Attacks/Breaches

6/15/2010
01:33 PM
50%
50%

Facebook Hit With Clickjacking Attack

The social network is not doing enough to stop the worms, Sophos poll reveals.

Facebook has been hit by another clickjacking worm attack.

In the new attack, the worm updates a user's Facebook profile to indicate that they like a page called "101 Hottest Women in the World." Clicking on the link leads to a picture of actress Jessica Alba containing a clickjacking link. Other variations on the attack seen this week have offered a "free Farmville secrets e-book," a complimentary online viewing of Sex and the City 2 or the Ultimate Fight Club, as well as promises of naked celebrities.

Also known as likejacking, clickjacking attacks exploit the "like" button functionality that Facebook developed for third-party sites. The attack tricks a user into clicking the "like" button -- oftentimes by overlaying it with a fake link -- which generates a status update on the user's Facebook page, including a link to the attack.

"Presumably, somebody's making money from all this," said Richard Cohen of SophosLabs on the company's blog. "Though we still haven't seen this technique being used as an attack vector to infect users, it's still an underhanded and malicious technique, and it's driving swarms of people to pages serving up adverts."

In the wake of these new attacks, security experts renewed their call for Facebook to take a tougher approach to site security. "It's clear that Facebook needs to set up a proper early-warning system to alert users about breaking threats," said Graham Cluley, a senior technology consultant at Sophos, on the company's blog. "It seems wrong that the only place where Facebook users can read about the latest attacks is on the pages run by security vendors on Facebook, rather than Facebook's own security pages."

He also recommended that Facebook add some kind of interstitial message or pop-up to verify that users really do want to "like" something, as well as an opt-out capability. Currently, simply pressing the "like" button, even on a third-party Web site, immediately activates the feature.

"Although the attacks are yet to deliver malicious payloads, they demonstrate an exploitable weakness in the way that Facebook works, putting users at potential risk from future malware or phishing attacks," said Cluley.

Facebook users agree, according to a straw poll conducted overnight by Sophos on its Web site. Of the 600 people who responded, 95% said that Facebook wasn't doing enough to stop clickjacking worms.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Printers: The Weak Link in Enterprise Security
Kelly Sheridan, Associate Editor, Dark Reading,  10/16/2017
20 Questions to Ask Yourself before Giving a Security Conference Talk
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRA,  10/16/2017
Why Security Leaders Can't Afford to Be Just 'Left-Brained'
Bill Bradley, SVP, Cyber Engineering and Technical Services, CenturyLink,  10/17/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.