Feeds

False Facebook charge group used to spread malware

Malware pokes outraged users

The Power of One eBook: Top reasons to choose HP BladeSystem

Updated A false rumour suggesting that Facebook is to start charging is being used to bait malware traps.

Thousands of disgruntled punters, angry at the $4.99 a month charge for using the social networking site that will supposedly kick in from June (or July, according to other false reports) have been induced to visit "protest group" sites in response to spam emails. However, in reality, there is no such plan and the protest pages often contain malware, as urban myth debunking site Snopes warns:

The protest page was a trap for the unwary; clicking on certain elements of it initiated a script that hijacked users' computers. Some of those who did venture a click had their computers taken over by a series of highly objectionable images while malware simultaneously attempted to install itself onto their computers.

Snopes published its warning on 31 December, but groups on Facebook itself protesting the supposed upcoming charges remain active almost two weeks later. A quick check on one such UK group contains no scripting unpleasantness directly, but it does link to numerous third-party sites whose provenance remains suspect. Searching for "Facebook charges July 2010" leads to fake blog entries as well as some legitimate results, evidence of an ongoing black hat SEO campaign of a type commonly used to punt rogue security scanner software over recent months.

A Facebook spokeswoman confirmed the charging rumour was false, adding that it was prepared to clamp down on groups spreading the bogus gossip about social networking fees.

We have removed the largest groups, however, we didn't find any malicious links. We take security very seriously and respond quickly to user reports of suspicious content and behaviour.

Despite Facebook's actions the rumour of supposed charges continues to circulate, creating an environment that may be abused in further black hat SEO attacks. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.