Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Facebook malware

From Wikipedia, the free encyclopedia
Malware incidents and responses on Facebook
An individual displays the "White Hat"debit card thatFacebook gives to certain researchers who reportsecurity bugs.

Thesocial media platform andsocial networking serviceFacebook has been affected multiple times over its history by intentionally harmful software. Known asmalware, these pose particular challenges both to users of the platform as well as to the personnel of thetech-company itself. Fighting the entities that create these is a topic of ongoingmalware analysis.

Types of malware and notable incidents

[edit]

Attacks known asphishing, in which an attacker pretends to be some trustworthy entity in order to solicit private information, have increased exponentially in the2010s and posed frustrating challenges. For Facebook in particular, tricks involvingURLs are common; attackers will maliciously use a similar website such ashttp://faceb0ok.com/ instead of the correcthttp://facebook.com/, for example. The 11th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), held in July 2014, issued a report condemning this as one of the "common tricks" thatmobile computing users are especially vulnerable to.[1]

In terms of applications, Facebook has also been visually copied by phishing attackers, who aim to confuse individuals into thinking that something else is the legitimate Facebooklog-in screen.[1]

In 2013, a variant of the"Dorkbot" malware caused alarm after spreading through Facebook's internal chat service.[2] With suspected efforts by cybercriminals to harvest users' passwords affecting individuals from nations such asGermany,India,Portugal, and theUnited Kingdom. Theantivirus organizationBitdefender discovered several thousand malicious links taking place in a twenty-four hour period, and contacted the Facebook administration about the problem. While the infection was contained, its unusual nature sparked interest given that the attackers exploited a flaw in the file-sharing site MediaFire to proliferate phony applications among victims'Facebook friends.[3]

The realcomputer worm "Koobface", which surfaced in 2008 via messages sent through both Facebook andMySpace, later became subject to inflated, grandiose claims about its effects and spread to the point of being aninternet hoax. Later commentary claimed a link between the malware andmessages about theBarack Obama administration that never actually existed. David Mikkelson ofSnopes.com discussed the matter in afact-checking article.[4]

On 26 July 2022, researchers atWithSecure discovered a cybercriminal operation that was targeting digital marketing and human resources professionals in an effort to hijack Facebook Business accounts using data-stealing malware. They dubbed the campaign as 'Ducktail' and found evidence to suggest that a Vietnamese threat actor has been developing and distributing the malware with motives appeared to be purely financially driven.[5]

Responses

[edit]

Individual efforts

[edit]

In the same vein as actions byGoogle andMicrosoft, the company's administration has been willing to hire "grey hat" hackers, who have acted legally ambiguously in the past, to assist them in various functions. Programmer and social activistGeorge Hotz (also known by thenickname "GeoHot") is an example.[6][7]

Bug Bounty Program

[edit]

On July 29, 2011, Facebook announced an effort called the "Bug Bounty Program" in which certain security researchers will be paid a minimum of$500 for reporting security holes on Facebook's website itself. The company'sofficial page for security researchers stated, "If you give us a reasonable time to respond to your report before making any information public and make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service during your research, we will not bring any lawsuit against you or ask law enforcement to investigate you."[8] The effort attracted notice from publications such asPC Magazine, which noted that individuals must not just be the first to report the security glitch but must also find the problem native to Facebook (rather than an entity merely associated with it such asFarmVille).[6]

Targeting of specific users

[edit]

In late 2017, Facebook systematically disabled accounts operated byNorth Koreans in response tothat government's use of state-sponsored malware attacks.Microsoft did similar actions. The North Korean government had attracted widespread condemnation in the U.S. and elsewhere for its alleged proliferation of the"WannaCry" malware. Said computer worm affected over 230,000 computers in over 150 countries throughout 2017.[9]

See also

[edit]

References

[edit]
  1. ^abDietrich, Sven, ed. (2014).Detection of Intrusions and Malware, and Vulnerability Assessment: 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014, Proceedings. Springer. pp. 79,84–85.ISBN 9783319085098.
  2. ^"Dorkbot Malware Spotted on Facebook Chat".WebTitan DNS Filter. 2013-05-14. Retrieved2021-11-21.
  3. ^Gonsalves, Antone (May 14, 2013)."Facebook attacked with credential-harvesting malware".CSOonline.com. RetrievedJanuary 10, 2018.
  4. ^Mikkelson, David (14 July 2008)."'Koobface' Virus Warning".Snopes.com. RetrievedJanuary 10, 2018.
  5. ^"A newly discovered malware hijacks Facebook Business accounts".Tech Crunch. 26 July 2022. Retrieved26 July 2022.
  6. ^abYin, Sara (August 2, 2011)."Facebook Offers $500 Bounty for Reporting Bugs: Why So Cheap".PC Magazine. RetrievedJanuary 10, 2018.
  7. ^Reisinger, Don (June 28, 2011)."Geohot now a Facebook employee".CNET. RetrievedJanuary 10, 2018.
  8. ^"Facebook: Whitehat".Facebook. RetrievedJanuary 10, 2018.
  9. ^Nakashima, Ellen; Rucker, Philip (December 19, 2017)."U.S. declares North Korea carried out massive WannaCry cyberattack".The Washington Post. RetrievedJanuary 10, 2018.
Retrieved from "https://en.wikipedia.org/w/index.php?title=Facebook_malware&oldid=1334603948"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp