Attacks/Breaches
6/15/2010
01:33 PM
50%
50%

Facebook Hit With Clickjacking Attack

The social network is not doing enough to stop the worms, Sophos poll reveals.

Facebook has been hit by another clickjacking worm attack.

In the new attack, the worm updates a user's Facebook profile to indicate that they like a page called "101 Hottest Women in the World." Clicking on the link leads to a picture of actress Jessica Alba containing a clickjacking link. Other variations on the attack seen this week have offered a "free Farmville secrets e-book," a complimentary online viewing of Sex and the City 2 or the Ultimate Fight Club, as well as promises of naked celebrities.

Also known as likejacking, clickjacking attacks exploit the "like" button functionality that Facebook developed for third-party sites. The attack tricks a user into clicking the "like" button -- oftentimes by overlaying it with a fake link -- which generates a status update on the user's Facebook page, including a link to the attack.

"Presumably, somebody's making money from all this," said Richard Cohen of SophosLabs on the company's blog. "Though we still haven't seen this technique being used as an attack vector to infect users, it's still an underhanded and malicious technique, and it's driving swarms of people to pages serving up adverts."

In the wake of these new attacks, security experts renewed their call for Facebook to take a tougher approach to site security. "It's clear that Facebook needs to set up a proper early-warning system to alert users about breaking threats," said Graham Cluley, a senior technology consultant at Sophos, on the company's blog. "It seems wrong that the only place where Facebook users can read about the latest attacks is on the pages run by security vendors on Facebook, rather than Facebook's own security pages."

He also recommended that Facebook add some kind of interstitial message or pop-up to verify that users really do want to "like" something, as well as an opt-out capability. Currently, simply pressing the "like" button, even on a third-party Web site, immediately activates the feature.

"Although the attacks are yet to deliver malicious payloads, they demonstrate an exploitable weakness in the way that Facebook works, putting users at potential risk from future malware or phishing attacks," said Cluley.

Facebook users agree, according to a straw poll conducted overnight by Sophos on its Web site. Of the 600 people who responded, 95% said that Facebook wasn't doing enough to stop clickjacking worms.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0702
Published: 2015-04-20
Unrestricted file upload vulnerability in the Custom Prompts upload implementation in Cisco Unified MeetingPlace 8.6(1.9) allows remote authenticated users to execute arbitrary code by using the languageShortName parameter to upload a file that provides shell access, aka Bug ID CSCus95712.

CVE-2015-0703
Published: 2015-04-20
Cross-site scripting (XSS) vulnerability in the administrative web interface in Cisco Unified MeetingPlace 8.6(1.9) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCus95857.

CVE-2015-1235
Published: 2015-04-19
The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in the HTML parser in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy via a crafted HTML document with an IFRAME element.

CVE-2015-1236
Published: 2015-04-19
The MediaElementAudioSourceNode::process function in modules/webaudio/MediaElementAudioSourceNode.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy and obtain sensitive audio sample values via a cr...

CVE-2015-1237
Published: 2015-04-19
Use-after-free vulnerability in the RenderFrameImpl::OnMessageReceived function in content/renderer/render_frame_impl.cc in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger renderer IPC messages ...

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.