Spammers exploit second Facebook bug in a week
Facebook says it fixed flaw that let app-based worm automatically post scam messages
Computerworld - Facebook today said it has fixed the bug that allowed a spamming worm to automatically post messages to users' walls earlier this week.
The flaw was the second in the past week that let spammers flood the service with messages promoting scams.
Last week, Facebook quashed a different bug in its photo upload service that let a spammer post thousands of unwanted wall messages.
The newest worm was noticed Monday by researchers at a pair of antivirus vendors, Finland-based F-Secure and U.K.-based Sophos.
"A clever spammer has discovered a Facebook vulnerability that allows for auto-replicating links," said Sean Sullivan, an F-secure security researcher. "Until now, typical Facebook spam has required the use of some social engineering to spread."
Clicking on the link to the bogus application automatically added the app to users' profiles, then automatically reposted a status message with a new link to friends' walls, said Sophos' Graham Cluley today.
While last week's spam plugged free iPhones, this week's scam touted surveys that offered Best Buy and Walmart gift cards to consumers who completed a marketing poll.
"I thought this survey stuff was GARBAGE but I just went on a shopping spree at walmart thanks to FB," some of the spam messages read.
Facebook today said it had plugged the newest hole and cleaned up users' walls.
"Earlier this week, we discovered a bug that made it possible for an application to bypass our normal CSRF [cross-site request forgery] protections through a complicated series of steps," said a company spokesman in an e-mailed statement. "We ... fixed it within hours of discovering it [but] for a short period of time before it was fixed, several applications that violated our policies were able to post content to people's profiles if those people first clicked on a link to the application."
"This is different than the photo upload bug," said Sullivan. "But be glad it's spammers doing this and not bot generators."
If malware makers had had this bug or last week's photo upload flaw, they might have been able to use them to attack Facebook's more than 500 million users with malformed images or auto-generated links to sites hosting a wide range of browser, operating system or application exploits, said Sullivan.
While Sullivan said a recent four-month analysis he's done on Facebook spam showed that the company has done a better job at curbing what he called "feature abuse" -- bogus accounts sending massive numbers of friend requests, for instance -- it's had a tougher job quashing bugs before scammers have used them.
"Clearly, there are bugs in Facebook and its application platform," said Sullivan. "There will be more to come. I certainly don't envy [Facebook]."
Both Facebook and Sullivan gave users the same advice about dealing with spam, bug-related or not.
"We're advising people to be wary of posts and messages with suspicious-looking links, even if they come from friends, and to report applications that might violate our policies," said the Facebook spokesman.
"This should be a wake-up call for people who are clicking on links," added Sullivan. "They should be thinking, 'Maybe I don't even need to look at this [link].' It's better to be safe than sorry."
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is email@example.com.
- Facebook launches redesign with a bit of the old, a bit of the new
- Facebook eyes solar-powered drone company
- Facebook coughs up $19B for WhatsApp's younger users
- Facebook buying WhatsApp for $16 billion
- Facebook's birthday present: A look back at your social life
- At 10, Facebook strives not to be your granny's social network
- Facebook sees apps in its future ... lots of apps
- Facebook hijacks Trending feature from rival Twitter
- Facebook to kill off one kind of ad some users hated
- Facebook uses a seasoned Chef to keep servers simmering
Read more about Security in Computerworld's Security Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts