Vulnerabilities / Threats

11/20/2012
01:00 PM
50%
50%

Facebook Gift Scams: How They Work

Beware complex scams that promote Costco, Starbucks vouchers, while making it tough for authorities to track down perpetrators.

Beware of a gift scam that promises to reward a limited number of respondents with a $400 voucher to Australian retailer Woolworths. The scam typically circulates via Facebook, after a user shares a link to a "Get a Free $400 Woolworths Voucher Now" page with their Facebook friends.

Interestingly, clicking on the included link -- woolworthsfree.net -- dumps most people onto a Google search page, with no further offers being forthcoming.

According to Australia-based software architect Troy Hunt, that's because the scam uses JavaScript to identify the country that a user is located in, and then discards anyone who's not located in Australia, Albania, Canada, New Zealand or South Africa. Sister scams operating in other countries, meanwhile, include one that targets Costco users in the United States with vouchers and another that offers a $100 "free Starbucks Christmas voucher."

Don't feel left out if you can't click through; attackers are just trying to increase their odds of success. "One thing this scam does right up front is detects your location and determines whether you're likely to be sucked in by a Woolies scam or not," said Hunt in a blog post that analyzes how these scams work, as well as what the criminals behind them are seeking.

[ Learn more about Facebook security. See Facebook Adopts Secure Web Pages By Default. ]

Of course, criminals continue to launch scams -- such as cold-calling consumers and selling them fake antivirus -- because they work. "Recently I wrote about the mechanics of another Facebook scam where the 'bait' was photos of a salacious school girl. Many people -- including female friends and my mother in law -- readily fell for that one," said Hunt.

But even in countries where people can click on the Woolworths scam, the actual "conversion rate" for criminals -- meaning, the number of people who fall victim to the scam -- is likely scant. "Yes, spam and other nasties 'work' but it's really only a very small percentage of them," said Hunt. "When the king of Nigeria dies and bequeaths you $50M but only if you can help his grieving widow shift it out of the country, there's this very, very small segment of the community which actually says 'Hey, I could be onto something here.'"

To help make scam conversion rates more successful, criminals up the ante by employing a variety of social engineering techniques, such as adding a sense of urgency to their messages, including offering a supposedly limited number of free vouchers. The scam Woolworths website page also includes fake Facebook posts with kudos from two users, which appear to have been posted within the last few minutes, as well as a note at the bottom, next to a Facebook "like" button, that says over 6 million people have "liked" the page.

Meanwhile, a script on the website page counts down the number of vouchers still remaining, apparently as other consumers are snapping them up. "Every half a second the script generates a random number that is between 0 and 5," said Hunt. "If the generated number is between 1 and 2 then the number of remaining vouchers is decremented by 1. What it means is that the rate of other people snapping up vouchers doesn't appear to be constant, which adds to the believability of the whole scam."

Ultimately, how do people fall victim to the scam? To obtain a voucher, people first need to post to a fake "Share on Facebook" link, which triggers a pop-up window that's generated using a one-time link, which allows the attackers to gauge their click-through rates. Hunt said this technique "isn't that unusual for a legitimate site as it's a means of tracking how many click-throughs come from a particular 'share,' it's just a little unusual to see it in a scam." Second, users must click on the fake "Like" button at the bottom of the page, which then may trigger one of a variety of different actions, based on the user's location, but ultimately, a variety of page redirects take users to the aldaniti.net website, "where you can go off and win a shiny new Apple toy," said Hunt. In other words, the promise of one freebie leads to a website ostensibly offering even more freebies.

Regardless, clicking on a button to enter any of the competitions offered pops up a box requesting a user's name, date of birth as well as full contact details. "Or in other words, a healthy starting point for identity theft," said Hunt. Meanwhile, filling in one information-request box can beget unending other requests for information via the same site, or sister sites.

Ultimately, Hunt said all of the websites involved appear to track back to a user named "James Smith" who's based in Albania, but using a server based in Germany. "The geographic distribution is one of the reasons why these scams are so hard for authorities to get on top of," Hunt said. "People in Australia being scammed by a guy in Albania using a server hosted in Germany. Who do the cops speak to?"

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mathew
50%
50%
Mathew,
User Rank: Apprentice
11/26/2012 | 10:10:17 AM
re: Facebook Gift Scams: How They Work
Great question. Yes, Woolworths is gone in the U.S., but the brand lives elsewhere. This particular attack was detailed by a security expert based in Australia, which still has Woolworths. But the exploit in question assesses the user's location, then feeds--or doesn't feed--them the scam. American versions of the scam, meanwhile, include a Costco voucher.
Deb Donston-Miller
50%
50%
Deb Donston-Miller,
User Rank: Apprentice
11/23/2012 | 10:41:10 PM
re: Facebook Gift Scams: How They Work
Are there any Woolworth's left in the U.S.? Was that another way of weeding people out? (That is, people in the U.S. likely wouldn't click through in the first place?)

Deb Donston-Miller
Contributing Editor, The BrainYard
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12716
PUBLISHED: 2018-06-25
The API service on Google Home and Chromecast devices before mid-July 2018 does not prevent DNS rebinding attacks from reading the scan_results JSON data, which allows remote attackers to determine the physical location of most web browsers by leveraging the presence of one of these devices on its l...
CVE-2018-12705
PUBLISHED: 2018-06-24
DIGISOL DG-BR4000NG devices have XSS via the SSID (it is validated only on the client side).
CVE-2018-12706
PUBLISHED: 2018-06-24
DIGISOL DG-BR4000NG devices have a Buffer Overflow via a long Authorization HTTP header.
CVE-2018-12714
PUBLISHED: 2018-06-24
An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial o...
CVE-2018-12713
PUBLISHED: 2018-06-24
GIMP through 2.10.2 makes g_get_tmp_dir calls to establish temporary filenames, which may result in a filename that already exists, as demonstrated by the gimp_write_and_read_file function in app/tests/test-xcf.c. This might be leveraged by attackers to overwrite files or read file content that was ...