Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Facebook Social Engineering Attack Strikes NATO

Top military commander in NATO targeted by attackers wielding fake Facebook pages. Some security watchers ask if Chinese culprits were involved.

Anonymous: 10 Facts About The Hacktivist Group
Anonymous: 10 Facts About The Hacktivist Group
(click image for larger view and for slideshow)
The top military commander in NATO has been targeted by attackers wielding fake Facebook pages.

Attackers have been creating Facebook pages under the name of Admiral James Stavridis, NATO's Supreme Allied Commander Europe (SACEUR), in an attempt to lure his colleagues, friends, and family into connecting with the account and divulging private information, reported The Observer newspaper in Britain on Sunday.

"There have been several fake SACEUR pages. Facebook has cooperated in taking them down… the most important thing is for Facebook to get rid of them," a NATO official told the Observer, noting that similar attacks first began about two years ago.

The fake pages are cause for concern for NATO officials, who have been turning to social media to disseminate more news relating to the alliance. In October, Stavridis used his Facebook page to announce the end of military operations in Libya. "First and foremost, we want to make sure that the public is not being misinformed. SACEUR and NATO have made significant policy announcements on either the Twitter or Facebook feed, which reflects NATO keeping pace with social media. It is important the public has trust in our social media," said the NATO official.

[ Hacktivist group leader turns informant after arrest. Read more at Hacker Sabu Worked Nonstop As Government Informer. ]

Meanwhile, Facebook Monday released a statement emphasizing that it had rapidly expunged the latest fake page targeting Stavridis. "We removed the profile for violating our terms within a business day of receiving a report," said a spokesman.

These types of social engineering attacks, which trick people into divulging useful or sensitive information, have been on the rise, not least because they're inexpensive yet often quite effective. In fact, according to a security summit hosted last year by security firm RSA, the leading advanced persistent threat (APT) attack vector is the social engineering attack.

Unfortunately, defending against these types of attacks can be quite difficult, given that it's often up to individual employees--not just automated technology defenses--to recognize the exploit for what it is. That's why many security experts recommend ongoing user training, including penetration-testing scenarios that include attempting to fool employees into divulging sensitive information.

According to a "security source" quoted by the Observer, NATO appears to be wise to these types of threats, saying that "the most senior people in NATO were warned about this kind of activity."

Who was behind the Facebook attack? That's likely impossible to say for sure, but numerous government and military officials have been increasingly blaming China for these types of attacks. Furthermore, a new report into China's online espionage capabilities prepared for the U.S.-China Economic and Security Review Commission by military contractor Northrop Grumman and released last week found that China's capabilities continue to improve, and that has not just military but also business-related repercussions. "Computer network operations have assumed a strategic significance for the Chinese leadership that moves beyond solely military applications and is being broadly applied to assist with long term strategies for China's national development," according to the report.

"The United States suffers from continual cyber operations sanctioned or tolerated by the Chinese government," commission chairman Dennis Shea said at a news conference last week, in which he detailed the report's findings.

The perceived threat from China aside, the bigger-picture perspective on these attacks--as with exploits conducted by hacktivist groups such as Anonymous--is that businesses and government agencies often aren't being hacked using state-of-the art techniques, but rather simply because they failed to patch known database vulnerabilities, or because an employee opened a suspicious attachment.

Furthermore, many organizations apparently lack the resources to detect that they were hacked, and in some cases--such as at Nortel--attackers may enjoy years of undetected network access.

"Media and industry reports portray some of the incidents attributed to China as advanced, but the reality is that many successful penetrations are 'advanced' only because the targeted organization was unable to stop them or detect the presence of the operators on their networks," said the Northrop Grumman report. "Many victim organizations, however, lack the resources to maintain a large or highly skilled information security organization to adequately defend against these adversaries."

InformationWeek is conducting a survey on information security and risk management. Upon completion of our survey, you will be eligible to enter a drawing to receive an 64-GB Apple iPad 2. Take our Alternative Strategic Security Survey now. Survey ends March 16.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Bprince
50%
50%
Bprince,
User Rank: Ninja
3/15/2012 | 1:55:01 AM
re: Facebook Social Engineering Attack Strikes NATO
@readers G does you organization have a social networking policy, and if so, how does security factor in?
Brian Prince, InformationWeek/Dark Reading Comment Moderator
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/14/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-14499
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper access control vulnerability. Successful exploitation of this vulnerability may allow an attacker to obtain all user accounts credentials.
CVE-2020-14501
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper authentication for critical function (CWE-306) issue. Successful exploitation of this vulnerability may allow an attacker to obtain the information of the user table, including the administrator credentials in plain text. An attacker may also ...
CVE-2020-14503
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper input validation vulnerability. Successful exploitation of this vulnerability could allow an attacker to remotely execute arbitrary code.
CVE-2020-14497
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, contains multiple SQL injection vulnerabilities that are vulnerable to the use of an attacker-controlled string in the construction of SQL queries. An attacker could extract user credentials, read or modify information, and remotely execute code.
CVE-2020-14505
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper neutralization of special elements used in a command (“command injection�) vulnerability. Successful exploitation of this vulnerability may allow an attacker to send a HTTP GET or POST request that create...