Attacks/Breaches
6/15/2010
01:33 PM
50%
50%

Facebook Hit With Clickjacking Attack

The social network is not doing enough to stop the worms, Sophos poll reveals.

Facebook has been hit by another clickjacking worm attack.

In the new attack, the worm updates a user's Facebook profile to indicate that they like a page called "101 Hottest Women in the World." Clicking on the link leads to a picture of actress Jessica Alba containing a clickjacking link. Other variations on the attack seen this week have offered a "free Farmville secrets e-book," a complimentary online viewing of Sex and the City 2 or the Ultimate Fight Club, as well as promises of naked celebrities.

Also known as likejacking, clickjacking attacks exploit the "like" button functionality that Facebook developed for third-party sites. The attack tricks a user into clicking the "like" button -- oftentimes by overlaying it with a fake link -- which generates a status update on the user's Facebook page, including a link to the attack.

"Presumably, somebody's making money from all this," said Richard Cohen of SophosLabs on the company's blog. "Though we still haven't seen this technique being used as an attack vector to infect users, it's still an underhanded and malicious technique, and it's driving swarms of people to pages serving up adverts."

In the wake of these new attacks, security experts renewed their call for Facebook to take a tougher approach to site security. "It's clear that Facebook needs to set up a proper early-warning system to alert users about breaking threats," said Graham Cluley, a senior technology consultant at Sophos, on the company's blog. "It seems wrong that the only place where Facebook users can read about the latest attacks is on the pages run by security vendors on Facebook, rather than Facebook's own security pages."

He also recommended that Facebook add some kind of interstitial message or pop-up to verify that users really do want to "like" something, as well as an opt-out capability. Currently, simply pressing the "like" button, even on a third-party Web site, immediately activates the feature.

"Although the attacks are yet to deliver malicious payloads, they demonstrate an exploitable weakness in the way that Facebook works, putting users at potential risk from future malware or phishing attacks," said Cluley.

Facebook users agree, according to a straw poll conducted overnight by Sophos on its Web site. Of the 600 people who responded, 95% said that Facebook wasn't doing enough to stop clickjacking worms.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4467
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3, does not properly determine scrollbar boundaries during the rendering of FRAME elements, which allows remote attackers to spoof the UI via a crafted web site.

CVE-2014-4476
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulner...

CVE-2014-4477
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulner...

CVE-2014-4479
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulner...

CVE-2014-4480
Published: 2015-01-30
Directory traversal vulnerability in afc in AppleFileConduit in Apple iOS before 8.1.3 and Apple TV before 7.0.3 allows attackers to access unintended filesystem locations by creating a symlink.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.