Skip to main content

Hijacking of Facebook accounts spikes in first quarte


 UPDATE: McAfee on Friday, June 6, said it made a mistake. Koobface has actually been quiet of the past three months.

Koobface, the fast-spreading Internet worm cybergangs use to hijack Facebook accounts on a massive scale, is on the move once again.
McAfee this morning released a threat reportshowing samples of Koobface spiking in the Internet wild all through the first three months of 2013.
"The resurrection of Koobface reminds us that social networks continue to present a substantial opportunity for intercepting personal information," says Vincent Weafer, senior vice president, McAfee Labs.
Meanwhile, the bad guys also are turning up the spam spigot, as activity of the equally infamous spam-spreading botnet Cutwail, also known as Pushdo, also surged in the first quarter.
After remaining more or less stable in 2012, spam levels reached the highest volume McAfee has seen in the past two years.
The rising trends are very probably related. The logons, contacts and preferences stolen from Facebook accounts feed intelligence into the cyberunderground which spammers can use to hone their spam campaigns.
For instance, they can fake Facebook postings and messages to specific individuals at targeted companies to help them gain access inside corporate networks, where they seek out and usurp privilege accounts. It's not hard to imagine a well-positioned intruder discovering ways to overcome spam filters at targeted companies.
First discovered in 2008, Koobface volume tripled in the first quarter of 2013 to levels never previously seen, Weafer says.
Koobface is a case study of how swiftly cybercriminals react to emerging trends.
Its creators initially sent Facebook users friendly messages asking them to click on a link to see a video. Doing so called up another message asking the recipient to click on an executable file — a small computer program — needed to upgrade a video player required to view the video. In a classic bait-and-switch, clicking on the file instead turned over control of the PC to the attackers.
The worm then automatically sent similar viral messages from the victim's account to his or her Facebook friends.
By clicking on the malicious file, the victim intentially chooses to run the bad code. So no actual hack of the computer's hard drive is needed.

Comments

Popular posts from this blog

Physics behind the Arc Reactor

It started with me ranting about how I should understand the physics of arc reactor more and then  Sera  needs some babel speak ideas for her Tony. I know this has been discussed deeply by most iron man fanatics before, but this is the simplified version for people who can’t be bothered to understand the big science-y words. I’m not saying that this is accurate because I’m not a nuclear engineer either, and I hope I can get some feedbacks from people who actually understand this. Since vibranium is not actually a real element, I’m focusing on the old arc reactor tech that runs on palladium. Let’s do a bit revision on fusion, yes? During nuclear fusion, light atoms combine to form heavier elements; in the process, a small fraction of mass is converted into lots of energy. Fusion reactions are called thermonuclear reactions because high temperatures are required to overcome the coloumbic repulsion between the nuclei being fused, i.e., “thermo” for the heat required...

5 tricks every computer user needs to know

                                                                                                                  STORY HIGHLIGHTS Pull a memory card out of a CD slot with tweezers Photo recovery programs can find hidden, deleted items on memory cards Chrome has a feature for private browsing In a perfect digital world, you could sit down at any computer or pick up any gadget and just use it. There wouldn't be a learning curve or workarounds. Unfortunately, that's never going to happen. With all due respect to the late Mr. Jobs, even Apple products don't always "just work." Little problems and annoyances will pop up when you least expect it. That's why I've rounded up these five tr...

New Apple 'iOS in the Car' aims for safer driving

STORY HIGHLIGHTS Apple's new operating system for mobile devices includes app for cars It is designed to make sure drivers are not distracted Look for it in 2014 in up to a dozen car brands The new operating system will come to cars where it can controlled by voice Apple's new operating system for its popular mobile devices goes well beyond iPhone and iPad. It will be showing up in new cars. It's called iOS 7 and will be available to download this fall. The new operating system features a number of design changes to the devices' interface. It also adds a new application that will let an iPhone5 display a few essential functions through a car's multimedia system. It's called "iOS in the Car." It "seamlessly integrates your iOS device — and the iOS experience — with your in-dash system. If your vehicle is equipped with iOS in the Car, you can connect your iPhone 5 and interact with it using the car's b...