Feeds

Official: Facebook filth flood nowt to do with Fawkes virus

Ordinary indecent criminals

Providing a secure and efficient Helpdesk

Facebook has blamed a scam that tricks users into pasting rogue code into their browsers for the sudden torrent of filth in users' walls.

Users of the social network were shocked to see pornographic photoshopped images of Justin Bieber, images of an abused dog and other disturbing content on their friends' Walls as a result of the attack, which exploded late on Monday but may have actually begun some days earlier.

Although the origin or purpose of the spam attack remains unclear, Facebook is blaming a "self-XSS vulnerability" that involves tricking users into pasting rogue JavaScript into their browsers. A slightly ambiguously worded statement by the social network, quoted below, implies that the shock image outrage is purely user error rather than a flaw in the web browser software or Facebook's site.

Protecting the people who use Facebook from spam and malicious content is a top priority for us, and we are always working to improve our systems to isolate and remove material that violates our terms. Recently, we experienced a coordinated spam attack that exploited a browser vulnerability. Our efforts have drastically limited the damage caused by this attack, and we are now in the process of investigating to identify those responsible.

During this spam attack users were tricked into pasting and executing malicious javascript in their browser URL bar causing them to unknowingly share this offensive content. Our engineers have been working diligently on this self-XSS vulnerability in the browser. We've built enforcement mechanisms to quickly shut down the malicious Pages and accounts that attempt to exploit it.

We have also been putting those affected through educational checkpoints so they know how to protect themselves. We've put in place backend measures to reduce the rate of these attacks and will continue to iterate on our defences to find new ways to protect people.

One early theory suggested that the Facebook filth flood was linked to a threat last week by a purported member of Anonymous to release a “highly sophisticated” worm (dubbed the Fawkes Virus) onto Facebook. However now even the security firm that most closely tracked this possible threat, Bitdefender, is discounting this speculation.

George Petre, a senior security researcher at Bitdefender, explained that its social networks security app Safego has tackled an increasing number of threats containing porn or other shock images over the last two weeks.

"Since this outbreak followed a relatively quiet period for Facebook threats, and considering the Anonymous video, we wondered if these are related to the Fawkes virus. However, we decided not for a number of reasons: firstly it looks like other Facebook outbreaks. In addition, some of the URLs used to spread this kind of worm contained a domain name related to the idea of shopping (laptop-rental-store.info). These are ordinary scams and we believe Anonymous would use something more sophisticated," he concluded. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.