Attacks/Breaches

9/8/2016
02:30 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Crimeware-as-a-Service Hack Turns Potential Hackers Into Victims

Cybercriminals are using Google Docs to host a new Facebook scamming tool, which is designed to steal credentials from potential hackers who try to access other users' accounts.

A newly discovered crimeware service is turning potential hackers into cybercrime victims through new Facebook hacking tools hosted on Google Drive.

The cybercriminals behind the crimeware-as-a-service (CaaS) offering are using Google Drive to host tools for scamming and phishing Facebook accounts. These tools are designed to steal credentials from people who attempt to hack other users' accounts on the social network.

Several versions of these tools have been discovered on Google Drive by Blue Coat Elastica Cloud Threat Labs (BCECTL), which is now part of Symantec.

CaaS enables hackers to automate their illegal activity online. The phishing tools discovered by BCECTL are typically used to steal account information from a broad range of targets.

"When they deploy this CaaS service, it becomes very easy for users to conduct cyberattacks," explains BCECTL director Aditya Sood. Common use cases include distributing malware, stealing data, targeting specific users, and conducting social engineering attacks.

As BCECTL discovered, cybercriminals are now using Facebook hacking tools to target end-users and trick them into sharing their Facebook account credentials. However, this social engineering attack has potential criminals in mind -- the tool promises victims the opportunity to hack their friends.

It's important to note this is not a hacking tool designed to exploit Facebook flaws, but rather, is a scam being sold as a service. The process involves hackers abusing the web publishing functionality included in cloud services; in this case, that service is Google Drive.

For example, one version of the tool allows an attacker send its hacker "customer" a Google Drive link that takes them to a "Facebook Friend's Account Hacker" document. Before they can hack a friend's account, the user has to provide their Facebook login credentials.

When their account info is entered, it's sent back to the attacker-controlled domain, meaning the aspiring hacker's data has been stolen. The tool continues to trick the user into thinking it's securing access to their friend's page, but this never happens.

Hackers primarily use CaaS to make money by selling stolen credentials on the underground market, which is one goal of the Facebook hacker tool. They can also use information from compromised cloud storage accounts, or free cloud accounts, for illegal activity.

This CaaS hack is putting enterprise account holders at risk as well. Hackers can target business users, steal their online credentials, and use them to conduct other attacks in the future.

As more businesses adopt cloud services, it's an important risk to bear in mind because most people are on social media. Businesses may claim they don't allow access to social networks, but Sood notes this is unrealistic.

"We are living in a world where these social networks have become part and parcel of our lives," he emphasizes, and hackers know this. "Cybercriminals can abuse this information and other tools, and sell that access to users."

To prevent this type of attack from affecting enterprise users, Sood suggests IT managers educate their teams by sharing upcoming attack scenarios and how new attacks are being conducted. He also advises leaders to discourage employees from downloading unauthorized tools and using business accounts for personal use.

In the event an employee account is compromised and unwanted activity is detected, the first step is to contain the infection, he says. Managers should send emails to all affected users and their team members, informing them of the activity and telling them not to access the account.

Sood also stresses the importance of having a cloud security solution in place to mitigate the risk of CaaS threats. Its critical for IT managers to ensure they have full visibility into cloud apps.

Related Content:

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Elose
50%
50%
Elose,
User Rank: Apprentice
10/14/2016 | 4:54:20 AM
Re: Hacking
Thank you for this post!
I hate the bad hackers (scriptkiddies)... :/
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
9/23/2016 | 9:52:19 AM
Cyber security
Nice informative read. These kind of web vulnerabilites are on the rise these days and therefore it is essential to keep yourself secure from the perils of data hack by securing your connection. I have been securing my IP connection with vpn server, purevpn, to avoid any type of hacking attempt and secure my connection. 
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
9/23/2016 | 9:50:04 AM
Hacking
Nice iinformative read. As we all have witnessed that these shocking hacking attempts have been increasing at a rapid pace with tech users all around the world facing immense threats. Like mentioned in this artcle Google docs have been hacked of the account holders, I have also bee the victim of counterfeiting and email hacking. Therefore, it is essential to secure your IP and your online brwosing activites by deploying vpn server. I use purevpn to secure  my IP from being tracked and secure myself from hacking attempts. 
Containerized Apps: An 8-Point Security Checklist
Jai Vijayan, Freelance writer,  6/14/2018
Four Faces of Fraud: Identity, 'Fake' Identity, Ransomware & Digital
David Shefter, Chief Technology Officer at Ziften Technologies,  6/14/2018
Demystifying Mental Health in the Infosec Community
Kelly Sheridan, Staff Editor, Dark Reading,  6/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-0363
PUBLISHED: 2018-06-21
A vulnerability in the web-based management interface of Cisco Unified Communications Manager IM & Presence Service (formerly CUPS) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulne...
CVE-2018-0364
PUBLISHED: 2018-06-21
A vulnerability in the web-based management interface of Cisco Unified Communications Domain Manager could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSR...
CVE-2018-0365
PUBLISHED: 2018-06-21
A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protecti...
CVE-2018-0371
PUBLISHED: 2018-06-21
A vulnerability in the Web Admin Interface of Cisco Meeting Server could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of incoming HTTP requests. An attacker could exploit this vulnerability by sending a craf...
CVE-2018-0373
PUBLISHED: 2018-06-21
A vulnerability in vpnva-6.sys for 32-bit Windows and vpnva64-6.sys for 64-bit Windows of Cisco AnyConnect Secure Mobility Client for Windows Desktop could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected system. The vulnerability is due to improper ...