Feeds

Phantom app risk used to bait scareware trap

The non-threat with no name

The Essential Guide to IT Transformation

Scareware scammers are staking advantage of rumours about an "unnamed app" that supposedly poses a security risk to Facebook users in order to trick users into sites slinging rogue security software packages.

Searching on Google for the term "Facebook unnamed app" leads to numerous hacker-poisoned search engine results prepared for the scam, which redirect to malware distribution portals. A blog posting by Rik Ferguson of Trend Micro explains that the Facebook unnamed app security threat is just a rumour, but the threat of searching for the term is all too real.

Ferguson reckons the jury is out on whether scareware scammers created the rumour on Facebook in the first place or just latched onto it for their own benefit.

David Harley, director of malware intelligence at security firm Eset, suggests the "Unnamed App" rumour "is likely to refer to the 'Boxes' tab, which can be found on some Facebook profile pages", at least according to a discussion thread on Facebook (here).

More on the LivePcCare promoted via the scam can be found in a blog post by Panda Security here.

The latest security flap follows the pattern of an earlier September 2009 scare story about an application called Fan Check, that was also use to bait fake anti-virus traps for anyone who cared to search for more information. ®

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
Brit celebs' homes VANISH from Google's Street View
Tony Blair's digs now a Tone-y Blur
Computing student jailed after failing to hand over crypto keys
Sledgehammer once again used to crack a nut
Doctor Who season eight scripts leak online
BBC asks fans to EXTERMINATE copies before they materialise
Snowden leaks latest: NSA, FBI g-men spied on Muslim-American chiefs
US Navy veteran? Lawmaker? Academic? You're all POTENTIAL TERRORISTS
That 'wiped' Android phone you bought is stuffed with NAKED SELFIES – possibly
Infosec bods sound alarm after copping eyefuls of nudie pics
Russian MP fears US Secret Service cuffed his son for Snowden swap
Seleznev Jnr is 'prolific trafficker in stolen credit card data', it is alleged
'I don't want to go on the cart' ... OpenSSL revived with survival roadmap
Heartbleed-battered crypto library reveals long path back to health
Teensy card skimmers found in gullets of ATMs
Hi-tech fraudsters treading more softly, but gas still yielding bang for buck
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
The Power of One eBook: Top reasons to choose HP BladeSystem
Only the Power of One delivers leading infrastructure convergence, availability and scalability with federation, and agility through data center automation.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.