Feeds

Social sites' insecurity increasingly worrisome

'Fertile ground for malicious coders'

5 things you didn’t know about cloud backup

It's not just MySpace that finds itself the focus of fraudsters, however.

Wikipedia, the online community encyclopedia, has also had to deal with such problems. The various Wikipedia sites that allow online users to add and edit content could open the door to potential malicious content, according to security experts.

That's almost what happened in November when a fake site masqueraded as a German version of Wikipedia hosting an entry on a variant of the MSBlast, or Blaster, computer worm. Instead, the web page attempted to compromise visitors' machines. While neither the site nor the content had been hosted on Wikimedia's servers, the phishing scam had such polish that it fooled at least one antivirus firm. The Wikimedia Foundation, the organisation that operates the Wikipedia sites, has seen the writing on the wall and taken steps to limit what users can do.

"We do not allow linking from executables," said Brad Patrick, general counsel for the Wikimedia Foundation. "The intent here is that we are always providing our readers with at least one additional step between us and any malicious content."

Even the virtual world of Second Life, which depends on user-created content to keep its economy going, has had to deal with virtual viruses, known as "grey goo."

For about about two hours on 19 November, the company that manages Second Life, Linden Lab, scrambled to contain an outbreak of Sonic the Hedgehog-esque gold rings. The objects spread within a region, slowing down the servers that maintain the Second Life world, or grid. It's the third major attack since September, each time the world has been overrun with quickly reproducing digital objects that have taken hours to clear out of the system.

Google, Wikimedia, and Linden Lab have all built defenses into their systems, and MySpace has hired former Microsoft investigator Hemanshu Nigam to beef up the social networking site's security.

"Specific to our own products and properties, including sites which host user generated content, we work constantly to prevent people from misusing our services to distribute malicious software," Barry Schnitt, spokesman for Google, stated in an email interview. "When we become aware of an instance where this happens, we take immediate action to limit user exposure."

That's good, but the companies need to attack the broad range of threats, rather than focus on, for example, child porn at the expense of malicious videos, said Websense's Hubbard.

"A lot of their security is geared towards child pornography, taking down content that they don't want on their site," Hubbard said. "They need to get more savvy and build up their security teams, because we are talking about hundreds of millions of pages changing daily."

And, at that rate, the risk will only likely increase, he said.

This article originally appeared in Security Focus.

Copyright © 2006, SecurityFocus

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.