Feeds

Facebook phishers cast multiple lines

Scammers bait social networking site with hooky apps

3 Big data security analytics techniques

Miscreants have recently begun peppering Facebook with a variety of new phishing scams with sex, sex, sex and more sex featuring prominently.

One example involves a fake customer dispute application page, since pulled, that appeared to have a valid Facebook URL.

The content was actually hosted by Ripway hosting, a service that's often used and abused by script kiddies, according to Chris Boyd of IM security firm FaceTime.

Boyd told El Reg that no Facebook application was involved in the scam, just a valid Facebook app URL and the Ripway hosted scam page.

"It seems someone set up an application developer account with Facebook, placed a fake 'customer dispute page' onto their Ripway hosting, which they were somehow able to post onto their Application page and start directing Facebook users to it," Boyd added.

A write-up of the threat (now neutralised) can be found in a blog posting here.

Another Facebook phishing threat discovered over the weekend involves messages and a rogue Facebook application. The 'sex sex sex and more sex!!!' app is sending out notifications that attempt to direct prospective marks to a credential harvesting site.

Ne'er-do-wells have taken steps to disguise the location users are directed towards, explains Rik Ferguson, a security researcher at Trend Micro.

"The hyperlinks in the notification both lead to a malicious website hosted on the fucabook.com domain," Ferguson explains. "The server at fucabook.com loads up a JavaScript before immediately using HTTP meta refreshtags to pull up the real Facebook website and prompting the victim for their login credentials."

Harvesting credentials is not entirely new and often not an end in itself. Compromised accounts can be used to send spam or distribute perhaps more pernicious scams. The fact that many people use the same credentials on multiple websites opens up the means for hackers to break into webmail accounts. From there, they can find out what online banking or ecommerce accounts a prospective mark holds, before attempting to break into those accounts. ®

3 Big data security analytics techniques

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.