittingly help launder
                                                                   stolen funds. It has also been used as a tool to start and force
ABSTRACT                                                           the spread of worms by including attachments disguised as
                                                                   normal documents.
Social networking sites have, beyond doubt, made it into
today’s popular culture. They have apparently become the           The use of fake file icons such as those used for Windows
primary resource for the masses when it comes to socializing       folders, Word documents, text files, media files and others are a
for the sole reason that they generally measure up to what the     subtle form of social engineering, letting users think that a
modern populace claim to demand – something fast, easy and         malicious application is just a normal document. Instant
accessible. Facebook is a perfect example.                         messages on Yahoo! or MSN use convincing phrases promising
                                                                   must-see pictures or videos to trick users into clicking malicious
Facebook has become undeniably popular. With 600 million
                                                                   links that may point to phishing sites or rogue software. Rogue
users to date, it could be considered to be the most widely
                                                                   software or fake anti-virus products are themselves a form of
used social networking site in the last decade. People patronize
                                                                   social engineering. By scaring users with ‘detected’ malware,
Facebook for its simple, but rather functional features, which
                                                                   they convince them to pay for products that they believe will
range from public messaging through wall posts and private
                                                                   actually help them remove the ‘infection’. Sophisticated social
messaging, to sharing photos, videos and URL links, to
                                                                   engineering attacks use emotion and human desires to trick
gaming, and even marketing and advertisements. It even
                                                                   users. Protecting users from themselves is a tough job and it is
makes a good online outlet for thoughts in the form of ‘status
                                                                   something that a computer cannot really do.
updates’ which can be changed as often as one wishes.
                                                                   In 2008, the Koobface worm spread through social networks,
With its popularity and effectiveness, Facebook has also           including Facebook (where its name came from). It may be
become a hot spot for attackers. Over the years, social            considered to be one of the most successful worms as new
engineering has been reported to effectively spread malicious      variants are still being encountered – over 20,000 variants [4]
programs which are hard to prevent, especially granted that        by April 2011. Aside from the Koobface worm, there have
they are designed to trick human thinking.                         been other forms of attacks – clickjacking, phishing, spams,
This paper will seek to study the social engineering attacks       scam messages, links to rogue applications, and others that
that have been identified to spread malware through Facebook.       help cybercriminals earn money. It is certainly alarming to see
By tracking down the distribution methods/mechanisms for           how these forms of attack have increased.
spreading malware, and the current preventive and defensive        Based on the number of active users and activities performed
measures, this paper aims to give an insight into the challenges   by Facebook users, it is clear that Facebook has become an
that are being faced in terms of protecting users.                 effective social networking site with people benefiting from its
                                                                   integrated functionality such as photos and messaging. At the
INTRODUCTION                                                       same time, attackers have successfully taken advantage of this
                                                                   functionality to turn Facebook into a channel for spreading
Facebook has become enormously popular, reaching over 600          malicious content. Even a small percentage of compromised
million users to date [1]. Users have increasingly integrated      users would equal a large attack base given the number of
social networks into their lives, spending a reported 700          active users on the site.
billion minutes per month on Facebook [2]. Every 20 minutes
approximately 24,857,000 actions are performed which may           Security companies have developed tools and have improved
be broken down into:                                               scanners to detect and prevent intrusion of malicious
                                                                   programs. Solutions range from single file detection to generic
                                                                   and heuristic detections, and even cloud-based technologies.
            10,208,000    comments made
                                                                   As these protection technologies have improved, attacks have
            2,716,000     photos uploaded                          grown more sophisticated in an attempt to evade new and
                                                                   existing security measures. Attackers usually take advantage
            2,716,000     messages sent
                                                                   of commonly used software and/or popular sites combining
            1,972,000     friend requests accepted                 social engineering with exploits of vulnerabilities in programs
                                                                   like Adobe Reader or Internet Explorer. Our observation is
            1,851,000     status updates
                                                                   that attackers have achieved the most success in bypassing
            1,587,000     wall posts                               security measures by employing sophisticated social
                                                                   engineering methods.
            1,484,000     event invites
                                                                   This paper will focus on analysing social engineering attacks
            1,323,000     tagged photos                            on Facebook and will try to present the preventive measures
            1,000,000     links shared                             the industry has provided to users, defensive measures/tools
                                                                   that are available for users, and the challenges faced in
  Table 1: Facebook activity statistics onlineschools.org [3].     preventing users from becoming victims.


                                                                   VIRUS BULLETIN CONFERENCE OCTOBER 2011                               1
A STUDY OF MALICIOUS ATTACKS ON FACEBOOK REVILLA



    THE PROBLEM – FACEBOOK SOCIAL                                       itself as a photo album application. Following the link to
    ENGINEERING ATTACKS                                                 the fake application, the user was prompted to download
                                                                        the file ‘FacebookPhotos#####.exe’, which is the
    A trusting user in a social network environment wouldn’t            malicious executable. Newer variants used different
    suspect that a friend (deliberately added to a friend list) would   filenames such as ‘Facebook-pic[number].exe’ (e.g.
    send any harmful content. This trust turns a very popular and       Facebook-pic000751357.exe) [8].
    widely used social networking site like Facebook into a huge
    opportunity for attackers. Users are drawn to action by
                                                                        Clickjacking
    ‘friends’ – following a message, links, or an invite – without
    suspecting that this will undermine security.                       Another type of social engineering attack is clickjacking. This
                                                                        method tricks a user into allowing a malicious script or a code
    Worms: Koobface and Palevo                                          to execute without his knowledge by enticing the user to click
                                                                        on seemingly normal objects on a web page, such as buttons,
    The Koobface worm has been around since 2008 [5]. It was            links, or images. On the Facebook platform, attackers were
    first encountered through Facebook messages that enticed a           able to find ways to exploit some of its functionalities such as
    user to view a video from a link that looked as though it came      the ‘Like’, ‘Publish’, and ‘Comments’ buttons when writing
    from YouTube. Alluring messages like, ‘You must see it!!!...’,      comments on photos, videos or links.
    were the first step of its social engineering tactic. Users who
    clicked on the link were prompted to download newer                 A worm that spread on Facebook through a clickjack attack
    versions of Adobe Flash Player – the second part of the social      was successfully executed using an invisible IFrame. It
    engineering attack. The downloaded file ‘codecsetup.exe’ was         basically exploited the ‘Publish’ button that posts a link to the
    actually not an Adobe Flash Player, but a malicious                 user’s wall. The link points to a page that contains an invisible
    executable. Once the executable is installed, the infected          IFrame shown in the code in Figure 3 (from jsunpack.jeek.org).
    machine turned into a bot used for spreading more messages          The user is unaware that a click anywhere on the page is
    with malicious links and for other malicious purposes.              actually a click on the ‘Publish’ button. This results in a post
    Later, when users became aware of a worm that spread using          on the victim’s wall, which will then be seen by the victim’s
    a fake YouTube-like video, a new variant was encountered            friends, probably causing them to click as well, and in this
    which used a Blogspot link sent through messages of friends         way continuing the spread of the malware. This worm was
    [6]. The message had the same video-related theme, but the          first reported by F-Secure in May 2010 [9].
    changed destination to a Blogspot link reduced the suspicion.       Following this attack, a lot of other clickjack attacks followed
    The Blogspot pages included JavaScript redirects to pages           by exploiting the famous ‘Like’ button, also known as a
    again requiring the installation of a so-called video playing       ‘likejacking’ attack. When a user ‘likes’ a certain page, video,
    component (as with the initial version). As before, the ‘video      photo or a website on Facebook, it enables the user to share
    playing component’ was in fact a malicious executable. In this      this content with friends. It’s almost the same as suggesting it
    case, the infected machine opened new Blogspot accounts and         to friends as the liked page appears on the user’s newsfeed
    distributed the malicious links to friends. Figures 1 and 2         causing friends to see it and probably to click it themselves.
    show some examples.                                                 This attack works especially well when the link has a
                                                                        descriptive text specially crafted to attract users, such as
                                                                        messages promising a ‘video of Justin Bieber’, or ‘pics of
                                                                        Miley Cyrus’, or any current newsworthy event [10]. An
                                                                        example of the actual code used for this attack is shown in
                                                                        Figure 4 (from pastebin.com).
                                                                        The code basically uses the same method as an invisible
                                                                        IFrame which follows the user’s mouse. Any click on the
                                                                        page will be a click on the ‘Like’ button, without the user’s
                                                                        knowledge.
                 Figure 1: Blogspot post example (1).
                                                                        Another attack exploited the ‘Comment’ functionality. Once a
                                                                        user ‘comments’ on a photo, a video or a link on Facebook, it
                                                                        will appear on the user’s wall or newsfeed, causing friends to
                                                                        see it and, as before, probably attracting them to see and click
                                                                        on it as well. Here again, the messages included text with
                                                                        famous names such as Justin Bieber. Clicking on the link led
                                                                        to a page with a question and text entry box for the answer.
                                                                        The text box was actually a Facebook comment box which
                                                                        would result in the posting of a comment on the victim’s wall,
                                                                        or a message on the victim’s newsfeed, causing it to be shared
                 Figure 2: Blogspot post example (2).                   and seen by the user’s friends. This attack was reported by
                                                                        Sophos in April 2011 [11].
    Palevo is another worm that has been known to spread
    through social network chat messages or instant messages
    including Facebook [7]. This worm has exploited Facebook            Scam and spam messages on Facebook
    chat and Facebook application functionality. It tried to            Facebook has also become the target of scammers and
    spread by sending chat messages to friends and disguised            spammers. Unethical and illegal advertisers have predictably


