Skip to main content

Hijacking of Facebook accounts spikes in first quarte


 UPDATE: McAfee on Friday, June 6, said it made a mistake. Koobface has actually been quiet of the past three months.

Koobface, the fast-spreading Internet worm cybergangs use to hijack Facebook accounts on a massive scale, is on the move once again.
McAfee this morning released a threat reportshowing samples of Koobface spiking in the Internet wild all through the first three months of 2013.
"The resurrection of Koobface reminds us that social networks continue to present a substantial opportunity for intercepting personal information," says Vincent Weafer, senior vice president, McAfee Labs.
Meanwhile, the bad guys also are turning up the spam spigot, as activity of the equally infamous spam-spreading botnet Cutwail, also known as Pushdo, also surged in the first quarter.
After remaining more or less stable in 2012, spam levels reached the highest volume McAfee has seen in the past two years.
The rising trends are very probably related. The logons, contacts and preferences stolen from Facebook accounts feed intelligence into the cyberunderground which spammers can use to hone their spam campaigns.
For instance, they can fake Facebook postings and messages to specific individuals at targeted companies to help them gain access inside corporate networks, where they seek out and usurp privilege accounts. It's not hard to imagine a well-positioned intruder discovering ways to overcome spam filters at targeted companies.
First discovered in 2008, Koobface volume tripled in the first quarter of 2013 to levels never previously seen, Weafer says.
Koobface is a case study of how swiftly cybercriminals react to emerging trends.
Its creators initially sent Facebook users friendly messages asking them to click on a link to see a video. Doing so called up another message asking the recipient to click on an executable file — a small computer program — needed to upgrade a video player required to view the video. In a classic bait-and-switch, clicking on the file instead turned over control of the PC to the attackers.
The worm then automatically sent similar viral messages from the victim's account to his or her Facebook friends.
By clicking on the malicious file, the victim intentially chooses to run the bad code. So no actual hack of the computer's hard drive is needed.

Comments

Popular posts from this blog

Physics behind the Arc Reactor

It started with me ranting about how I should understand the physics of arc reactor more and then  Sera  needs some babel speak ideas for her Tony. I know this has been discussed deeply by most iron man fanatics before, but this is the simplified version for people who can’t be bothered to understand the big science-y words. I’m not saying that this is accurate because I’m not a nuclear engineer either, and I hope I can get some feedbacks from people who actually understand this. Since vibranium is not actually a real element, I’m focusing on the old arc reactor tech that runs on palladium. Let’s do a bit revision on fusion, yes? During nuclear fusion, light atoms combine to form heavier elements; in the process, a small fraction of mass is converted into lots of energy. Fusion reactions are called thermonuclear reactions because high temperatures are required to overcome the coloumbic repulsion between the nuclei being fused, i.e., “thermo” for the heat required...

'Drone It Yourself' Lets You Create a Drone from Any Object

Have you ever wished for a flying book? A flying keyboard? Or, perhaps, a flying bodyboard? Well, it's your lucky day, because thanks to "Drone It Yourself," you can turn pretty much any object into a quadrocopter. The drone kit, created by Dutch independent designer Jasper Van Loenen, is comprised of pieces that can be 3D printed, and then clamped to any object you so desire. All that's needed are the control unit and four propellers, and then you can make virtually anything airborne. news source

Meet DARPA's 6'2" disaster-response robot

At six-foot-two and 330 pounds, this hulking first responder has all the qualities you'd want in the field after a disaster:  strength, endurance and calm under pressure. Better yet, it has two sets of hands, 28 hydraulic joints, stereo cameras in its head and an onboard computer. The  ATLAS humanoid robot , which looks vaguely like something from the "Terminator" movies, was created by Boston Dynamics for DARPA, a research arm of the U.S. Department of Defense. It will compete in the  DARPA Robotics Challenge  (DRC), a competition that invites engineers to create a remotely controlled robot that can respond to natural or man-made disasters. The winning robot could be used in situations deemed too dangerous for humans, like the 2011 nuclear disaster at Fukushima Daiichi Nuclear Power Plant. The DRC is broken up into three challenges. The first was the Virtual Robotics Challenge, in which 26 teams controlled simulated, 3-D robots. Only seven of...