Tag Archive for YouTube

Social Media Malware Launch Pads

Social Media Malware Launch PadsSocial networks’ role in the growth of the global virtual society has been well documented. What is not so well documented according to Help Net Security is the role social media has in spreading malware. The security and privacy mechanisms of social networking firms such as LinkedIn (LNKD), Twitter, and Facebook (FB) have proven insufficient to prevent exploitation.

Social networkThe article notes that “To Err is Human,” and human errors lead to exploitation and manipulation whether the social network is online or offline. Social media hold a plethora of personal information on the users that create the network. Individual connections between users collectively form a web of connections. To build each link between users an implicit trust is required between the two users and implicitly across the entire network. Any information provided by an individual user through chained connections becomes a part of the full network. When an attacker is able to exploit one user in the social network, they have the potential to be able to push malicious content into the network. The network’s connectivity enables the spread of exploitation. The blog explains that attackers exploit the weakest link in the chain.

The inability of users to determine the legitimacy of content flowing through the social media helps this exploitation process. Help Net Security says the biggest problem with online social networks is that they do not have built-in protection against malware. For example, current social networks do not scan the URLs and embedded content coming from third-party servers such as Content Delivery Networks. Therefore, there is no way to authenticate the URLs passed among the user objects in the social networks.

exploitation of human ignoranceThe infection process begins with the exploitation of human ignorance and followed by the spreading of the malware through the trust upon which the network is based.

The article further explains that to start the exploitation process, an attacker will pick an issue that affects human emotions to evoke a response so the social network user will do something the attacker wishes. Phishing and spam messages about weather calamities, politics, and financial transactions are used for starting infections. The author states that since social network exploitation begins by exploiting an individual’s ignorance common attack strategies have emerged.

FacebookOne of the simplest infection techniques is to put malicious URLs on a user’s Facebook message wall. When a user clicks on an illegitimate hyperlink it can result in the automatic download of malware through the browser. Some of the exploits used are:

  • Browser Exploit Packs (BEP) fingerprint the browser version and other software on the user machine. Based on this information, a suitable malware is served to the user which uses exploits for that particular browser.
  • Drive-by-Download attacks begin by visiting a malicious Malicious advertisementspage. They exploit vulnerabilities in browsers and plugins. Successful exploitation of the vulnerability causes a shellcode to run that in turn downloads the malware into the system.
  • Malicious advertisements (malvertisements) happen when an attacker injects a malicious link into a user’s Facebook wall to spread malware. The fake post is linked to a third-party website that has malicious advertisements embedded in it. These advertisements are linked to malicious JavaScripts which execute the malicious content in the browser.

Trojan horseHelp Net Security states that online social media is not harnessing the power of Safe Browsing API’s from Google (GOOG) or similar services to instantiate a verification procedure before posting a URL back to a user profile. Lack of such basic protections is a key factor in making the social networks vulnerable to exploitation.

Microsoft (MSFT) recently spotted a Facebook attack in the wild that exploited Facebook user’s trust in a social engineering campaign. The attack tries to trick Facebook users into installing a backdoor Trojan with keylogging capabilities according to the Help Net Security report.

MSFT says the Facebook Wall messages varied but they all lead to fake YouTube pages. Once there, the user is urged to download a new version of “Video Embed ActiveX Object” to play the video file. Unfortunately, the offered setup.exe file is the Caphaw Trojan.

The trojan bypasses firewalls, installs an FTP and a proxy server, and a key logger on the affected machine. Microsoft’s Mihai Calota says ” … has built-in remote desktop functionality based on the open-source VNC project.” MSFT says the Facebook attack can be used to steal money, “We received a report .. that money had been transferred from his bank account … The keylogging component, coupled with the remote desktop functionality, makes it entirely possible for this to have happened.

rb-

The articles correctly state that security and privacy mechanisms are indispensable for safe online social networking. Built-in security is necessary because attackers exploit the trust, curiosity, and ignorance of the social network customers to their own profit. Users should demand safe and secure transmission of the information and the user’s privacy. These should also be a focus of the social networking companies.

To protect themselves, users should:

  • What does thi do?Have up to date AV software running on their computers
  • Keep their browsers and operating systems fully patched
  • Change the passwords on all their sensitive accounts regularly
  • Warn friends and Facebook if an account seems to be hacked by using the Facebook “report/mark message as spam” option.
Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

1963 Short From Muppets Jim Henson for Bell System

1963 Short From Muppets Jim Henson for Bell System In the wake of the recent The Muppets movie, AT&T (T) re-discovered a film by Muppets creator Jim Henson. He created the film for The Bell System nearly 50 years ago. CNet author Edward Moyer says the film gives a hilarious glimpse of Mr. Henson’s earlier days – and of the youthful years of computing.

AT&T posted the 1963 short “Robot” on the company’s ATTTechChannel section on YouTube, addresses the anxiety felt by humans in regard to machines and computers. The article says the film was “made for an elite seminar given for business owners, on the then-brand-new topic–Data Communications,” AT&T explains on the YouTube page. And the company continues:

The organizers of the seminar, Inpro, actually set the tone for the film in a three-page memo from one of Inpro’s principals, Ted Mills, to Henson. Mills outlined the nascent, but growing relationship between man and machine: a relationship not without tension and resentment….”

Displaying his mastery of slapstick, comic timing, and sound effects, Henson uses his humorously menacing star, “Computer H14,” to reassure viewers that they need not be alarmed: humans remain in control according to CNet.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

YouTube Founders Acquire Delicious from Yahoo!