2   VIRUS BULLETIN CONFERENCE OCTOBER 2011
A STUDY OF MALICIOUS ATTACKS ON FACEBOOK REVILLA




                                           Figure 3: Clickjack sample using IFrame tag (1).




                                           Figure 4: Clickjack sample using IFrame tag (2).

taken advantage of the large number of Facebook users. One
method of scam and spam has spread on Facebook through a
manual cross-site scripting (XSS) attack (also called a
self-XSS attack). The concept of an XSS attack is not new,
but the interesting thing here is the social engineering used
that convinces the user to manually enter the malicious script
in the browser address bar. The topics were varied [12, 13]:
  • Promises of 500 free Facebook credits (something that
    does not exist)                                                            Figure 5: Self-XSS instruction to users (1).
  • An application to see who had been viewing a user
    profile
  • Video of Osama Bin Laden’s assassination.
These all led to pages with instructions such as these:

Just follow these 3 steps:                                                     Figure 6: Self-XSS instruction to users (2).
1. Copy this code (highlight and press CTRL-C):
javascript:(a=(b=document).createElement(‘script’)).                 a user ends up viewing ads that are not really related to the
src=’//[omitted]/f.js’,b.body.appendChild(a);void(0)                 subject of the link that they originally clicked. Most of these
2. Delete the actual address from the url field in                    focus on methods to earn easy money, earn points/credits,
your browser and paste the code instead.                             view gossip or the latest news and events, and others.
3. Press Enter and wait for a bit, it can take up to                 Having hijacked the user’s Facebook session, the script also
a minute to complete.                                                sends the scam messages through almost all means of
That’s it!                                                           reaching out to a victim’s friends including: chat, wall posts,
If you are having trouble with these instructions,                   status updates, event invitations and private messages. It also
try viewing the instructions here: http://[omitted].                 makes use of shortened URLs in order to avoid immediate
info/?sg2lq
                                                                     suspicion from users.
it’s where I learned it
                                                                     Figure 7 shows an example of a fake event invitation. Notice
Attackers even provided step by step image guides showing            that the subject is ‘Official App: See Who has Viewed your
how to perform the self-XSS attack, as shown in Figures 5            Profile? Find out here! [bad shortened link]’. Many users will
and 6.                                                               notice that this doesn’t really sound like an ‘event’, but the
                                                                     idea is to catch the user’s attention and draw them into
It is quite remarkable that there are users who fall for scams
                                                                     following the link.
which require them to manually copy and paste code into
their browser’s address bar. Once the code has been pasted as        An example of spam code shown in Figure 8 illustrates how
per the instructions, the user is redirected to a ‘survey page’.     the messages continue to spread widely. The code uses an
This is an affiliate link where rogue affiliates earn money for        obfuscation technique to hide the routine using encoded
bringing users to partner sites. At the end of the survey page,      function calls stored in an array of variables – in this sample,


                                                                   VIRUS BULLETIN CONFERENCE OCTOBER 2011                               3
A STUDY OF MALICIOUS ATTACKS ON FACEBOOK REVILLA



                                                                   var _0xb65. Looking at the rest of the code gives us a clue as
                                                                   to its real purpose since it uses the XMLHttpRequest API,
                                                                   which is used for sending HTTP or HTTPS requests directly
                                                                   to a web server.
                                                                   Decoding the variable _0xb65 reveals what the routine is all
                                                                   about (Figure 9).
                                                                   Basically, once the script is executed, messages will be sent to
                                                                   the victim’s friend with texts based on the variables settings
                                                                   in the code as shown in the additional code below. Aside from
                                                                   posting a message the script will also make a comment on the
                                                                   posted message and will also ‘like’ the post it created
                                                                   (Figure 10).
                                                                   Figure 11 shows how the resulting post, comment and
           Figure 7: Fake Facebook event invitation.               message will look.




                                               Figure 8: JavaScript spam code (1).




                                               Figure 9: JavaScript spam code (2).




                                               Figure 10: JavaScript spam code (3).


4   VIRUS BULLETIN CONFERENCE OCTOBER 2011
A STUDY OF MALICIOUS ATTACKS ON FACEBOOK REVILLA



                                                                Following the links leads to the sites shown in Figures 16 and
                                                                17, enticing users by promising results as well as a discount
                                                                when they buy the product.




     Figure 11: Resulting post made by the spam code.

Money-mule and credit card scams
Money-mule scams have also made their way into Facebook.
As with other platforms, scammers attract people with
promises of easy money. Money-mule recruitment usually
starts with Facebook groups (which can be started by any               Figure 16: Scam post advertisement sample (1).
Facebook user). These groups often attract large followings
because people do not know what they are getting into [14].
Other frauds have also appeared, such as credit card scams.
These start with messages designed to attract users by
proposing ‘money-making jobs’, or books about ‘how to earn
big money’, ‘how to win the Lotto’, or ‘guides on how to be
attractive’. The example in Figures 12 and 13 shows the first
part of such an attack using an ‘easy money making’
Facebook group. Some of the posts on the group’s wall are
products being sold, relating to books for winning the Lotto
or attracting women (Figures 14 and 15).

                                                                       Figure 17: Scam post advertisement sample (2).
                                                                Once a user accepts the offer, the payment is made via a
                                                                credit card transaction as shown in Figures 18 and 19.



          Figure 12: Scam group page sample (1).




          Figure 13: Scam group page sample (2).

                                                                            Figure 18: Payment scam sample (1).




              Figure 14: Scam post sample (1).




              Figure 15: Scam post sample (2).                              Figure 19: Payment scam sample (2).


                                                               VIRUS BULLETIN CONFERENCE OCTOBER 2011                            5
A STUDY OF MALICIOUS ATTACKS ON FACEBOOK REVILLA



    The site ‘complaintsboard.com’ shows that the site seems to
    be a fraud or a scam (Figure 20).




                                                                               Figure 23: Facebook lottery email scam.




         Figure 20: Complaintsboard complaint comments.

    Fake email notifications – more scam, spam
    and malware attachments
    Spammers promoting pharmaceutical products have also used
    Facebook as an opportunity. Fake Facebook email                    Figure 24: Fake Facebook email password notification (1).
    notifications trick users into clicking links leading to online
    pharmacy sites [15]. An example of a fake email notification
    is shown in Figure 21.




    Figure 21: Fake Facebook email notification leading to online
                          pharmacy site.                             Figure 25: Fake Facebook email password notification (2).
    Following the link leads to the pharmaceutical store page
    shown in Figure 22.




               Figure 22: Pharmaceutical store page.
    Lottery scams have also been very common, using fake email
    notifications describing surprise lottery wins such as the
    ‘Facebook Africa Jackpot Promo’ shown in Figure 23 [16].         Figure 26: Fake Facebook email password notification (3).


