Advertisement
  • Networking
  • Storage
  • Security
  • Mobility and Wireless
  • Applications
  • OS and Servers
  • Mid-sized Business
  • Green IT
  • Virtualisation

Home | News | Insight | How-tos | Case studies | Interviews | Briefings | Reviews | Blog

Computer & Internet Security News



30 October 2008

Facebook worm resurfaces on Google

By Robert McMillan, IDG news service

Google users could be facing the returm of a worm that first hit Facebook in July.

Advertisement

Researchers at unified threat management vendor Fortinet noticed that a program similar to the Koobface worm had started using the Google Reader and Picasa websites to spread. In the attack. Criminals host images that look like YouTube videos on the Google sites in hopes of tricking victims into downloading malicious Trojan software.

Hackers initially unleashed Koobface in late July, but Facebook's security team soon slowed its spread by blocking the webites that were hosting the malicious Trojan software.

That has prompted the criminals to change tactics, according to Guillaume Lovet, a senior research manager with Fortinet. In this latest attack they have hosted files that appear to be YouTube videos on Picasa and Google Reader and used Facebook to send them to victims.

The links appear safe because they go to Google sites, but once the victim arrives on the Google Reader or Picasa page, he is invited to click on a video or a web link. The victim is then told he needs to download special codec decompression software to view the video. That software is actually a malicious Trojan Horse program, which is blocked by most anti-virus programs, according to Facebook.

Lovet believes the cyber-criminals behind Koobface have deliberately misspelled their Facebook messages to further help them evade detection by filters.

"Sommebody uupload a viideo witth you on utubee. you shuold ese," reads one message.

Lovet has not seen this latest attack use the self-copying worm code that Koobface used last August, but it could easily be added, he said.

Facebook is working with Google to shut down the problem, said Facebook spokesman Barry Schnitt.

Koobface has been a top security concern at Facebook since July. "It's been out there constantly," Schnitt said, "but it's surfaced a little bit more lately."

The worm's creators have used other tricks to try to circumvent Facebook filters, he added. They've used Facebook's instant messaging feature and also hosted their malicious links on sites such as Tinyurl.com and Bloglines.

Advertisement

Nobody knows how widespread this malware really is, but when Koobface first appeared on the scene, Facebook said it was affecting less than 0.02 percent of users. Facebook boasts more than 110 million users; 0.002 percent of that would represent 220,000 users.

Security experts have long warned that the Web 2.0 mash-up model of allowing users to put together their own content from many different sources naturally creates many security problems. In part, this is because it allows anyone to post material on trustworthy domains such as Google.

"I believe that you will see more of this stuff happening," said Petko Petkov, a security researcher with GNUCitizen.

With corporate Intranets adopting new technologies such as blogging and Wikis, Petkov thinks corporate targets may soon be ripe for attack. "If you have a worm inside a corporation that works the same way as the worm on Facebook, you have a huge problem."

Follow highlights from Techworld on Twitter
Stay Informed > Subscribe to our Newsletters
The UK IT News widget Get it for your site!

<<newer article | back to index | older article>>

close

Email this article to a friend or colleague:




PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

close
  • This article is now being printed.
close

What are your views on this subject? Use the form below to post a comment on this article up to 1000 characters.


Characters remaining:

close

Click below to add 'Facebook worm resurfaces on Google' to your blog.



If you do not have a ComputerworldUK Account and would like to use this feature, please Register.

If you are a registered, logged-in user, this will post the title and first paragraph of this story to your blog to share with your readers.

What is this?
Advertisement
Advertisement

WHITE PAPERS

  • 5 steps to successful IT consolidation and virtualisation
    The reasons to consolidate and virtualise IT infrastructure are wide-ranging. While most IT managers focus on just the cost of the physical IT infrastructure, there are many additional benefits that can be derived from IT consolidation: Simplified management > Improved data protection > Improved resource utilization > Easier revision control > Easier data protection and security > More flexibility > Reduced server and software costs
  • Complex Event Processing
    We all have an intuitive idea of what an event is. However, when it comes to the use of the term "event" within a business context then it is easy to get confused, and this isn't helped by the various terms and acronyms used by software vendors and the market.
  • A Smarter Approach to WAN Optimisation
    With Unified Performance Management, the core capabilities needed to effectively manage the WAN and ensure optimal application performance are incorporated into a single network appliance. These capabilities include real-time monitoring, reporting, traffic control, optimization and acceleration – all integrated and accessible through a common interface and centralized management platform.
  • Best Practices in Optimizing WAN Performance
    Improve your WAN performance with this helpful best practices guide
  • How Flexible Are You On Flexible Working?
    IDC’s latest executive brief examines how organisations should be leveraging ICT more effectively to increase the utilisation and output from their workforce. It explores how organisations are applying flexible working practices, the process they are following, and how they have overcome the challenges they have faced.

Techworld topic pages