Criminals are increasingly using domain names that include words like Facebook, MySpace and Twitter, with no official connection to the real sites, to trick unsuspecting visitors to visit fake Web sites and lure them to input sensitive information or download malicious code. In fact, Websense Security Labs research indicates that in a research sample taken from the Websense URL database, more than 200,000 phony copycat sites were found, all using the terms Facebook, MySpace or Twitter in their URLs. Examples similar to samples found include, unblock.facebookproxy.com, buy.viagra.twitter.1234.com or hotbabesofmyspace999.com (note these are just sample site names that are similar to the sites researchers found).
Further research shows that the hackers are taking steps to create these cloned domains to circumvent security measures put in place by organizations to filter the original domain in a business setting. Many of the domains are proxy avoidance sites which are used to try to evade traditional Web filtering technology.
Taking advantage of the huge increase of social networking-savvy "Millennial" users entering the workforce, and the 276 percent growth of Facebook use among the 35-54 year old segment over the past six months, Facebook was the most popular domain used to dupe users, with more than 150,000 known fake URLs charted during the research period.
"These new threats illustrate that attackers will continue to target Facebook, MySpace and Twitter, along with other social networking sites, for three reasons," said Charles Renert, senior director, advanced content research, Websense. "First, these Web sites are popular so fraudsters are able to target lots of victims; second, people trust the content on it because they think it's from other people in their network; and third, they are easy to compromise because they allow anybody to create and post content. Traditional Web filtering is not enough to protect users from threats on trusted sites, and isn't enough to keep up with fraudsters generating new URLs almost instantaneously to avoid detection. Only real-time analysis of Web content can prevent users from being exploited by these attacks."
This isn't the first time Facebook users have been targeted by hackers. In late April, Websense Security Labs detected a phishing campaign targeting Facebook users. The scam, labeled "FBStarter" by security researchers redirected users to a phishing page that spoofs Facebook's sign-in page. By entering their user name and password, they unknowingly gave attackers the information necessary to log into their account and spam their friends.
Data gathered from the Websense Threatseeker Network shows that sites that allow user-generated content comprise the majority of the top 50 most active distributors of malicious content and that more than 70 percent of these sites have hosted malicious code in the last six months, as well as malicious comment spam and the URL and domain spoofing noted in the most recent research.
For more information about Websense solutions including the Websense' Web Security Gateway, the industry's most effective secure Web gateway for Web 2.0 content control, content filtering and threat protection, visit: http://www.websense.com/content/SecurityGateway.aspx?cmpid=prnr
About Websense, Inc. Websense, Inc. (NASDAQ: WBSN), a global leader in integrated Web, data and email security solutions, provides Essential Information Protection for more than 44 million product seats under subscription. Distributed through its global network of channel partners, Websense software and hosted security solutions help organizations block malicious code, prevent the loss of confidential information and enforce Internet use and security policies. For more information, visit www.websense.com.
Websense is a registered trademark of Websense, Inc. in the United States and certain international markets. Websense has numerous other registered and unregistered trademarks in the United States and internationally. All other trademarks are the property of their respective owners.
Media Contacts: Sarah Thornton Websense, Inc.