6   VIRUS BULLETIN CONFERENCE OCTOBER 2011
A STUDY OF MALICIOUS ATTACKS ON FACEBOOK REVILLA



The email has all the signs of an advance fee fraud scam,
promising a huge sum of money, requesting detailed personal
information, and requiring secrecy.
Malware writers have also taken advantage of fake Facebook
email notifications. Emails include subjects relating to:
‘Facebook Abuse Department’, ‘Facebook Security’, and
others (Figure 24).
In the examples shown in Figures 25 and 26, variants of the
malware detected as Oficla (aka Bredolab) are sent as
attachments with the email describing a password reset due to
spam. Subjects include, ‘Spam from your account’.
The attachment names include: ‘Attached_SecurityCode.exe’,                 Figure 30: Facebook phishing sites statistics.
‘Facebook_DOCUMENT.EXE’ and ‘Facebook_
PASSWORD.EXE’. These are all malware executables that
use misleading file icons in addition to their misleading file
                                                                   Fake applications
names. The use of trusted icons is a common social                 Many Facebook users enjoy Facebook applications and games
engineering tactic to trick a user into executing the malware      that exist within the social network such as FarmVille and
file. Below are examples of the Oficla executables with              CityVille, and attackers have also taken advantage of this
misleading filenames and icons:                                     functionality. The problem with applications on Facebook is
                                                                   that they have the ability to access some or all of the user’s
                                                                   profile information. Rogue applications can therefore post
                                                                   messages on a friend’s wall, send messages, and even extract
            Figure 27: Oficla attachment file (1).                   information from user profiles to be used for any malicious
                                                                   purpose. Attackers usually use catchy subjects such as: ‘who
                                                                   viewed your profile’. A further issue is that the verification
                                                                   process for application writers is relatively simple.
            Figure 28: Oficla attachment file (2).
                                                                   PREVENTIVE MEASURES
Phishing                                                           Prevention is always better than cure. The trusted network
Genuine Facebook user accounts are very valuable for               nature of Facebook has made some cybercrime much easier.
cybercriminals since they provide them with access to a            On the other hand, Facebook has improved its security
trusting network of friends. Facebook users have therefore         measures and settings to protect its users. These measures
become a natural target for phishers. Many fake pages have         have included partnerships with security organizations to help
been launched (fed from fake email notifications) in order to       improve the site’s security tools. Although these systems are
steal users’ login information. Cybercriminals can then use        not perfect, they are worth noting as they do contribute to user
these stolen accounts for many of the malicious purposes           security.
described in this paper. Attackers have become skilled at
mimicking the actual Facebook login page, as in the example        Spam, scam and clickjack prevention systems
shown in Figure 29 [17].
                                                                   Facebook has implemented security checks in order to protect
                                                                   users from phishing attacks. In the example below it was able
                                                                   to detect an attempt to log in from a page outside Facebook.
                                                                   When a user tries to visit a page that does not belong to
                                                                   Facebook, but requires a login to Facebook, the warning
                                                                   message below appears:




         Figure 29: Facebook phishing page sample.
According to PhishTank.com statistics [18], Facebook has
consistently been in the 10 top sites targeted by phishing.
From September 2009 until March 2011, 11,211 counts of                Figure 31: Security notice from a login attempt outside
phishing attempts were recorded (Figure 30).                                                Facebook.


                                                                 VIRUS BULLETIN CONFERENCE OCTOBER 2011                               7
A STUDY OF MALICIOUS ATTACKS ON FACEBOOK REVILLA



    In the example in Figure 32, the mechanisms were also able         Facebook has automated the detection of suspicious ‘like’
    to detect a suspicious phishing site that used a shortened         behaviour, which can prevent a clickjacking attack. This is
    URL. An example of a warning message is shown.                     good on some level, however, in cases where the behavioural
                                                                       pattern of a clickjacking attack changes, then chances are that
                                                                       new attacks might slip through [19].
                                                                       Facebook has also automated detection and blocking of
                                                                       suspicious content including giving warnings why certain
                                                                       content has been blocked. Using information from user
                                                                       reports and common patterns of spam and scam behaviour
                                                                       they have been able to prevent users from opening and
                                                                       accessing malicious content [20]. However, spam writers
                                                                       continually try to evade spam detection systems. For instance,
                                                                       one script included the following code:
            Figure 32: Facebook suspicious link warning.
    In some cases, Facebook security tools are able to check and
    prevent spammers and scammers from creating fake user
    accounts. Examples of some of these security checks are
    shown below:


                                                                                     Figure 36: JavaScript spam code.
                                                                       A common indicator of a spammer account is of course the
                                                                       large number of messages sent. In the code above, the
                                                                       variable nfriends is actually the number of friends the spam
                                                                       and scam messages will be sent to. Although it seems strange
                                                                       that messages are sent to only 15 of the victim’s friends (as
                                                                       opposed to all the victim’s friends), this is one way of trying
                                                                       to avoid detection based on the volume of sent messages. In
                                                                       addition, in order to avoid detection based on message
                                                                       content, the encoding of some characters of the words inside
                                                                       the message body has been altered.
                Figure 33: Account security check (1).

                                                                       Facebook apps
                                                                       As described above, malicious apps have access to the user’s
                                                                       profile information and can take control of some actions such
                                                                       as posting on walls. As of this writing, an app creator must
                                                                       first verify an account by supplying a phone number or credit
                                                                       card number. The image below shows the verification pop-up
                Figure 34: Account security check (2).                 window:




                                                                         Figure 37: Facebook verification on application creation.
                                                                       This is helpful to a degree. After supplying the information,
                                                                       an application can be created for the Facebook platform. The
                                                                       problem here is that, after the account has been verified, the
                                                                       developer can instantly publish any application without going
                                                                       through some approval from the Facebook team. Therefore,
                                                                       any malware writer can write an application on the platform
                Figure 35: Account security check (3).                 and publish it without going through any security check.

    CAPTCHA verifications are designed to prevent automation of
    account creation by non-humans. When this CAPTCHA                  Facebook security settings
    verification pops up, a user can optionally verify an account in    Facebook has enabled secure browsing by implementing
    order to avoid CAPTCHA verifications in the future. This            HTTPS on its platform. This adds protection and prevents
    verification requires a phone number. These checks are helpful,     hackers from being able to steal identity information while it
    but they open the issue of user privacy and sharing of sensitive   is in transit – especially when a user logs in from a public
    information. Security check messages may also pop up in            place such as a coffee shop or library. However, this security
    some cases of clicking the ‘Like’ button of certain group pages.   option is not enabled by default.


8   VIRUS BULLETIN CONFERENCE OCTOBER 2011
A STUDY OF MALICIOUS ATTACKS ON FACEBOOK REVILLA



                                                                   other anti-virus companies can enlighten customers about
                                                                   new threats that are found on the social network. Many of
                                                                   these blogs are very illustrative and informative, allowing
                                                                   users to easily understand, and be aware of the types of
                                                                   threats they might encounter on Facebook. These also provide
       Figure 38: Facebook HTTPS browsing setting.                 tips on strengthening security and account settings.
Another security tool is the Facebook activity monitor that
enables remote logout. A user can see the latest activities in     DEFENSIVE MEASURES
his account by checking the Account Settings which include         Facebook generally blocks known malicious content or pages
an indication that the account is active through a different       that are reported to it. Facebook reporting tools include links
location or device. The screen below shows a single account        such as ‘Mark as Spam’ and ‘Report/Block this Person’.
signed in on different computers. The user may end any active
login from a different computer or location that he is not         Another defence available to end-users is a locally installed
aware of. This is helpful in tracking if someone else is using     security product, such as URL and spam filtering software,
an account.                                                        and an anti-virus product. Anti-virus firms have also
                                                                   responded to the new threats by ensuring detection of new
                                                                   variants of Facebook worms, Oficla, and the increasing
                                                                   number of malicious scripts used for spamming. At the same
                                                                   time, security groups have created their own Facebook pages
                                                                   for users to view the latest threats including advice about how
                                                                   to remain secure and protected. Several companies have also
                                                                   released software specifically for Facebook.

