Attacks/Breaches
8/18/2010
11:06 AM
50%
50%

Facebook Clickjacking Attack Spreading Through Share Button

"Funny T-Shirt Fails" scam costs victims a $5 weekly charge on their cell phone bill, finds Sophos.

Facebook users came under attack from a new clickjacking scam that could result in lost money as well as aggravation, spread by the social networking site's Share button.

The scam culminates with a list of surveys, similar to those used in a 'Dislike' button clickware scam discovered earlier this week and a Like button scam uncovered in June, according to anti-virus developer Sophos, which uncovered the con.

Those behind this latest Share button scam want Facebook users to answer a few questions within a simple survey; one blank is the request for a cell phone number. By providing their cell phone number without reading the fine print, users are subscribing to a paid-phone, automatically renewing service that charges $5 per week via the cell phone bill.

"Unfortunately, most people won't read the fine print and will willingly hand over the information and likely won't notice the charges until the end of the month," said Onur Komili, researcher at SophosLabs, Canada, in a company blog.

Facebook has removed fan pages associated with the scam, he said.

In this latest scam, Facebook account-holders see a fan page and are offered the chance to see the "Top 10 Funny T-Shirt Fails ROFL," according to anti-virus developer Sophos, which came across the clickjacking scheme today. Once unwitting Facebook users load the page, the tab grasps the malicious script from an external domain that forces users to automatically share the page on their profile, said Komili.

Those using Firefox plug-in NoScript receive a warning, cautioning them that NoScript "intercepted a mouse or keyboard interaction with a partially hidden element." At this point, users have the option to keep the element locked, which is recommended, or disregarding NoScript's recommendation and opening up the link.

However, those Facebook account-holders not running NoScript or not paying attention will find their profile pages sharing content that links them to a malicious domain, said Komili.

"Clicking the link sends you to one of many fan pages all serving the exact same content. It seems a fan page is chosen at random," he said.

Anyone victimized by this scam should select "Remove" to clear the content from their profile and help prevent the further spreading of the social networking disease, said Komili.

Sophos was in the process of publishing detection of this so-called Sharejacking threat as a Troj/FBJack-A and its software is blocking the domain that hosts the malicious code, he said.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7896
Published: 2015-03-03
Multiple cross-site scripting (XSS) vulnerabilities in HP XP P9000 Command View Advanced Edition Software Online Help, as used in HP Device Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Tiered Storage Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Replication Manager 6.x and 7.x before ...

CVE-2014-9283
Published: 2015-03-03
The BestWebSoft Captcha plugin before 4.0.7 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

CVE-2014-9683
Published: 2015-03-03
Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.

CVE-2015-0890
Published: 2015-03-03
The BestWebSoft Google Captcha (aka reCAPTCHA) plugin before 1.13 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

CVE-2015-2168
Published: 2015-03-03
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue in customer-controlled software. Notes: none.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.