Attacks/Breaches

9/8/2016
02:30 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Crimeware-as-a-Service Hack Turns Potential Hackers Into Victims

Cybercriminals are using Google Docs to host a new Facebook scamming tool, which is designed to steal credentials from potential hackers who try to access other users' accounts.

A newly discovered crimeware service is turning potential hackers into cybercrime victims through new Facebook hacking tools hosted on Google Drive.

The cybercriminals behind the crimeware-as-a-service (CaaS) offering are using Google Drive to host tools for scamming and phishing Facebook accounts. These tools are designed to steal credentials from people who attempt to hack other users' accounts on the social network.

Several versions of these tools have been discovered on Google Drive by Blue Coat Elastica Cloud Threat Labs (BCECTL), which is now part of Symantec.

CaaS enables hackers to automate their illegal activity online. The phishing tools discovered by BCECTL are typically used to steal account information from a broad range of targets.

"When they deploy this CaaS service, it becomes very easy for users to conduct cyberattacks," explains BCECTL director Aditya Sood. Common use cases include distributing malware, stealing data, targeting specific users, and conducting social engineering attacks.

As BCECTL discovered, cybercriminals are now using Facebook hacking tools to target end-users and trick them into sharing their Facebook account credentials. However, this social engineering attack has potential criminals in mind -- the tool promises victims the opportunity to hack their friends.

It's important to note this is not a hacking tool designed to exploit Facebook flaws, but rather, is a scam being sold as a service. The process involves hackers abusing the web publishing functionality included in cloud services; in this case, that service is Google Drive.

For example, one version of the tool allows an attacker send its hacker "customer" a Google Drive link that takes them to a "Facebook Friend's Account Hacker" document. Before they can hack a friend's account, the user has to provide their Facebook login credentials.

When their account info is entered, it's sent back to the attacker-controlled domain, meaning the aspiring hacker's data has been stolen. The tool continues to trick the user into thinking it's securing access to their friend's page, but this never happens.

Hackers primarily use CaaS to make money by selling stolen credentials on the underground market, which is one goal of the Facebook hacker tool. They can also use information from compromised cloud storage accounts, or free cloud accounts, for illegal activity.

This CaaS hack is putting enterprise account holders at risk as well. Hackers can target business users, steal their online credentials, and use them to conduct other attacks in the future.

As more businesses adopt cloud services, it's an important risk to bear in mind because most people are on social media. Businesses may claim they don't allow access to social networks, but Sood notes this is unrealistic.

"We are living in a world where these social networks have become part and parcel of our lives," he emphasizes, and hackers know this. "Cybercriminals can abuse this information and other tools, and sell that access to users."

To prevent this type of attack from affecting enterprise users, Sood suggests IT managers educate their teams by sharing upcoming attack scenarios and how new attacks are being conducted. He also advises leaders to discourage employees from downloading unauthorized tools and using business accounts for personal use.

In the event an employee account is compromised and unwanted activity is detected, the first step is to contain the infection, he says. Managers should send emails to all affected users and their team members, informing them of the activity and telling them not to access the account.

Sood also stresses the importance of having a cloud security solution in place to mitigate the risk of CaaS threats. Its critical for IT managers to ensure they have full visibility into cloud apps.

Related Content:

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Elose
50%
50%
Elose,
User Rank: Apprentice
10/14/2016 | 4:54:20 AM
Re: Hacking
Thank you for this post!
I hate the bad hackers (scriptkiddies)... :/
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
9/23/2016 | 9:52:19 AM
Cyber security
Nice informative read. These kind of web vulnerabilites are on the rise these days and therefore it is essential to keep yourself secure from the perils of data hack by securing your connection. I have been securing my IP connection with vpn server, purevpn, to avoid any type of hacking attempt and secure my connection. 
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
9/23/2016 | 9:50:04 AM
Hacking
Nice iinformative read. As we all have witnessed that these shocking hacking attempts have been increasing at a rapid pace with tech users all around the world facing immense threats. Like mentioned in this artcle Google docs have been hacked of the account holders, I have also bee the victim of counterfeiting and email hacking. Therefore, it is essential to secure your IP and your online brwosing activites by deploying vpn server. I use purevpn to secure  my IP from being tracked and secure myself from hacking attempts. 
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Why We Need a 'Cleaner Internet'
Darren Anstee, Chief Technology Officer at Arbor Networks,  4/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10008
PUBLISHED: 2019-04-24
Zoho ManageEngine ServiceDesk 9.3 allows session hijacking and privilege escalation because an established guest session is automatically converted into an established administrator session when the guest user enters the administrator username, with an arbitrary incorrect password, in an mc/ login a...
CVE-2019-9950
PUBLISHED: 2019-04-24
Western Digital My Cloud, My Cloud Mirror Gen2, My Cloud EX2 Ultra, My Cloud EX2100, My Cloud EX4100, My Cloud DL2100, My Cloud DL4100, My Cloud PR2100 and My Cloud PR4100 firmware before 2.31.174 is affected by an authentication bypass vulnerability. The login_mgr.cgi file checks credentials agains...
CVE-2019-9951
PUBLISHED: 2019-04-24
Western Digital My Cloud, My Cloud Mirror Gen2, My Cloud EX2 Ultra, My Cloud EX2100, My Cloud EX4100, My Cloud DL2100, My Cloud DL4100, My Cloud PR2100 and My Cloud PR4100 firmware before 2.31.174 is affected by an unauthenticated file upload vulnerability. The page web/jquery/uploader/uploadify.php...
CVE-2018-10055
PUBLISHED: 2019-04-24
Invalid memory access and/or a heap buffer overflow in the TensorFlow XLA compiler in Google TensorFlow before 1.7.1 could cause a crash or read from other parts of process memory via a crafted configuration file.
CVE-2018-7577
PUBLISHED: 2019-04-24
Memcpy parameter overlap in Google Snappy library 1.1.4, as used in Google TensorFlow before 1.7.1, could result in a crash or read from other parts of process memory.