                                                                   CONCLUSION
                                                                   As it has gained in popularity Facebook has also been
                                                                   increasingly used for malicious purposes, and its name,
                                                                   functionalities and features have been vastly exploited. The
                                                                   security industry is continually working to keep pace with
                                                                   new cybercriminal tricks on Facebook. In addition, Facebook
                                                                   has taken several steps to protect its users while working with
                                                                   security groups in order improve its defence systems and the
                                                                   security tools on the platform.
                                                                   As shown by the many examples above, attackers employ
                                                                   numerous social engineering tactics to help spread malware,
            Figure 39: Facebook activity monitor.                  scams and spam. Indeed, the key security problem with
                                                                   Facebook lies in the trusted nature of friend connections
Facebook security and safety page                                  which are so easy to exploit with social engineering.
Educating users about Internet safety is another important         Education of users is therefore a key part of enhancing
preventive measure – particularly since most of the attacks        Facebook security.
rely on social engineering. The Facebook security page
provides:                                                          ACKNOWLEDGEMENTS
  • Information such as how to protect a user account, and         I would like to express my sincere gratitude to Commtouch
    how to take action when an account has been                    VirusLab and to the hands of the people that God used to
    compromised and used for sending scams or spam.                make the completion of this paper possible: Robert
  • Information about the threats that a user may encounter        Sandilands, Rommel Ramos, Avi Turiel, Rebecca Herson,
    on Facebook and helpful tips to avoid scams, spams,            Catherine Lor and Jinky Suarez. And whatsoever ye do, do it
    hacks and malware that may be spreading on the                 heartily, as to the Lord, and not unto men; – Colossians 3:23.
    platform.
  • A way of reporting a possible security vulnerability           REFERENCES
    allowing Facebook to work on improving security                 [1]    http://www.socialbakers.com/Facebook-statistics/
    measures.                                                              ?interval=last-week#chart-intervals.
  • A safety page that explains Facebook as a community in          [2]    http://www.Facebook.com/press/info.php?statistics.
    which everyone has a shared responsibility of keeping it
                                                                    [3]    http://www.onlineschools.org/blog/Facebook-
    as a safe environment. This gives an insight for parents,
                                                                           obsession/.
    teens and teachers who are using Facebook and helps
    them understand the environment as well.                        [4]    http://blog.Facebook.com/blog.php?post=
                                                                           68886667130.
Security blogs                                                      [5]    http://www.kaspersky.com/news?id=207575670.
There continue to be numerous blog posts written about              [6]    Commtouch Trend Report 2010 Q4.
Facebook threats. Commtouch’s security blog and those of                   http://www.commtouch.com/download/1934.


                                                                 VIRUS BULLETIN CONFERENCE OCTOBER 2011                              9
A STUDY OF MALICIOUS ATTACKS ON FACEBOOK REVILLA



     [7]    http://blog.commtouch.com/cafe/malware/malware-
            spread-via-Facebook-chat/.
     [8]    http://nakedsecurity.sophos.com/2011/01/09/
            Facebook-photo-album-chat-messages-spreading-
            koobface-worm/.
     [9]    http://www.f-secure.com/weblog/archives/
            00001955.html.
     [10]   http://athansj.blogspot.com/2011/03/Facebook-
            likejacking-attack.html.
     [11]   http://nakedsecurity.sophos.com/2011/04/30/
            Facebook-comment-jacking-omg-i-cant-believe-
            justin-bieber-did-this-to-a-girl/.
     [12]   http://blog.commtouch.com/cafe/malware/500-free-
            credits-from-Facebook-%E2%80%93-malware/
            #disqus_thread.
     [13]   http://blog.commtouch.com/cafe/malware/
            %E2%80%9Cosama-bin-laden-dead-%E2%80%93-
            actual-video%E2%80%9D-new-Facebook-malware/.
     [14]   http://www.thenewnewinternet.com/2010/06/01/
            Facebook-used-to-find-money-mules/.
     [15]   http://blog.commtouch.com/cafe/spam-favorites/
            spammers-vote-Facebook-%E2%80%93-
            %E2%80%9Capplication-of-the-year%E2%80%9D/.
     [16]   http://blog.commtouch.com/cafe/anti-scam/harry-
            potters-magic-money-foundation-and-more/.
     [17]   http://blog.commtouch.com/cafe/phishing/avoiding-
            Facebook-phishing/.
     [18]   http://www.phishtank.com/stats.php.
     [19]   http://nakedsecurity.sophos.com/2011/03/30/
            Facebook-adds-speed-bump-to-slow-down-
            likejackers/.
     [20]   http://blog.Facebook.com/blog.
            php?post=403200567130 (spam prevention systems).
     [21]   http://www.securelist.com/en/blog/208187962/
            Facebook_money_mule_or_credit_card.
     [22]   http://en.wikipedia.org/wiki/Clickjacking.
     [23]   http://www.personalizemedia.com/the-count/.
     [24]   http://www.Facebook.com/security.
     [25]   http://www.Facebook.com/blog.php?post=
            486790652130.
     [26]   http://blog.Facebook.com/blog.php?post=
            436800707130.
     [27]   http://blog.Facebook.com/blog.php?post=
            389991097130.




10   VIRUS BULLETIN CONFERENCE OCTOBER 2011

Contenu connexe

Tendances

Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksDiane M. Metcalf
 
Content is the fuel of social web : Aol & Nielsen Online 2011
Content is the fuel of social web : Aol & Nielsen Online 2011Content is the fuel of social web : Aol & Nielsen Online 2011
Content is the fuel of social web : Aol & Nielsen Online 2011François-Yves Prigent
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptxPink Elephant
 
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...INSPIRIT BRASIL
 
1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]niniogolo
 
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldTrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldInfinigate Group
 
Melanie g done 6565
Melanie g done 6565Melanie g done 6565
Melanie g done 6565pizonaim
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.Yury Chemerkin
 
Secureview 2q 2011
Secureview 2q 2011Secureview 2q 2011
Secureview 2q 2011Felipe Prado
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risksParakum Pathirana
 

Tendances (15)

Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
ICT
ICTICT
ICT
 
Content is the fuel of social web : Aol & Nielsen Online 2011
Content is the fuel of social web : Aol & Nielsen Online 2011Content is the fuel of social web : Aol & Nielsen Online 2011
Content is the fuel of social web : Aol & Nielsen Online 2011
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
 
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
 
1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]1 empowerment technology_by_rey_anthon_&_elma_mea[1]
1 empowerment technology_by_rey_anthon_&_elma_mea[1]
 
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldTrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Melanie g done 6565
Melanie g done 6565Melanie g done 6565
Melanie g done 6565
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.
 
Computer viruses. - Free Online Library
Computer viruses. - Free Online LibraryComputer viruses. - Free Online Library
Computer viruses. - Free Online Library
 
Secureview 2q 2011
Secureview 2q 2011Secureview 2q 2011
Secureview 2q 2011
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 

En vedette

Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteCyren, Inc
 
Frappe ERPNext Open Day February 2014
Frappe ERPNext Open Day February 2014Frappe ERPNext Open Day February 2014
Frappe ERPNext Open Day February 2014rushabh_mehta
 
Fr app e detecting malicious facebook applications
Fr app e detecting malicious facebook applicationsFr app e detecting malicious facebook applications
Fr app e detecting malicious facebook applicationsPvrtechnologies Nellore
 
FRAppE Detecting Malicious Facebook Applications
FRAppE Detecting Malicious Facebook ApplicationsFRAppE Detecting Malicious Facebook Applications
FRAppE Detecting Malicious Facebook ApplicationsNagamalleswararao Tadikonda
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksCyren, Inc
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportCyren, Inc
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportCyren, Inc
 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyCyren, Inc
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareCyren, Inc
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksCyren, Inc
 
Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowCyren, Inc
 
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...
DETECTING MALICIOUS FACEBOOK APPLICATIONS  - IEEE PROJECTS IN PONDICHERRY,BUL...DETECTING MALICIOUS FACEBOOK APPLICATIONS  - IEEE PROJECTS IN PONDICHERRY,BUL...
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...Nexgen Technology
 
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatCyren, Inc
 

En vedette (19)

Android security
Android security Android security
Android security
 
Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsolete
 
Frappe ERPNext Open Day February 2014
Frappe ERPNext Open Day February 2014Frappe ERPNext Open Day February 2014
Frappe ERPNext Open Day February 2014
 
Fr app e detecting malicious facebook applications
Fr app e detecting malicious facebook applicationsFr app e detecting malicious facebook applications
Fr app e detecting malicious facebook applications
 
FRAppE Detecting Malicious Facebook Applications
FRAppE Detecting Malicious Facebook ApplicationsFRAppE Detecting Malicious Facebook Applications
FRAppE Detecting Malicious Facebook Applications
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array works
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat report
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking survey
 
Identification and Analysis of Malicious Content on Facebook: A Survey
Identification and Analysis of Malicious Content on Facebook: A SurveyIdentification and Analysis of Malicious Content on Facebook: A Survey
Identification and Analysis of Malicious Content on Facebook: A Survey
 
Final PPT
Final PPTFinal PPT
Final PPT
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomware
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacks
 
Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to know
 
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...
DETECTING MALICIOUS FACEBOOK APPLICATIONS  - IEEE PROJECTS IN PONDICHERRY,BUL...DETECTING MALICIOUS FACEBOOK APPLICATIONS  - IEEE PROJECTS IN PONDICHERRY,BUL...
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...
 
