Skip to main content

Hijacking of Facebook accounts spikes in first quarte


 UPDATE: McAfee on Friday, June 6, said it made a mistake. Koobface has actually been quiet of the past three months.

Koobface, the fast-spreading Internet worm cybergangs use to hijack Facebook accounts on a massive scale, is on the move once again.
McAfee this morning released a threat reportshowing samples of Koobface spiking in the Internet wild all through the first three months of 2013.
"The resurrection of Koobface reminds us that social networks continue to present a substantial opportunity for intercepting personal information," says Vincent Weafer, senior vice president, McAfee Labs.
Meanwhile, the bad guys also are turning up the spam spigot, as activity of the equally infamous spam-spreading botnet Cutwail, also known as Pushdo, also surged in the first quarter.
After remaining more or less stable in 2012, spam levels reached the highest volume McAfee has seen in the past two years.
The rising trends are very probably related. The logons, contacts and preferences stolen from Facebook accounts feed intelligence into the cyberunderground which spammers can use to hone their spam campaigns.
For instance, they can fake Facebook postings and messages to specific individuals at targeted companies to help them gain access inside corporate networks, where they seek out and usurp privilege accounts. It's not hard to imagine a well-positioned intruder discovering ways to overcome spam filters at targeted companies.
First discovered in 2008, Koobface volume tripled in the first quarter of 2013 to levels never previously seen, Weafer says.
Koobface is a case study of how swiftly cybercriminals react to emerging trends.
Its creators initially sent Facebook users friendly messages asking them to click on a link to see a video. Doing so called up another message asking the recipient to click on an executable file — a small computer program — needed to upgrade a video player required to view the video. In a classic bait-and-switch, clicking on the file instead turned over control of the PC to the attackers.
The worm then automatically sent similar viral messages from the victim's account to his or her Facebook friends.
By clicking on the malicious file, the victim intentially chooses to run the bad code. So no actual hack of the computer's hard drive is needed.

Comments

Popular posts from this blog

Sixth Sense Device - Surfaceless computing

    'SixthSense' is a wearable gestural interface that augments the physical world around us with digital information and lets us use natural hand gestures to interact with that information. We've evolved over millions of years to sense the world around us. When we encounter something, someone or some place, we use our five natural senses to perceive information about it; that information helps us make decisions and chose the right actions to take. But arguably the most useful information that can help us make the right decision is not naturally perceivable with our five senses, namely the data, information and knowledge that mankind has accumulated about everything and which is increasingly all available online. Although the miniaturization of computing devices allows us to carry computers in our pockets, keeping us continually connected to the digital world, there is no link between our digital devices and our interactions with the physical world. In

Physics behind the Arc Reactor

It started with me ranting about how I should understand the physics of arc reactor more and then  Sera  needs some babel speak ideas for her Tony. I know this has been discussed deeply by most iron man fanatics before, but this is the simplified version for people who can’t be bothered to understand the big science-y words. I’m not saying that this is accurate because I’m not a nuclear engineer either, and I hope I can get some feedbacks from people who actually understand this. Since vibranium is not actually a real element, I’m focusing on the old arc reactor tech that runs on palladium. Let’s do a bit revision on fusion, yes? During nuclear fusion, light atoms combine to form heavier elements; in the process, a small fraction of mass is converted into lots of energy. Fusion reactions are called thermonuclear reactions because high temperatures are required to overcome the coloumbic repulsion between the nuclei being fused, i.e., “thermo” for the heat required and “nuc

Rovio unveils sequel to 'Angry Birds Star Wars'

Mobile games giant Rovio continues its descent toward the Dark Side. The company announced it will launch  Angry Birds Star Wars II , the follow-up to the popular  Angry Birds Star Wars  title. It will be available September 19 through multiple app stores. The collaboration with Star Wars has been a huge success for Rovio. The first  Angry Birds Star Wars  game notched over 100 million downloads since launching last year. Characters from the second trilogy of  Star Wars  films will appear in  Angry Birds Star Wars II , including Anakin Skywalker, Mace Windu and Darth Maul. The game also introduces Telepods, physical toys players place near the smartphone or tablet to teleport them into a game, a function similar to games such as Activision's Skylanders  franchise and the upcoming  Disney Infinity . Over 30 toys will be available when the game launches. news source