Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

9/8/2016
02:30 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Crimeware-as-a-Service Hack Turns Potential Hackers Into Victims

Cybercriminals are using Google Docs to host a new Facebook scamming tool, which is designed to steal credentials from potential hackers who try to access other users' accounts.

A newly discovered crimeware service is turning potential hackers into cybercrime victims through new Facebook hacking tools hosted on Google Drive.

The cybercriminals behind the crimeware-as-a-service (CaaS) offering are using Google Drive to host tools for scamming and phishing Facebook accounts. These tools are designed to steal credentials from people who attempt to hack other users' accounts on the social network.

Several versions of these tools have been discovered on Google Drive by Blue Coat Elastica Cloud Threat Labs (BCECTL), which is now part of Symantec.

CaaS enables hackers to automate their illegal activity online. The phishing tools discovered by BCECTL are typically used to steal account information from a broad range of targets.

"When they deploy this CaaS service, it becomes very easy for users to conduct cyberattacks," explains BCECTL director Aditya Sood. Common use cases include distributing malware, stealing data, targeting specific users, and conducting social engineering attacks.

As BCECTL discovered, cybercriminals are now using Facebook hacking tools to target end-users and trick them into sharing their Facebook account credentials. However, this social engineering attack has potential criminals in mind -- the tool promises victims the opportunity to hack their friends.

It's important to note this is not a hacking tool designed to exploit Facebook flaws, but rather, is a scam being sold as a service. The process involves hackers abusing the web publishing functionality included in cloud services; in this case, that service is Google Drive.

For example, one version of the tool allows an attacker send its hacker "customer" a Google Drive link that takes them to a "Facebook Friend's Account Hacker" document. Before they can hack a friend's account, the user has to provide their Facebook login credentials.

When their account info is entered, it's sent back to the attacker-controlled domain, meaning the aspiring hacker's data has been stolen. The tool continues to trick the user into thinking it's securing access to their friend's page, but this never happens.

Hackers primarily use CaaS to make money by selling stolen credentials on the underground market, which is one goal of the Facebook hacker tool. They can also use information from compromised cloud storage accounts, or free cloud accounts, for illegal activity.

This CaaS hack is putting enterprise account holders at risk as well. Hackers can target business users, steal their online credentials, and use them to conduct other attacks in the future.

As more businesses adopt cloud services, it's an important risk to bear in mind because most people are on social media. Businesses may claim they don't allow access to social networks, but Sood notes this is unrealistic.

"We are living in a world where these social networks have become part and parcel of our lives," he emphasizes, and hackers know this. "Cybercriminals can abuse this information and other tools, and sell that access to users."

To prevent this type of attack from affecting enterprise users, Sood suggests IT managers educate their teams by sharing upcoming attack scenarios and how new attacks are being conducted. He also advises leaders to discourage employees from downloading unauthorized tools and using business accounts for personal use.

In the event an employee account is compromised and unwanted activity is detected, the first step is to contain the infection, he says. Managers should send emails to all affected users and their team members, informing them of the activity and telling them not to access the account.

Sood also stresses the importance of having a cloud security solution in place to mitigate the risk of CaaS threats. Its critical for IT managers to ensure they have full visibility into cloud apps.

Related Content:

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Elose
50%
50%
Elose,
User Rank: Apprentice
10/14/2016 | 4:54:20 AM
Re: Hacking
Thank you for this post!
I hate the bad hackers (scriptkiddies)... :/
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
9/23/2016 | 9:52:19 AM
Cyber security
Nice informative read. These kind of web vulnerabilites are on the rise these days and therefore it is essential to keep yourself secure from the perils of data hack by securing your connection. I have been securing my IP connection with vpn server, purevpn, to avoid any type of hacking attempt and secure my connection. 
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
9/23/2016 | 9:50:04 AM
Hacking
Nice iinformative read. As we all have witnessed that these shocking hacking attempts have been increasing at a rapid pace with tech users all around the world facing immense threats. Like mentioned in this artcle Google docs have been hacked of the account holders, I have also bee the victim of counterfeiting and email hacking. Therefore, it is essential to secure your IP and your online brwosing activites by deploying vpn server. I use purevpn to secure  my IP from being tracked and secure myself from hacking attempts. 
RDP Bug Takes New Approach to Host Compromise
Kelly Sheridan, Staff Editor, Dark Reading,  7/18/2019
The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike
Brian Monkman, Executive Director at NetSecOPEN,  7/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10101
PUBLISHED: 2019-07-23
ServiceStack ServiceStack Framework 4.5.14 is affected by: Cross Site Scripting (XSS). The impact is: JavaScrpit is reflected in the server response, hence executed by the browser. The component is: the query used in the GET request is prone. The attack vector is: Since there is no server-side valid...
CVE-2019-10102
PUBLISHED: 2019-07-23
Voice Builder Prior to commit c145d4604df67e6fc625992412eef0bf9a85e26b and f6660e6d8f0d1d931359d591dbdec580fef36d36 is affected by: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'). The impact is: Remote code execution with the same privileges as the...
CVE-2019-10102
PUBLISHED: 2019-07-23
Jeesite 1.2.7 is affected by: SQL Injection. The impact is: sensitive information disclosure. The component is: updateProcInsIdByBusinessId() function in src/main/java/com.thinkgem.jeesite/modules/act/ActDao.java has SQL Injection vulnerability. The attack vector is: network connectivity,authenticat...
CVE-2018-18670
PUBLISHED: 2019-07-23
GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "Extra Contents" parameter, aka the adm/config_form_update.php cf_1~10 parameter.
CVE-2018-18672
PUBLISHED: 2019-07-23
GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "board head contents" parameter, aka the adm/board_form_update.php bo_content_head parameter.