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threat
 
IEEE Presentation
IEEE PresentationIEEE Presentation
IEEE Presentation
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 

Similaire à Facebook Attacks - an in-depth analysis

Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Impulse Digital
 
Exploring machine learning techniques for fake profile detection in online so...
Exploring machine learning techniques for fake profile detection in online so...Exploring machine learning techniques for fake profile detection in online so...
Exploring machine learning techniques for fake profile detection in online so...IJECEIAES
 
Estudio Influencia Y Pasividad En Social Media
Estudio Influencia Y Pasividad En Social MediaEstudio Influencia Y Pasividad En Social Media
Estudio Influencia Y Pasividad En Social Mediaeliasvillagran
 
Selas Turkiye Influence And Passivity In Social Media Excerpted
Selas Turkiye Influence And Passivity In Social Media ExcerptedSelas Turkiye Influence And Passivity In Social Media Excerpted
Selas Turkiye Influence And Passivity In Social Media ExcerptedZiya NISANOGLU
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxOxfordRiNorth
 
Vulnerabilities and attacks targeting social networks and industrial control ...
Vulnerabilities and attacks targeting social networks and industrial control ...Vulnerabilities and attacks targeting social networks and industrial control ...
Vulnerabilities and attacks targeting social networks and industrial control ...ijcsa
 
socialmedia-egov
socialmedia-egovsocialmedia-egov
socialmedia-egovknowhowgr
 
Ibm risk management-30min
Ibm risk management-30minIbm risk management-30min
Ibm risk management-30minKim Aarenstrup
 
Signal - social media, considerations for public safety and emergency management
Signal - social media, considerations for public safety and emergency managementSignal - social media, considerations for public safety and emergency management
Signal - social media, considerations for public safety and emergency managementIntergen
 
Web 2.0/Social Networks and Security
Web 2.0/Social Networks and SecurityWeb 2.0/Social Networks and Security
Web 2.0/Social Networks and Securitysherrymoon7121
 
Slidecast ppt
Slidecast pptSlidecast ppt
Slidecast pptxinygu
 
Paths to the new journalism
Paths to the new journalismPaths to the new journalism
Paths to the new journalismJD Lasica
 
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATIONA CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATIONijasa
 
Ivp soc driven-vulnerability_02_2014_eng
Ivp soc driven-vulnerability_02_2014_engIvp soc driven-vulnerability_02_2014_eng
Ivp soc driven-vulnerability_02_2014_engpaganibr
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social TakeoverZeroFOX
 
social networking ppt by Nikita Bansode.pptx
social networking ppt by Nikita Bansode.pptxsocial networking ppt by Nikita Bansode.pptx
social networking ppt by Nikita Bansode.pptxNikki150019
 
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...Associate Professor in VSB Coimbatore
 

Similaire à Facebook Attacks - an in-depth analysis (20)

Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021
 
Exploring machine learning techniques for fake profile detection in online so...
Exploring machine learning techniques for fake profile detection in online so...Exploring machine learning techniques for fake profile detection in online so...
Exploring machine learning techniques for fake profile detection in online so...
 
Estudio Influencia Y Pasividad En Social Media
Estudio Influencia Y Pasividad En Social MediaEstudio Influencia Y Pasividad En Social Media
Estudio Influencia Y Pasividad En Social Media
 
Selas Turkiye Influence And Passivity In Social Media Excerpted
Selas Turkiye Influence And Passivity In Social Media ExcerptedSelas Turkiye Influence And Passivity In Social Media Excerpted
Selas Turkiye Influence And Passivity In Social Media Excerpted
 
L017146571
L017146571L017146571
L017146571
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
Vulnerabilities and attacks targeting social networks and industrial control ...
Vulnerabilities and attacks targeting social networks and industrial control ...Vulnerabilities and attacks targeting social networks and industrial control ...
Vulnerabilities and attacks targeting social networks and industrial control ...
 
socialmedia-egov
socialmedia-egovsocialmedia-egov
socialmedia-egov
 
Fb Another Breach In The Wall
Fb Another Breach In The WallFb Another Breach In The Wall
Fb Another Breach In The Wall
 
Ibm risk management-30min
Ibm risk management-30minIbm risk management-30min
Ibm risk management-30min
 
Signal - social media, considerations for public safety and emergency management
Signal - social media, considerations for public safety and emergency managementSignal - social media, considerations for public safety and emergency management
Signal - social media, considerations for public safety and emergency management
 
Web 2.0/Social Networks and Security
Web 2.0/Social Networks and SecurityWeb 2.0/Social Networks and Security
Web 2.0/Social Networks and Security
 
Slidecast ppt
Slidecast pptSlidecast ppt
Slidecast ppt
 
Paths to the new journalism
Paths to the new journalismPaths to the new journalism
Paths to the new journalism
 
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATIONA CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
 
Ivp soc driven-vulnerability_02_2014_eng
Ivp soc driven-vulnerability_02_2014_engIvp soc driven-vulnerability_02_2014_eng
Ivp soc driven-vulnerability_02_2014_eng
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social Takeover
 
6356152.pdf
6356152.pdf6356152.pdf
6356152.pdf
 
social networking ppt by Nikita Bansode.pptx
social networking ppt by Nikita Bansode.pptxsocial networking ppt by Nikita Bansode.pptx
social networking ppt by Nikita Bansode.pptx
 
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...
 

Plus de Cyren, Inc

Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingCyren, Inc
 
Webinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeWebinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeCyren, Inc
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseCyren, Inc
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportCyren, Inc
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityCyren, Inc
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportCyren, Inc
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareCyren, Inc
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 PresentationCyren, Inc
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookCyren, Inc
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Cyren, Inc
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Cyren, Inc
 
CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015Cyren, Inc
 
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?Cyren, Inc
 
Webinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend reportWebinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend reportCyren, Inc
 
Dual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle CybercrimeDual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle CybercrimeCyren, Inc
 
How to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourHow to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourCyren, Inc
 
Insights from CYREN's Q2 2014 Internet Threats Trend Report
Insights from CYREN's Q2 2014 Internet Threats Trend ReportInsights from CYREN's Q2 2014 Internet Threats Trend Report
Insights from CYREN's Q2 2014 Internet Threats Trend ReportCyren, Inc
 
Don't Risk the Blacklist - Stop Outbound Spam
Don't Risk the Blacklist - Stop Outbound SpamDon't Risk the Blacklist - Stop Outbound Spam
Don't Risk the Blacklist - Stop Outbound SpamCyren, Inc
 
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOURHOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOURCyren, Inc
 
Commtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-finalCommtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-finalCyren, Inc
 

Plus de Cyren, Inc (20)

Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxing
 
Webinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeWebinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrime
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud Security
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for Healthcare
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 Presentation
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
 
CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015
 
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
 
Webinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend reportWebinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend report
 
Dual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle CybercrimeDual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle Cybercrime
 
How to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourHow to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an Hour
 
Insights from CYREN's Q2 2014 Internet Threats Trend Report
Insights from CYREN's Q2 2014 Internet Threats Trend ReportInsights from CYREN's Q2 2014 Internet Threats Trend Report
Insights from CYREN's Q2 2014 Internet Threats Trend Report
 
Don't Risk the Blacklist - Stop Outbound Spam
Don't Risk the Blacklist - Stop Outbound SpamDon't Risk the Blacklist - Stop Outbound Spam
Don't Risk the Blacklist - Stop Outbound Spam
 
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOURHOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
 
Commtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-finalCommtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-final
 

