Hackers Want to Be Your (Malicious) Friend
By Jon Swartz
Once cybercrooks break into a profile, they can steal data and turn the compromised PCs of the victims into remote-controlled machines that spew more malicious software, spam and phishing attacks.
Last week, computer security firm Sophos detailed an attack in which messages posted on the walls of users’ Facebook pages urged them to view a video that claimed to be hosted on a Google website. But when the link was clicked, the victim was diverted to a website containing malware.
“It seemed like a regular message from my friend,” says Gil Demeter, 23, an analyst at an investment bank in San Francisco who is one of Facebook’s more than 80million users.
The malicious code entered his e-mail box and spread the same message to 200 of his Facebook friends. The same message was sent from the e-mail boxes of those 200 people to their friends, and so on, Demeter says.
“If you don’t have the proper virus protection, it could be a problem,” says Demeter, who contacted Facebook, which quickly changed his password.
Though Facebook promptly resolved the issue, millions of social-networking users who post and share personal information should take note. Instances of so-called malware on social-networking sites has increased sharply during the past year, based on anecdotal data, says Jeremiah Grossman, chief technology officer of WhiteHat Security.
As millions of people post and share personal information on Facebook, MySpace and other social-networking sites, computer intruders have steadily expanded their attacks from operating systems, such as Microsoft Windows, and software applications, such as Apple’s iTunes.
Last week’s attack, which spread quickly, could be a harbinger of more to come, experts say.
“Cybercrooks want a foothold on your machine,” Grossman says. “Gaining entry to your personal profile is another way.”
The changing dynamic of computer intruders has prompted security specialists at Facebook, MySpace and elsewhere to act quickly. Facebook fixed the video-inspired worm as soon as it was alerted. Max Kelly, Facebook’s security head, says less than 0.002% of people on Facebook were affected — and all were notified and advised on how to remove the malware.
“If a user sees something that doesn’t seem right, report it to us,” Kelly says.
Security researchers inform Facebook of about seven potential problems a month. Once alerted, Facebook uses high-tech tools to rid its system of bogus messages and the profiles they come from, Kelly says.
Facebook routinely posts blog items on how to avoid spam and phishing. MySpace, which was the victim of a fast-spreading worm in 2005, employs a phalanx of security technology, warning systems, educational outreach and safety tips to protect its 117million monthly active users, says Hemanshu Nigam, chief security officer.
“What is important is collaboration between tech companies, law enforcement and researchers to address the problem,” Nigam says.
That should come as some relief for frazzled corporate network administrators, many of whom say they’re concerned about security risks among workers who use social networks, according to a Symantec report to be released later this week.
Still, only about 1 in 4 administrators block social networks. Two out of three acknowledged they have no company policy on social networks, and most are not working on one.
“It’s a problem, but the solution is not straightforward,” says Kevin Haley, a director at Symantec Security Response.
“Corporations can block people from using their social networks at work, but not at home,” Haley says. “They can conceivably download malware at home, and then bring it to the office later.” (c) Copyright 2008 USA TODAY, a division of Gannett Co. Inc.