Rassegna Stampa

LBIT soluzioni informatiche

  • Categorie
  • Creative
    • Design
    • Ilustrazioni
  • Fotografia
  • Web
    • SEO
    • Mobile
    • Social
  • Marketing
  • ICT
  • Security
  • News
    • Economia
    • CRIME E CORRUPTION
  • Autori

Tens of thousands of Facebook accounts compromised in days by malware

 18 Aprile 2018   News
image_pdfimage_print
Facebook’s guidelines visually sum up “offensive things” with this blue text balloon. Meaning, it doesn’t resemble a “fully exposed buttock.”
reader comments 41

Share this story

Criminals have compromised tens of thousands of Facebook accounts in the past few days using malware that masquerades as a paint program for relieving stress.

“Relieve Stress Paint” is available through a domain that uses Unicode representation to show up as aol.net on search engines and in emails, researchers from security firm Radware said in a post published Wednesday morning. (This query showed the trojan was also available on a domain that was designed to appear as picc.com.) The researchers suspect the malware is being promoted in spam emails.

Once installed, the malware acts as a legitimate paint program that changes colors and line size with each user click. Behind the scenes, it copies Chrome data that stores cookies and any saved passwords for previously accessed Facebook accounts.

“Stresspaint,” as Radware has dubbed the hidden program, continues to copy the Facebook credentials each time a target opens Relieve Stress Paint and each time the computer restarts. The data is sent to a command-and-control server. Radware researchers were able to access the command server’s interface, which showed that more than 40,000 computers had been infected by the malware in recent days. In the process, tens of thousands of Facebook accounts were compromised. The interface also compiled any payment details tied to an account, the number of friends the account had, and whether the account was used to manage a page.

The interface also included a section for viewing credentials for victims’ Amazon accounts. It was empty, leading Radware to suspect the attackers hadn’t yet enabled code that would actually compromise those accounts. Radware also detected another variant of the malware and saw an indication of it in the control panel.

Stealth

The malware was designed to copy the credentials in a way that wouldn’t be detected by antivirus programs. The copying process, for instance, remained active for less than one minute. The malware didn’t steal general credentials, and it copied cookies and saved passwords by querying copies of the original cookies and LoginData files rather than through other means.

It remains unclear precisely what the attackers did with data they obtained. Possibilities include selling the data in criminal forums, using it for identity theft or espionage, or using the payment data to buy goods or services on e-commerce sites.

More than five days earlier this week, the malware managed to infect nearly 34,000 computers in two dozen countries.

Since then, more than 6,000 more infections have occurred.

Anyone who may have been infected by this malware should immediately change their password and should also check the security and login section of their Facebook settings for logins by unrecognized computers. It’s always a good idea to protect accounts with multifactor authentication, but it’s not yet clear if that protection would have prevented attackers in this campaign from accessing compromised accounts. Because the malware stole both passwords and cookies, it’s possible the cookies allowed the attackers to bypass the protection.

In a statement, Facebook officials wrote: “We are investigating these malware findings and we are taking steps to help protect and notify those who are impacted.” A spokesman said it wasn’t yet clear what effect the attacks had on accounts protected by multifactor authentication.

This ability to infect 40,000 users and compromise tens of thousands of accounts indicates the malware was developed professionally. It wouldn’t be surprising to see this group strike again. Radware’s blog post is here.

https://arstechnica.com/?p=1295311

<< Honeypot Shows the Power of Automation in the Hands of Hackers Why You Should Treat Your Business Like a Robot-Car: 4 Keys to Surviving Radical Change >>

Evidenziatore

Cerca

Tag

5G AI apertura apple Articoli attualita' Biz & IT Cars Cybercrime Cybersecurity Dailyletter economia Energia facebook false Finance Gaming & Culture General Google In evidenza Intelligenza Artificiale Internet Leadership & Talent malware Mappamondo Media microsoft News NEWS&INDUSTRY News and Trends Platforms Policy PPC Privacy RSS Science SEO Social media Social Pro Daily space Stocks Tech Telecoms Voice Vulnerabilities

Ricerca avanzata

Related Post

  • Oltre 400 app false rubano le credenziali Facebook: analisi delle minacce mobili 2022-2025
  • The threat of phishing attacks and law enforcement’s role (Part 1)
  • Systems used by courts and governments across the US riddled with vulnerabilities
  • Mysterious family of malware hid in Google Play for years
  • Security leaders respond to the AT&T data breach
  • Crooks plant backdoor in software used by courtrooms around the world
  • Hacker free-for-all fights for control of home and office routers everywhere
  • The growing abuse of QR codes in malware and payment scams prompts FTC warning
  • Okta says hackers breached its support system and viewed customer files
  • Password-stealing Linux malware served for 3 years and no one noticed

Rassegna è il portale di aggiornamento della LBIT s.r.l.s.Sviluppato da MyWiki WordPress Theme