Dernier

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 

Dernier (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 

Facebook Attacks - an in-depth analysis

  • 1. A STUDY OF MALICIOUS ATTACKS ON FACEBOOK Maria Patricia M. Revilla Commtouch, Philippines October 2011 Copyright is held by Virus Bulletin Ltd, but made available on this site for personal use free of charge by permission of Virus Bulletin (http://www.virusbtn.com).
  • 2. A STUDY OF MALICIOUS ATTACKS ON FACEBOOK REVILLA A STUDY OF MALICIOUS The popularity, number of subscribers, and level of activity have made Facebook an attractive tool for attackers who use ATTACKS ON FACEBOOK social engineering in order to spread malicious content or earn Maria Patricia M. Revilla money unethically. Over the years, social engineering has been Commtouch, Philippines enormously effective as it succeeds in convincing users to unknowingly act in the interests of cybercriminals. Spam and email scams have been used to deceive users, for example, Email Patriciar@commtouch.com offering seemingly legitimate employment, while putting victims to work as money mules who unwittingly help launder stolen funds. It has also been used as a tool to start and force ABSTRACT the spread of worms by including attachments disguised as normal documents. Social networking sites have, beyond doubt, made it into today’s popular culture. They have apparently become the The use of fake file icons such as those used for Windows primary resource for the masses when it comes to socializing folders, Word documents, text files, media files and others are a for the sole reason that they generally measure up to what the subtle form of social engineering, letting users think that a modern populace claim to demand – something fast, easy and malicious application is just a normal document. Instant accessible. Facebook is a perfect example. messages on Yahoo! or MSN use convincing phrases promising must-see pictures or videos to trick users into clicking malicious Facebook has become undeniably popular. With 600 million links that may point to phishing sites or rogue software. Rogue users to date, it could be considered to be the most widely software or fake anti-virus products are themselves a form of used social networking site in the last decade. People patronize social engineering. By scaring users with ‘detected’ malware, Facebook for its simple, but rather functional features, which they convince them to pay for products that they believe will range from public messaging through wall posts and private actually help them remove the ‘infection’. Sophisticated social messaging, to sharing photos, videos and URL links, to engineering attacks use emotion and human desires to trick gaming, and even marketing and advertisements. It even users. Protecting users from themselves is a tough job and it is makes a good online outlet for thoughts in the form of ‘status something that a computer cannot really do. updates’ which can be changed as often as one wishes. In 2008, the Koobface worm spread through social networks, With its popularity and effectiveness, Facebook has also including Facebook (where its name came from). It may be become a hot spot for attackers. Over the years, social considered to be one of the most successful worms as new engineering has been reported to effectively spread malicious variants are still being encountered – over 20,000 variants [4] programs which are hard to prevent, especially granted that by April 2011. Aside from the Koobface worm, there have they are designed to trick human thinking. been other forms of attacks – clickjacking, phishing, spams, This paper will seek to study the social engineering attacks scam messages, links to rogue applications, and others that that have been identified to spread malware through Facebook. help cybercriminals earn money. It is certainly alarming to see By tracking down the distribution methods/mechanisms for how these forms of attack have increased. spreading malware, and the current preventive and defensive Based on the number of active users and activities performed measures, this paper aims to give an insight into the challenges by Facebook users, it is clear that Facebook has become an that are being faced in terms of protecting users. effective social networking site with people benefiting from its integrated functionality such as photos and messaging. At the INTRODUCTION same time, attackers have successfully taken advantage of this functionality to turn Facebook into a channel for spreading Facebook has become enormously popular, reaching over 600 malicious content. Even a small percentage of compromised million users to date [1]. Users have increasingly integrated users would equal a large attack base given the number of social networks into their lives, spending a reported 700 active users on the site. billion minutes per month on Facebook [2]. Every 20 minutes approximately 24,857,000 actions are performed which may Security companies have developed tools and have improved be broken down into: scanners to detect and prevent intrusion of malicious programs. Solutions range from single file detection to generic and heuristic detections, and even cloud-based technologies. 10,208,000 comments made As these protection technologies have improved, attacks have 2,716,000 photos uploaded grown more sophisticated in an attempt to evade new and existing security measures. Attackers usually take advantage 2,716,000 messages sent of commonly used software and/or popular sites combining 1,972,000 friend requests accepted social engineering with exploits of vulnerabilities in programs like Adobe Reader or Internet Explorer. Our observation is 1,851,000 status updates that attackers have achieved the most success in bypassing 1,587,000 wall posts security measures by employing sophisticated social engineering methods. 1,484,000 event invites This paper will focus on analysing social engineering attacks 1,323,000 tagged photos on Facebook and will try to present the preventive measures 1,000,000 links shared the industry has provided to users, defensive measures/tools that are available for users, and the challenges faced in Table 1: Facebook activity statistics onlineschools.org [3]. preventing users from becoming victims. VIRUS BULLETIN CONFERENCE OCTOBER 2011 1
  • 3. A STUDY OF MALICIOUS ATTACKS ON FACEBOOK REVILLA THE PROBLEM – FACEBOOK SOCIAL itself as a photo album application. Following the link to ENGINEERING ATTACKS the fake application, the user was prompted to download the file ‘FacebookPhotos#####.exe’, which is the A trusting user in a social network environment wouldn’t malicious executable. Newer variants used different suspect that a friend (deliberately added to a friend list) would filenames such as ‘Facebook-pic[number].exe’ (e.g. send any harmful content. This trust turns a very popular and Facebook-pic000751357.exe) [8]. widely used social networking site like Facebook into a huge opportunity for attackers. Users are drawn to action by Clickjacking ‘friends’ – following a message, links, or an invite – without suspecting that this will undermine security. Another type of social engineering attack is clickjacking. This method tricks a user into allowing a malicious script or a code Worms: Koobface and Palevo to execute without his knowledge by enticing the user to click on seemingly normal objects on a web page, such as buttons, The Koobface worm has been around since 2008 [5]. It was links, or images. On the Facebook platform, attackers were first encountered through Facebook messages that enticed a able to find ways to exploit some of its functionalities such as user to view a video from a link that looked as though it came the ‘Like’, ‘Publish’, and ‘Comments’ buttons when writing from YouTube. Alluring messages like, ‘You must see it!!!...’, comments on photos, videos or links. were the first step of its social engineering tactic. Users who clicked on the link were prompted to download newer A worm that spread on Facebook through a clickjack attack versions of Adobe Flash Player – the second part of the social was successfully executed using an invisible IFrame. It engineering attack. The downloaded file ‘codecsetup.exe’ was basically exploited the ‘Publish’ button that posts a link to the actually not an Adobe Flash Player, but a malicious user’s wall. The link points to a page that contains an invisible executable. Once the executable is installed, the infected IFrame shown in the code in Figure 3 (from jsunpack.jeek.org). machine turned into a bot used for spreading more messages The user is unaware that a click anywhere on the page is with malicious links and for other malicious purposes. actually a click on the ‘Publish’ button. This results in a post Later, when users became aware of a worm that spread using on the victim’s wall, which will then be seen by the victim’s a fake YouTube-like video, a new variant was encountered friends, probably causing them to click as well, and in this which used a Blogspot link sent through messages of friends way continuing the spread of the malware. This worm was [6]. The message had the same video-related theme, but the first reported by F-Secure in May 2010 [9]. changed destination to a Blogspot link reduced the suspicion. Following this attack, a lot of other clickjack attacks followed The Blogspot pages included JavaScript redirects to pages by exploiting the famous ‘Like’ button, also known as a again requiring the installation of a so-called video playing ‘likejacking’ attack. When a user ‘likes’ a certain page, video, component (as with the initial version). As before, the ‘video photo or a website on Facebook, it enables the user to share playing component’ was in fact a malicious executable. In this this content with friends. It’s almost the same as suggesting it case, the infected machine opened new Blogspot accounts and to friends as the liked page appears on the user’s newsfeed distributed the malicious links to friends. Figures 1 and 2 causing friends to see it and probably to click it themselves. show some examples. This attack works especially well when the link has a descriptive text specially crafted to attract users, such as messages promising a ‘video of Justin Bieber’, or ‘pics of Miley Cyrus’, or any current newsworthy event [10]. An example of the actual code used for this attack is shown in Figure 4 (from pastebin.com). The code basically uses the same method as an invisible IFrame which follows the user’s mouse. Any click on the page will be a click on the ‘Like’ button, without the user’s knowledge. Figure 1: Blogspot post example (1). Another attack exploited the ‘Comment’ functionality. Once a user ‘comments’ on a photo, a video or a link on Facebook, it will appear on the user’s wall or newsfeed, causing friends to see it and, as before, probably attracting them to see and click on it as well. Here again, the messages included text with famous names such as Justin Bieber. Clicking on the link led to a page with a question and text entry box for the answer. The text box was actually a Facebook comment box which would result in the posting of a comment on the victim’s wall, or a message on the victim’s newsfeed, causing it to be shared Figure 2: Blogspot post example (2). and seen by the user’s friends. This attack was reported by Sophos in April 2011 [11]. Palevo is another worm that has been known to spread through social network chat messages or instant messages including Facebook [7]. This worm has exploited Facebook Scam and spam messages on Facebook chat and Facebook application functionality. It tried to Facebook has also become the target of scammers and spread by sending chat messages to friends and disguised spammers. Unethical and illegal advertisers have predictably 2 VIRUS BULLETIN CONFERENCE OCTOBER 2011
