Attacks/Breaches
11/17/2011
12:08 PM
Connect Directly
RSS
E-Mail
50%
50%

Facebook Porn Spam Appears Unrelated To Anonymous

Despite initial reports of a link, Facebook spam carrying pornographic images wasn't related to Fawkes, new malware supposedly developed by Anonymous, security experts say.

The torrent of Facebook spam carrying pornographic and violent images that affected many users of the social network earlier this week wasn't related to Fawkes, the new malware supposedly developed by Anonymous. In fact, Anonymous seems to have had nothing whatsoever to do with the attack, despite some security researchers initially suspecting otherwise.

"Some are experiencing an outbreak of pornography on Facebook. This is leading some to speculate that Anonymous is responsible for this, calling this outbreak the 'Fawkes Virus.' I assure you that Anonymous involvement with this is highly untrue," according to a statement released on Tuesday to Pastebin by "AnonymousWiki."

Security researchers had suspected that Anonymous might have been behind the Facebook spam since members of the hacktivist collective had recently threatened the social network. Notably, Razvan Livintz, an analyst at BitDefender, had said Friday that Anonymous has been preparing a hit on Facebook, using malware that it had developed and released in July. His observations were based in part on a video that surfaced on Anonymous Central Friday.

But, the pornographic image spam didn't fit the Anonymous modus operandi, and furthermore the outbreak didn't even appear to be new. "Over the past two weeks we've seen an increasing number of threats, based on the statistics provided by our social media security app Safego," said George Petre, head of social media research for BitDefender, via email. "Most of these threats contained porn images or shocking images."

[Learn 5 Ways Enterprises Can Stay Safer On Facebook.]

Petre was one researcher who had suspected that Anonymous might be behind the Facebook spam. "Since this outbreak followed a relatively quiet period for Facebook threats, and considering the Anonymous video, we wondered if these are related to the Fawkes virus," he told the Register.

"However, we decided 'not' for a number of reasons: firstly it looks like other Facebook outbreaks. In addition, some of the URLs used to spread this kind of worm contained a domain name related to the idea of shopping (laptop-rental-store.info). These are ordinary scams and we believe Anonymous would use something more sophisticated," he said.

Security researchers are still watching Facebook carefully for signs of Anonymous-led attacks since the Anonymous video surfaced Friday. It warned that the collective had developed a "highly sophisticated" piece of malware that they intended to target at Facebook, and which could spread via the social network by sending infected links to people's friends, which would then allow a remote administrator to control those accounts. In addition, it said that the malware could execute arbitrary code on targeted computers and retrieve data from hard drives.

Anonymous said its Fawkes virus would become the latest tool in its attack arsenal. "After the worm is under control, Anonymous will use this to its advantage against corruption and as an alternative attack toward groups who take on Anonymous," it said.

But is the Fawkes virus real or just posturing? A previous Anonymous attack campaign, "Operation Facebook," was quickly dismissed as a hoax by many Anonymous members. Notably, that campaign was to have brought Facebook to its knees by November 5, 2011, aka Guy Fawkes Night in Britain.

Likewise, supposed members of Anonymous had recently taken credit for stealing celebrities' data from CapitalOne, but CapitalOne strongly denied that any such breach had ever occurred. Another hoax involved calls for Anonymous to target the New York Stock Exchange with a distributed denial-of-service attack. But statements quickly issued via official Anonymous channels decried any such call to arms, positing that it had been the work of law enforcement agencies seeking to catch real Anonymous members. As noted by Anonymous members in a Pastebin post at the time: "You must take all notices and information claiming to be 'Anonymous' with a grain of salt."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
QQWE2085
50%
50%
QQWE2085,
User Rank: Apprentice
11/20/2011 | 12:03:21 AM
re: Facebook Porn Spam Appears Unrelated To Anonymous
Thats where your wrong at there

http://www.youtube.com/watch?v...
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0972
Published: 2014-08-01
The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write ...

CVE-2014-2627
Published: 2014-08-01
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.

CVE-2014-3009
Published: 2014-08-01
The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.0 through 11.0 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 does not properly handle FRAME elements, which makes it easier for remote authenticated users to conduct ph...

CVE-2014-3302
Published: 2014-08-01
user.php in Cisco WebEx Meetings Server 1.5(.1.131) and earlier does not properly implement the token timer for authenticated encryption, which allows remote attackers to obtain sensitive information via a crafted URL, aka Bug ID CSCuj81708.

CVE-2014-3534
Published: 2014-08-01
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a c...

Best of the Web
Dark Reading Radio