Attacks/Breaches
11/17/2011
12:08 PM
50%
50%

Facebook Porn Spam Appears Unrelated To Anonymous

Despite initial reports of a link, Facebook spam carrying pornographic images wasn't related to Fawkes, new malware supposedly developed by Anonymous, security experts say.

The torrent of Facebook spam carrying pornographic and violent images that affected many users of the social network earlier this week wasn't related to Fawkes, the new malware supposedly developed by Anonymous. In fact, Anonymous seems to have had nothing whatsoever to do with the attack, despite some security researchers initially suspecting otherwise.

"Some are experiencing an outbreak of pornography on Facebook. This is leading some to speculate that Anonymous is responsible for this, calling this outbreak the 'Fawkes Virus.' I assure you that Anonymous involvement with this is highly untrue," according to a statement released on Tuesday to Pastebin by "AnonymousWiki."

Security researchers had suspected that Anonymous might have been behind the Facebook spam since members of the hacktivist collective had recently threatened the social network. Notably, Razvan Livintz, an analyst at BitDefender, had said Friday that Anonymous has been preparing a hit on Facebook, using malware that it had developed and released in July. His observations were based in part on a video that surfaced on Anonymous Central Friday.

But, the pornographic image spam didn't fit the Anonymous modus operandi, and furthermore the outbreak didn't even appear to be new. "Over the past two weeks we've seen an increasing number of threats, based on the statistics provided by our social media security app Safego," said George Petre, head of social media research for BitDefender, via email. "Most of these threats contained porn images or shocking images."

[Learn 5 Ways Enterprises Can Stay Safer On Facebook.]

Petre was one researcher who had suspected that Anonymous might be behind the Facebook spam. "Since this outbreak followed a relatively quiet period for Facebook threats, and considering the Anonymous video, we wondered if these are related to the Fawkes virus," he told the Register.

"However, we decided 'not' for a number of reasons: firstly it looks like other Facebook outbreaks. In addition, some of the URLs used to spread this kind of worm contained a domain name related to the idea of shopping (laptop-rental-store.info). These are ordinary scams and we believe Anonymous would use something more sophisticated," he said.

Security researchers are still watching Facebook carefully for signs of Anonymous-led attacks since the Anonymous video surfaced Friday. It warned that the collective had developed a "highly sophisticated" piece of malware that they intended to target at Facebook, and which could spread via the social network by sending infected links to people's friends, which would then allow a remote administrator to control those accounts. In addition, it said that the malware could execute arbitrary code on targeted computers and retrieve data from hard drives.

Anonymous said its Fawkes virus would become the latest tool in its attack arsenal. "After the worm is under control, Anonymous will use this to its advantage against corruption and as an alternative attack toward groups who take on Anonymous," it said.

But is the Fawkes virus real or just posturing? A previous Anonymous attack campaign, "Operation Facebook," was quickly dismissed as a hoax by many Anonymous members. Notably, that campaign was to have brought Facebook to its knees by November 5, 2011, aka Guy Fawkes Night in Britain.

Likewise, supposed members of Anonymous had recently taken credit for stealing celebrities' data from CapitalOne, but CapitalOne strongly denied that any such breach had ever occurred. Another hoax involved calls for Anonymous to target the New York Stock Exchange with a distributed denial-of-service attack. But statements quickly issued via official Anonymous channels decried any such call to arms, positing that it had been the work of law enforcement agencies seeking to catch real Anonymous members. As noted by Anonymous members in a Pastebin post at the time: "You must take all notices and information claiming to be 'Anonymous' with a grain of salt."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
QQWE2085
50%
50%
QQWE2085,
User Rank: Apprentice
11/20/2011 | 12:03:21 AM
re: Facebook Porn Spam Appears Unrelated To Anonymous
Thats where your wrong at there

http://www.youtube.com/watch?v...
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5208
Published: 2014-12-22
BKBCopyD.exe in the Batch Management Packages in Yokogawa CENTUM CS 3000 through R3.09.50 and CENTUM VP through R4.03.00 and R5.x through R5.04.00, and Exaopc through R3.72.10, does not require authentication, which allows remote attackers to read arbitrary files via a RETR operation, write to arbit...

CVE-2014-7286
Published: 2014-12-22
Buffer overflow in AClient in Symantec Deployment Solution 6.9 and earlier on Windows XP and Server 2003 allows local users to gain privileges via unspecified vectors.

CVE-2014-8015
Published: 2014-12-22
The Sponsor Portal in Cisco Identity Services Engine (ISE) allows remote authenticated users to obtain access to an arbitrary sponsor's guest account via a modified HTTP request, aka Bug ID CSCur64400.

CVE-2014-8017
Published: 2014-12-22
The periodic-backup feature in Cisco Identity Services Engine (ISE) allows remote attackers to discover backup-encryption passwords via a crafted request that triggers inclusion of a password in a reply, aka Bug ID CSCur41673.

CVE-2014-8018
Published: 2014-12-22
Multiple cross-site scripting (XSS) vulnerabilities in Business Voice Services Manager (BVSM) pages in the Application Software in Cisco Unified Communications Domain Manager 8 allow remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug IDs CSCur19651, CSCur18555, CSCur1...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.