  • 4. A STUDY OF MALICIOUS ATTACKS ON FACEBOOK REVILLA Figure 3: Clickjack sample using IFrame tag (1). Figure 4: Clickjack sample using IFrame tag (2). taken advantage of the large number of Facebook users. One method of scam and spam has spread on Facebook through a manual cross-site scripting (XSS) attack (also called a self-XSS attack). The concept of an XSS attack is not new, but the interesting thing here is the social engineering used that convinces the user to manually enter the malicious script in the browser address bar. The topics were varied [12, 13]: • Promises of 500 free Facebook credits (something that does not exist) Figure 5: Self-XSS instruction to users (1). • An application to see who had been viewing a user profile • Video of Osama Bin Laden’s assassination. These all led to pages with instructions such as these: Just follow these 3 steps: Figure 6: Self-XSS instruction to users (2). 1. Copy this code (highlight and press CTRL-C): javascript:(a=(b=document).createElement(‘script’)). a user ends up viewing ads that are not really related to the src=’//[omitted]/f.js’,b.body.appendChild(a);void(0) subject of the link that they originally clicked. Most of these 2. Delete the actual address from the url field in focus on methods to earn easy money, earn points/credits, your browser and paste the code instead. view gossip or the latest news and events, and others. 3. Press Enter and wait for a bit, it can take up to Having hijacked the user’s Facebook session, the script also a minute to complete. sends the scam messages through almost all means of That’s it! reaching out to a victim’s friends including: chat, wall posts, If you are having trouble with these instructions, status updates, event invitations and private messages. It also try viewing the instructions here: http://[omitted]. makes use of shortened URLs in order to avoid immediate info/?sg2lq suspicion from users. it’s where I learned it Figure 7 shows an example of a fake event invitation. Notice Attackers even provided step by step image guides showing that the subject is ‘Official App: See Who has Viewed your how to perform the self-XSS attack, as shown in Figures 5 Profile? Find out here! [bad shortened link]’. Many users will and 6. notice that this doesn’t really sound like an ‘event’, but the idea is to catch the user’s attention and draw them into It is quite remarkable that there are users who fall for scams following the link. which require them to manually copy and paste code into their browser’s address bar. Once the code has been pasted as An example of spam code shown in Figure 8 illustrates how per the instructions, the user is redirected to a ‘survey page’. the messages continue to spread widely. The code uses an This is an affiliate link where rogue affiliates earn money for obfuscation technique to hide the routine using encoded bringing users to partner sites. At the end of the survey page, function calls stored in an array of variables – in this sample, VIRUS BULLETIN CONFERENCE OCTOBER 2011 3
  • 5. A STUDY OF MALICIOUS ATTACKS ON FACEBOOK REVILLA var _0xb65. Looking at the rest of the code gives us a clue as to its real purpose since it uses the XMLHttpRequest API, which is used for sending HTTP or HTTPS requests directly to a web server. Decoding the variable _0xb65 reveals what the routine is all about (Figure 9). Basically, once the script is executed, messages will be sent to the victim’s friend with texts based on the variables settings in the code as shown in the additional code below. Aside from posting a message the script will also make a comment on the posted message and will also ‘like’ the post it created (Figure 10). Figure 11 shows how the resulting post, comment and Figure 7: Fake Facebook event invitation. message will look. Figure 8: JavaScript spam code (1). Figure 9: JavaScript spam code (2). Figure 10: JavaScript spam code (3). 4 VIRUS BULLETIN CONFERENCE OCTOBER 2011
  • 6. A STUDY OF MALICIOUS ATTACKS ON FACEBOOK REVILLA Following the links leads to the sites shown in Figures 16 and 17, enticing users by promising results as well as a discount when they buy the product. Figure 11: Resulting post made by the spam code. Money-mule and credit card scams Money-mule scams have also made their way into Facebook. As with other platforms, scammers attract people with promises of easy money. Money-mule recruitment usually starts with Facebook groups (which can be started by any Figure 16: Scam post advertisement sample (1). Facebook user). These groups often attract large followings because people do not know what they are getting into [14]. Other frauds have also appeared, such as credit card scams. These start with messages designed to attract users by proposing ‘money-making jobs’, or books about ‘how to earn big money’, ‘how to win the Lotto’, or ‘guides on how to be attractive’. The example in Figures 12 and 13 shows the first part of such an attack using an ‘easy money making’ Facebook group. Some of the posts on the group’s wall are products being sold, relating to books for winning the Lotto or attracting women (Figures 14 and 15). Figure 17: Scam post advertisement sample (2). Once a user accepts the offer, the payment is made via a credit card transaction as shown in Figures 18 and 19. Figure 12: Scam group page sample (1). Figure 13: Scam group page sample (2). Figure 18: Payment scam sample (1). Figure 14: Scam post sample (1). Figure 15: Scam post sample (2). Figure 19: Payment scam sample (2). VIRUS BULLETIN CONFERENCE OCTOBER 2011 5
  • 7. A STUDY OF MALICIOUS ATTACKS ON FACEBOOK REVILLA The site ‘complaintsboard.com’ shows that the site seems to be a fraud or a scam (Figure 20). Figure 23: Facebook lottery email scam. Figure 20: Complaintsboard complaint comments. Fake email notifications – more scam, spam and malware attachments Spammers promoting pharmaceutical products have also used Facebook as an opportunity. Fake Facebook email Figure 24: Fake Facebook email password notification (1). notifications trick users into clicking links leading to online pharmacy sites [15]. An example of a fake email notification is shown in Figure 21. Figure 21: Fake Facebook email notification leading to online pharmacy site. Figure 25: Fake Facebook email password notification (2). Following the link leads to the pharmaceutical store page shown in Figure 22. Figure 22: Pharmaceutical store page. Lottery scams have also been very common, using fake email notifications describing surprise lottery wins such as the ‘Facebook Africa Jackpot Promo’ shown in Figure 23 [16]. Figure 26: Fake Facebook email password notification (3). 6 VIRUS BULLETIN CONFERENCE OCTOBER 2011
  • 8. A STUDY OF MALICIOUS ATTACKS ON FACEBOOK REVILLA The email has all the signs of an advance fee fraud scam, promising a huge sum of money, requesting detailed personal information, and requiring secrecy. Malware writers have also taken advantage of fake Facebook email notifications. Emails include subjects relating to: ‘Facebook Abuse Department’, ‘Facebook Security’, and others (Figure 24). In the examples shown in Figures 25 and 26, variants of the malware detected as Oficla (aka Bredolab) are sent as attachments with the email describing a password reset due to spam. Subjects include, ‘Spam from your account’. The attachment names include: ‘Attached_SecurityCode.exe’, Figure 30: Facebook phishing sites statistics. ‘Facebook_DOCUMENT.EXE’ and ‘Facebook_ PASSWORD.EXE’. These are all malware executables that use misleading file icons in addition to their misleading file Fake applications names. The use of trusted icons is a common social Many Facebook users enjoy Facebook applications and games engineering tactic to trick a user into executing the malware that exist within the social network such as FarmVille and file. Below are examples of the Oficla executables with CityVille, and attackers have also taken advantage of this misleading filenames and icons: functionality. The problem with applications on Facebook is that they have the ability to access some or all of the user’s profile information. Rogue applications can therefore post messages on a friend’s wall, send messages, and even extract Figure 27: Oficla attachment file (1). information from user profiles to be used for any malicious purpose. Attackers usually use catchy subjects such as: ‘who viewed your profile’. A further issue is that the verification process for application writers is relatively simple. Figure 28: Oficla attachment file (2). PREVENTIVE MEASURES Phishing Prevention is always better than cure. The trusted network Genuine Facebook user accounts are very valuable for nature of Facebook has made some cybercrime much easier. cybercriminals since they provide them with access to a On the other hand, Facebook has improved its security trusting network of friends. Facebook users have therefore measures and settings to protect its users. These measures become a natural target for phishers. Many fake pages have have included partnerships with security organizations to help been launched (fed from fake email notifications) in order to improve the site’s security tools. Although these systems are steal users’ login information. Cybercriminals can then use not perfect, they are worth noting as they do contribute to user these stolen accounts for many of the malicious purposes security. described in this paper. Attackers have become skilled at mimicking the actual Facebook login page, as in the example Spam, scam and clickjack prevention systems shown in Figure 29 [17]. Facebook has implemented security checks in order to protect users from phishing attacks. In the example below it was able to detect an attempt to log in from a page outside Facebook. When a user tries to visit a page that does not belong to Facebook, but requires a login to Facebook, the warning message below appears: Figure 29: Facebook phishing page sample. According to PhishTank.com statistics [18], Facebook has consistently been in the 10 top sites targeted by phishing. From September 2009 until March 2011, 11,211 counts of Figure 31: Security notice from a login attempt outside phishing attempts were recorded (Figure 30). Facebook. VIRUS BULLETIN CONFERENCE OCTOBER 2011 7
