Five new online security threats to avoid

Three of the five new threats target Facebook users.

I don't spend a lot of time on Facebook, so when I got an e-mail from the social networking site telling me "you haven't been back to Facebook recently" and here are some messages you missed, it didn't seem odd. I clicked on the link, wondering what one of my friends was doing.

Oops. I was a victim of a hacking technique called "clickjacking." If it hadn't been for security measures built into Firefox, I might have been in trouble, because rather than going to Facebook, I was headed for http://sleepingpillsfitnesspills.com.

That site might have simply been an ad for cut-rate, Canadian pills - an annoying, but harmless detour. But it also could have been a site loaded with malware, include rogue applications designed to steal key personal information from me and people in my address book.

Facebook, with its hundreds of millions of users, has become the target of hackers, spammers, and just plain crooks. They're trying to lure you in via scam surveys, fake applications and poisoned links, according to a report by Sophos Security.

Unfortunately, Facebook is far from the only popular Web site being compromised these days. Amazon, the giant e-tailing site, inadvertently left a door open that hackers could use to steal your password and get access to your credit card info.

And no matter what you've read about those evil Russian hacker rings, it turns out no country is the origin of more cyber attacks than the United States, according to Akamai's quarterly "State of the Internet" report.

Here are five new threats, including three that target Facebook users:

1. Clickjacking: Sophos Security says this is one of the most common attacks hitting Facebook users. These attacks use maliciously created pages where the true function of a button is concealed beneath an opaque layer showing something entirely different. Often sharing or "liking" the content in question sends the attack out to contacts through news feeds and status updates, propagating the scam.

In my case, I'm a bit embarrassed to admit, I could have avoided the scam page by simply noticing that the address of the e-mail allegedly sent by Facebook was obviously phony. update+qqlvvtxikjpp@facebookmail.com. The lesson here is obvious: When you get an e-mail with a link, notice the return address. If it seems odd, delete it. Additionally, keep your browsers up to date; all are doing a better job screening out dangerous stuff, and since they're free, why not take advantage of that protection.

2. Fake surveys: This scam is related to clickjacking since it attempts to make you click on something dangerous via a misleading message. Typically, the scam starts with a provocative (sexual or otherwise) message. Here's one that Sophos highlighted recently: "OMG! Look What this Kid did to his School after being Expelled! After this 11 year old child was expelled from his school he went berserk." Well, that's intriguing.

However, you have to "like" the page and fill out a quick survey before reading the story. Whoops: you just gave scammers a commission for filling out the survey, and helped the scam spread by sending it to all your friends. The survey earns money for the scammers; they get a commission for every survey completed. And that's why they're spreading this message virally across Facebook.

3. Rogue applications: More perniciously, the fake survey can lead to rogue applications. Sometimes the applications will look for your address book and send the fake surveys to everyone in it, hoping to make money. Other rogue applications can hijack data by installing key loggers (apps that record and pass on key strokes) or other malware. Other fake applications can turn your computer into a zombie used to broadcast malware for the bad guys.

4. Amazon vulnerability: A security flaw apparently allows the company's servers to accept passwords that are nearly - but not entirely - correct. Fortunately, the flaw only appears to affect older passwords.

The flaw lets Amazon accept as valid some passwords that have extra characters added on after the 8th character, and also makes the password case-insensitive. That flaw erases the advantage of a longer password, making passwords much easier to crack via software. This was first noticed by users over at reddit and has been picked up and verified by a number of reputable groups, including Wired.

In any case, it does appear that newer passwords are not affected, but it isn't clear what the date cutoff is. In any case, you can simply change your Amazon password. If you like, change it back to the same password, but it will still be a new one as far as the server is concerned, and be safe. Amazon has not responded to my query on this topic, or any anyone else's that I've seen.

5. Spearphishing: This is more likely to occur via regular e-mail; but you may also be hit by a spear through a Facebook or Twitter message. Spearphishing (or spear phishing) works like this. You'll get an e-mail or message that seems quite personal, it may appear to be from a person or company with whom you normally communicate. But it will lead you to a poisoned site. Yes, this sounds like the "phishing" scams you've been warned about. In those you might get a message from your e-mail provider saying your inbox is full or you have to verify your identity and so on. Spear phishing takes that a step further by adding personalized information to lull your suspicions.

"Phishing messages usually appear to come from a large and well-known company or Web site with a broad membership base, such as eBay or PayPal. In the case of spear phishing, however, the apparent source of the e-mail is likely to be an individual within the recipient's own company and generally someone in a position of authority," according to the Sophos Web site.

San Francisco journalist Bill Snyder writes frequently about business and technology. He welcomes your comments and suggestions. Reach him at bill.snyder@sbcglobal.net.

Follow Bill Snyder on Twitter @BSnyderSF. Follow everything from CIO.com on Twitter @CIOonline.

Read more about security in CIO's Security Drilldown.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags internetthreatsmalwareFacebooksophosscamsTechnology TopicsTechnology Topics | Security

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Bill Snyder

CIO (US)
Show Comments

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Tom Sellers

MSI P65

This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang

MSI GT76

It really doesn’t get more “gaming laptop” than this.

Jack Jeffries

MSI GS75

As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr

MSI PS63

The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Featured Content

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?