Skip to main content

Hijacking of Facebook accounts spikes in first quarte


 UPDATE: McAfee on Friday, June 6, said it made a mistake. Koobface has actually been quiet of the past three months.

Koobface, the fast-spreading Internet worm cybergangs use to hijack Facebook accounts on a massive scale, is on the move once again.
McAfee this morning released a threat reportshowing samples of Koobface spiking in the Internet wild all through the first three months of 2013.
"The resurrection of Koobface reminds us that social networks continue to present a substantial opportunity for intercepting personal information," says Vincent Weafer, senior vice president, McAfee Labs.
Meanwhile, the bad guys also are turning up the spam spigot, as activity of the equally infamous spam-spreading botnet Cutwail, also known as Pushdo, also surged in the first quarter.
After remaining more or less stable in 2012, spam levels reached the highest volume McAfee has seen in the past two years.
The rising trends are very probably related. The logons, contacts and preferences stolen from Facebook accounts feed intelligence into the cyberunderground which spammers can use to hone their spam campaigns.
For instance, they can fake Facebook postings and messages to specific individuals at targeted companies to help them gain access inside corporate networks, where they seek out and usurp privilege accounts. It's not hard to imagine a well-positioned intruder discovering ways to overcome spam filters at targeted companies.
First discovered in 2008, Koobface volume tripled in the first quarter of 2013 to levels never previously seen, Weafer says.
Koobface is a case study of how swiftly cybercriminals react to emerging trends.
Its creators initially sent Facebook users friendly messages asking them to click on a link to see a video. Doing so called up another message asking the recipient to click on an executable file — a small computer program — needed to upgrade a video player required to view the video. In a classic bait-and-switch, clicking on the file instead turned over control of the PC to the attackers.
The worm then automatically sent similar viral messages from the victim's account to his or her Facebook friends.
By clicking on the malicious file, the victim intentially chooses to run the bad code. So no actual hack of the computer's hard drive is needed.

Comments

Popular posts from this blog

Physics behind the Arc Reactor

It started with me ranting about how I should understand the physics of arc reactor more and then  Sera  needs some babel speak ideas for her Tony. I know this has been discussed deeply by most iron man fanatics before, but this is the simplified version for people who can’t be bothered to understand the big science-y words. I’m not saying that this is accurate because I’m not a nuclear engineer either, and I hope I can get some feedbacks from people who actually understand this. Since vibranium is not actually a real element, I’m focusing on the old arc reactor tech that runs on palladium. Let’s do a bit revision on fusion, yes? During nuclear fusion, light atoms combine to form heavier elements; in the process, a small fraction of mass is converted into lots of energy. Fusion reactions are called thermonuclear reactions because high temperatures are required to overcome the coloumbic repulsion between the nuclei being fused, i.e., “thermo” for the heat required and “nuc

Sixth Sense Device - Surfaceless computing

    'SixthSense' is a wearable gestural interface that augments the physical world around us with digital information and lets us use natural hand gestures to interact with that information. We've evolved over millions of years to sense the world around us. When we encounter something, someone or some place, we use our five natural senses to perceive information about it; that information helps us make decisions and chose the right actions to take. But arguably the most useful information that can help us make the right decision is not naturally perceivable with our five senses, namely the data, information and knowledge that mankind has accumulated about everything and which is increasingly all available online. Although the miniaturization of computing devices allows us to carry computers in our pockets, keeping us continually connected to the digital world, there is no link between our digital devices and our interactions with the physical world. In

New Apple 'iOS in the Car' aims for safer driving

STORY HIGHLIGHTS Apple's new operating system for mobile devices includes app for cars It is designed to make sure drivers are not distracted Look for it in 2014 in up to a dozen car brands The new operating system will come to cars where it can controlled by voice Apple's new operating system for its popular mobile devices goes well beyond iPhone and iPad. It will be showing up in new cars. It's called iOS 7 and will be available to download this fall. The new operating system features a number of design changes to the devices' interface. It also adds a new application that will let an iPhone5 display a few essential functions through a car's multimedia system. It's called "iOS in the Car." It "seamlessly integrates your iOS device — and the iOS experience — with your in-dash system. If your vehicle is equipped with iOS in the Car, you can connect your iPhone 5 and interact with it using the car's b