  • 9. A STUDY OF MALICIOUS ATTACKS ON FACEBOOK REVILLA In the example in Figure 32, the mechanisms were also able Facebook has automated the detection of suspicious ‘like’ to detect a suspicious phishing site that used a shortened behaviour, which can prevent a clickjacking attack. This is URL. An example of a warning message is shown. good on some level, however, in cases where the behavioural pattern of a clickjacking attack changes, then chances are that new attacks might slip through [19]. Facebook has also automated detection and blocking of suspicious content including giving warnings why certain content has been blocked. Using information from user reports and common patterns of spam and scam behaviour they have been able to prevent users from opening and accessing malicious content [20]. However, spam writers continually try to evade spam detection systems. For instance, one script included the following code: Figure 32: Facebook suspicious link warning. In some cases, Facebook security tools are able to check and prevent spammers and scammers from creating fake user accounts. Examples of some of these security checks are shown below: Figure 36: JavaScript spam code. A common indicator of a spammer account is of course the large number of messages sent. In the code above, the variable nfriends is actually the number of friends the spam and scam messages will be sent to. Although it seems strange that messages are sent to only 15 of the victim’s friends (as opposed to all the victim’s friends), this is one way of trying to avoid detection based on the volume of sent messages. In addition, in order to avoid detection based on message content, the encoding of some characters of the words inside the message body has been altered. Figure 33: Account security check (1). Facebook apps As described above, malicious apps have access to the user’s profile information and can take control of some actions such as posting on walls. As of this writing, an app creator must first verify an account by supplying a phone number or credit card number. The image below shows the verification pop-up Figure 34: Account security check (2). window: Figure 37: Facebook verification on application creation. This is helpful to a degree. After supplying the information, an application can be created for the Facebook platform. The problem here is that, after the account has been verified, the developer can instantly publish any application without going through some approval from the Facebook team. Therefore, any malware writer can write an application on the platform Figure 35: Account security check (3). and publish it without going through any security check. CAPTCHA verifications are designed to prevent automation of account creation by non-humans. When this CAPTCHA Facebook security settings verification pops up, a user can optionally verify an account in Facebook has enabled secure browsing by implementing order to avoid CAPTCHA verifications in the future. This HTTPS on its platform. This adds protection and prevents verification requires a phone number. These checks are helpful, hackers from being able to steal identity information while it but they open the issue of user privacy and sharing of sensitive is in transit – especially when a user logs in from a public information. Security check messages may also pop up in place such as a coffee shop or library. However, this security some cases of clicking the ‘Like’ button of certain group pages. option is not enabled by default. 8 VIRUS BULLETIN CONFERENCE OCTOBER 2011
  • 10. A STUDY OF MALICIOUS ATTACKS ON FACEBOOK REVILLA other anti-virus companies can enlighten customers about new threats that are found on the social network. Many of these blogs are very illustrative and informative, allowing users to easily understand, and be aware of the types of threats they might encounter on Facebook. These also provide Figure 38: Facebook HTTPS browsing setting. tips on strengthening security and account settings. Another security tool is the Facebook activity monitor that enables remote logout. A user can see the latest activities in DEFENSIVE MEASURES his account by checking the Account Settings which include Facebook generally blocks known malicious content or pages an indication that the account is active through a different that are reported to it. Facebook reporting tools include links location or device. The screen below shows a single account such as ‘Mark as Spam’ and ‘Report/Block this Person’. signed in on different computers. The user may end any active login from a different computer or location that he is not Another defence available to end-users is a locally installed aware of. This is helpful in tracking if someone else is using security product, such as URL and spam filtering software, an account. and an anti-virus product. Anti-virus firms have also responded to the new threats by ensuring detection of new variants of Facebook worms, Oficla, and the increasing number of malicious scripts used for spamming. At the same time, security groups have created their own Facebook pages for users to view the latest threats including advice about how to remain secure and protected. Several companies have also released software specifically for Facebook. CONCLUSION As it has gained in popularity Facebook has also been increasingly used for malicious purposes, and its name, functionalities and features have been vastly exploited. The security industry is continually working to keep pace with new cybercriminal tricks on Facebook. In addition, Facebook has taken several steps to protect its users while working with security groups in order improve its defence systems and the security tools on the platform. As shown by the many examples above, attackers employ numerous social engineering tactics to help spread malware, Figure 39: Facebook activity monitor. scams and spam. Indeed, the key security problem with Facebook lies in the trusted nature of friend connections Facebook security and safety page which are so easy to exploit with social engineering. Educating users about Internet safety is another important Education of users is therefore a key part of enhancing preventive measure – particularly since most of the attacks Facebook security. rely on social engineering. The Facebook security page provides: ACKNOWLEDGEMENTS • Information such as how to protect a user account, and I would like to express my sincere gratitude to Commtouch how to take action when an account has been VirusLab and to the hands of the people that God used to compromised and used for sending scams or spam. make the completion of this paper possible: Robert • Information about the threats that a user may encounter Sandilands, Rommel Ramos, Avi Turiel, Rebecca Herson, on Facebook and helpful tips to avoid scams, spams, Catherine Lor and Jinky Suarez. And whatsoever ye do, do it hacks and malware that may be spreading on the heartily, as to the Lord, and not unto men; – Colossians 3:23. platform. • A way of reporting a possible security vulnerability REFERENCES allowing Facebook to work on improving security [1] http://www.socialbakers.com/Facebook-statistics/ measures. ?interval=last-week#chart-intervals. • A safety page that explains Facebook as a community in [2] http://www.Facebook.com/press/info.php?statistics. which everyone has a shared responsibility of keeping it [3] http://www.onlineschools.org/blog/Facebook- as a safe environment. This gives an insight for parents, obsession/. teens and teachers who are using Facebook and helps them understand the environment as well. [4] http://blog.Facebook.com/blog.php?post= 68886667130. Security blogs [5] http://www.kaspersky.com/news?id=207575670. There continue to be numerous blog posts written about [6] Commtouch Trend Report 2010 Q4. Facebook threats. Commtouch’s security blog and those of http://www.commtouch.com/download/1934. VIRUS BULLETIN CONFERENCE OCTOBER 2011 9
  • 11. A STUDY OF MALICIOUS ATTACKS ON FACEBOOK REVILLA [7] http://blog.commtouch.com/cafe/malware/malware- spread-via-Facebook-chat/. [8] http://nakedsecurity.sophos.com/2011/01/09/ Facebook-photo-album-chat-messages-spreading- koobface-worm/. [9] http://www.f-secure.com/weblog/archives/ 00001955.html. [10] http://athansj.blogspot.com/2011/03/Facebook- likejacking-attack.html. [11] http://nakedsecurity.sophos.com/2011/04/30/ Facebook-comment-jacking-omg-i-cant-believe- justin-bieber-did-this-to-a-girl/. [12] http://blog.commtouch.com/cafe/malware/500-free- credits-from-Facebook-%E2%80%93-malware/ #disqus_thread. [13] http://blog.commtouch.com/cafe/malware/ %E2%80%9Cosama-bin-laden-dead-%E2%80%93- actual-video%E2%80%9D-new-Facebook-malware/. [14] http://www.thenewnewinternet.com/2010/06/01/ Facebook-used-to-find-money-mules/. [15] http://blog.commtouch.com/cafe/spam-favorites/ spammers-vote-Facebook-%E2%80%93- %E2%80%9Capplication-of-the-year%E2%80%9D/. [16] http://blog.commtouch.com/cafe/anti-scam/harry- potters-magic-money-foundation-and-more/. [17] http://blog.commtouch.com/cafe/phishing/avoiding- Facebook-phishing/. [18] http://www.phishtank.com/stats.php. [19] http://nakedsecurity.sophos.com/2011/03/30/ Facebook-adds-speed-bump-to-slow-down- likejackers/. [20] http://blog.Facebook.com/blog. php?post=403200567130 (spam prevention systems). [21] http://www.securelist.com/en/blog/208187962/ Facebook_money_mule_or_credit_card. [22] http://en.wikipedia.org/wiki/Clickjacking. [23] http://www.personalizemedia.com/the-count/. [24] http://www.Facebook.com/security. [25] http://www.Facebook.com/blog.php?post= 486790652130. [26] http://blog.Facebook.com/blog.php?post= 436800707130. [27] http://blog.Facebook.com/blog.php?post= 389991097130. 10 VIRUS BULLETIN CONFERENCE OCTOBER 2011