Phished Facebook accounts become spammer's tool
Facebook is rushing to block the spam messages
IDG News Service - Cybercriminals who went after Facebook users with a number of phishing attacks last week have now turned around and begun sending spam messages from the Facebook accounts they cracked.
Some of the spam contains "run-of-the mill" Viagra-type messages, but some of it is more dangerous, Facebook spokesman Barry Schnitt said Thursday. "Some of it points to a site where users are hit with drive-by downloads of adware," he said in an e-mail message. " We’ve started blocking all of this spam this morning, have been deleting it, and resetting the passwords of accounts that sent it."
One of those sites, mygener.im --do not visit this Web site; it will attack your computer -- is loaded with attack code that is used to install malicious programs, said Paul Ferguson, a researcher with antivirus vendor Trend Micro. The site is hosted at a Latvian data center that has been associated with other cybercriminal activity, he said. "My gut feeling is that it's the same criminal operation that was involved with the Russian Business Network," he said, alluding to an organized gang of cybercriminals based in Russia.
Attackers have also used the fbaction.net and fbstarter.com domains in their scams, Schnitt said.
Facebook's 200 million users were hit last week with several rounds of phishing attacks, which tried to trick victims into visiting phoney sites designed to look like Facebook login pages. Users who think they may have fallen victim to one of these attacks are urged to reset their account passwords.
Facebook is disabling accounts that it links to the recent spam attacks, but the company won't say how many users have been affected, because that would let the bad guys know how effective its security measures have been.
So far it looks like "a relatively small number of users" were phished, Schnitt said. "It is much smaller than previous issues like Koobface, for example," he added. Koobface was a malicious worm program that spread across Facebook last year, trying to trick victims into downloading malicious code.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts