Attacks/Breaches
8/18/2010
11:06 AM
50%
50%

Facebook Clickjacking Attack Spreading Through Share Button

"Funny T-Shirt Fails" scam costs victims a $5 weekly charge on their cell phone bill, finds Sophos.

Facebook users came under attack from a new clickjacking scam that could result in lost money as well as aggravation, spread by the social networking site's Share button.

The scam culminates with a list of surveys, similar to those used in a 'Dislike' button clickware scam discovered earlier this week and a Like button scam uncovered in June, according to anti-virus developer Sophos, which uncovered the con.

Those behind this latest Share button scam want Facebook users to answer a few questions within a simple survey; one blank is the request for a cell phone number. By providing their cell phone number without reading the fine print, users are subscribing to a paid-phone, automatically renewing service that charges $5 per week via the cell phone bill.

"Unfortunately, most people won't read the fine print and will willingly hand over the information and likely won't notice the charges until the end of the month," said Onur Komili, researcher at SophosLabs, Canada, in a company blog.

Facebook has removed fan pages associated with the scam, he said.

In this latest scam, Facebook account-holders see a fan page and are offered the chance to see the "Top 10 Funny T-Shirt Fails ROFL," according to anti-virus developer Sophos, which came across the clickjacking scheme today. Once unwitting Facebook users load the page, the tab grasps the malicious script from an external domain that forces users to automatically share the page on their profile, said Komili.

Those using Firefox plug-in NoScript receive a warning, cautioning them that NoScript "intercepted a mouse or keyboard interaction with a partially hidden element." At this point, users have the option to keep the element locked, which is recommended, or disregarding NoScript's recommendation and opening up the link.

However, those Facebook account-holders not running NoScript or not paying attention will find their profile pages sharing content that links them to a malicious domain, said Komili.

"Clicking the link sends you to one of many fan pages all serving the exact same content. It seems a fan page is chosen at random," he said.

Anyone victimized by this scam should select "Remove" to clear the content from their profile and help prevent the further spreading of the social networking disease, said Komili.

Sophos was in the process of publishing detection of this so-called Sharejacking threat as a Troj/FBJack-A and its software is blocking the domain that hosts the malicious code, he said.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-4293
Published: 2015-07-30
The packet-reassembly implementation in Cisco IOS XE 3.13S and earlier allows remote attackers to cause a denial of service (CPU consumption or packet loss) via fragmented (1) IPv4 or (2) IPv6 packets that trigger ATTN-3-SYNC_TIMEOUT errors after reassembly failures, aka Bug ID CSCuo37957.

CVE-2014-7912
Published: 2015-07-29
The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory c...

CVE-2014-7913
Published: 2015-07-29
The print_option function in dhcp-common.c in dhcpcd through 6.9.1, as used in dhcp.c in dhcpcd 5.x in Android before 5.1 and other products, misinterprets the return value of the snprintf function, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corru...

CVE-2015-2977
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to create arbitrary files, and consequently execute arbitrary code, via unspecified vectors.

CVE-2015-2978
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to bypass authentication and complete a conference-room reservation via unspecified vectors, as demonstrated by an "unintentional reservation."

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!