Attacks/Breaches
6/15/2010
01:33 PM
50%
50%

Facebook Hit With Clickjacking Attack

The social network is not doing enough to stop the worms, Sophos poll reveals.

Facebook has been hit by another clickjacking worm attack.

In the new attack, the worm updates a user's Facebook profile to indicate that they like a page called "101 Hottest Women in the World." Clicking on the link leads to a picture of actress Jessica Alba containing a clickjacking link. Other variations on the attack seen this week have offered a "free Farmville secrets e-book," a complimentary online viewing of Sex and the City 2 or the Ultimate Fight Club, as well as promises of naked celebrities.

Also known as likejacking, clickjacking attacks exploit the "like" button functionality that Facebook developed for third-party sites. The attack tricks a user into clicking the "like" button -- oftentimes by overlaying it with a fake link -- which generates a status update on the user's Facebook page, including a link to the attack.

"Presumably, somebody's making money from all this," said Richard Cohen of SophosLabs on the company's blog. "Though we still haven't seen this technique being used as an attack vector to infect users, it's still an underhanded and malicious technique, and it's driving swarms of people to pages serving up adverts."

In the wake of these new attacks, security experts renewed their call for Facebook to take a tougher approach to site security. "It's clear that Facebook needs to set up a proper early-warning system to alert users about breaking threats," said Graham Cluley, a senior technology consultant at Sophos, on the company's blog. "It seems wrong that the only place where Facebook users can read about the latest attacks is on the pages run by security vendors on Facebook, rather than Facebook's own security pages."

He also recommended that Facebook add some kind of interstitial message or pop-up to verify that users really do want to "like" something, as well as an opt-out capability. Currently, simply pressing the "like" button, even on a third-party Web site, immediately activates the feature.

"Although the attacks are yet to deliver malicious payloads, they demonstrate an exploitable weakness in the way that Facebook works, putting users at potential risk from future malware or phishing attacks," said Cluley.

Facebook users agree, according to a straw poll conducted overnight by Sophos on its Web site. Of the 600 people who responded, 95% said that Facebook wasn't doing enough to stop clickjacking worms.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8802
Published: 2015-01-23
The Pie Register plugin before 2.0.14 for WordPress does not properly restrict access to certain functions in pie-register.php, which allows remote attackers to (1) add a user by uploading a crafted CSV file or (2) activate a user account via a verifyit action.

CVE-2014-9623
Published: 2015-01-23
OpenStack Glance 2014.2.x through 2014.2.1, 2014.1.3, and earlier allows remote authenticated users to bypass the storage quote and cause a denial of service (disk consumption) by deleting an image in the saving state.

CVE-2014-9638
Published: 2015-01-23
oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a WAV file with the number of channels set to zero.

CVE-2014-9639
Published: 2015-01-23
Integer overflow in oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (crash) via a crafted number of channels in a WAV file, which triggers an out-of-bounds memory access.

CVE-2014-9640
Published: 2015-01-23
oggenc/oggenc.c in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted raw file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.