YouTube Founders Acquire Delicious from Yahoo!In one of the most search engine-friendly articles, ITnewsLink reports that on April 27th, YouTube founders Chad Hurley and Steve Chen have acquired the Delicious technology from Yahoo! (YHOO). They plan to continue the service that users have come to know and love and make the site even easier and more fun to save, share and discover the web’s “tastiest” content.

delicious logoProviding a seamless transition for users is incredibly important. Yahoo! will continue to manage Delicious over the next couple of months as users are able to sign up for new accounts. After the transition period is complete, users’ information will be moved over to the new service.

“As we have said, part of our product strategy involves shifting our investment with off-strategy products to put better focus on our core strengths and fund new innovation, says staff on Yahoo! blog. We believe this is the right move for the service, our users and our shareholders. Chad Hurley and Steve Chen are building an exciting new company and we look forward to watching the Delicious service continue to develop!”

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Social Media Sites Most Blocked

Social Media Sites Most BlockedOpenDNS is the largest global DNS service that handles DNS for 1 percent of all Internet users worldwide. The firm resolves 30 billion DNS queries per day and services 15 million requesting IP addresses per day. OpenDNS has released the OpenDNS 2010 Report Web Content Filtering and Phishing, (PDF) which highlights their 2010 findings of social media content filtering with data from their global vantage point.

Web-based content can be filtered by subscribing to services like OpenDNS. These firms categorize the content on the web into broad categories like porn, hate, gambling or social media. This allows organizations to block all content that the service providers places in these categories. For more granular control content may also be filtered by blocking specific websites via blacklisting or by allowing specific websites via whitelisting.

  • Blacklists are typically used when there is no wish to block an entire category in principle, but there is a focus on preventing traffic to specific websites based on a combination of their popularity and content.
  • Whitelists are typically used when there is a desire to block entire categories, but access to selected websites is granted on an exception basis. These sites represent the most trusted sites in their category.

The World’s Most Blocked Websites - OpenDNS

WhitelistedBlacklisted
Site %Site
%
YouTube.com
12.7Facebook.com 14.2
Facebook.com12.6
MySpace.com9.9
Gmail.com 9.2
YouTube.com8.1
Google.com 9.0
Doubleclick.net6.4
Translate.Google.com 6.3
Twitter.com 2.3
LinkedIn.com
6.0Ad.yieldmanager.com 1.9
MySpace.com4.7
Redtube.com 1.4
Skype.com 4.6
Limewire.com 1.3
Deviantart.com 4.3Pornhub.com
1.2
Yahoo.com 3.9Playboy.com 1.2

The report says that businesses have specific goals in mind when blocking websites. They need to ensure compliance with HR policies, while also increasing worker productivity by preventing what they consider to be employee cyberslacking on social media. According to the OpenDNS report, the business list confirms that businesses are singling out popular social media sites considered to be of little value in a work setting, especially if they consume a lot of bandwidth. Filtering by Business Users:

  1. Facebook.com — 23%
  2. MySpace.com — 13%
  3. YouTube.com — 11.9%
  4. Ad.Doubleclick.net — 5.7%
  5. Twitter.com — 4.2%
  6. Hotmail.com — 2.1%
  7. Orkut.com — 2.1%
  8. Ad.Yieldmanager.com — 1.8%
  9. Meebo.com — 1.6%
  10. eBay.com — 1.6%

rb-

The blacklisted sites suggest a concern with the use of bandwidth by streaming sites and with privacy concerns from advertising networks. We will be exploring the web app Meebo, which lets users get on web 2.0 apps like MSN, Yahoo, AOL/AIM, MySpace, Facebook, and Google Talk by simply using a browser and a popular workaround even when the desktops are locked down.

The fact that many of the same sites that appear on both the Whitelisted and Blacklisted lists is a sign of how confused the responses are to social networking, All the better reason to have a social media policy in place.

How does your organization handle content filtering?

Does your AUP address social networking?

Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Riskiest Social Media Apps

Riskiest Social Media ApplicationsDarkReading has a report from Seattle-based network security vendor WatchGuard which says that the fastest growing threat to corporate networks is web-based social media applications. The WatchGuard security researchers claim that social media applications can seriously compromise network security, expose sensitive data, and create productivity drains on employees.

Watchguard logoThere are many reasons why social media applications can pose risk to any size business. WatchGuard noted that productivity and data loss are major risks for organizations of all sizes. Social media sites also serve as malware and attack vectors. Social networks will become the leading malware vector over the next few years for three reasons:

  • Social media sites breed a culture of trust. The whole point of social media is to interact with others. Typically interactions are with people considered to be “friends”, which implies trust. Meanwhile, social media sites do not have any technical means to confirm that the people you are interacting with really are who they say they are. This environment of trust creates an ideal scenario for social engineers to use.
  • Many social media sites suffer from technical vulnerabilities. While Web 2.0 technologies offer many benefits, they also harbor many security vulnerabilities. The complexity of Web 2.0 applications can lead to imperfect code, which introduces some social network sites to Web application vulnerabilities, such as SQL injection and cross-site scripting (XSS) attacks. Furthermore, the concept of allowing untrusted users to push content onto social media sites conflicts with traditional security paradigms. Simply put, this means social media sites are more likely to suffer from web vulnerabilities than less complex and less interactive websites.
  • Hugely popular. According to online analytics firm, Compete, Facebook is now the 2nd most popular Web destination after Google. Many other social networks, such as Twitter and YouTube, follow closely behind. The popularity of social networks attracts attackers because they know it means that they can get a “return on investment” for their attacks.

For these reasons, WatchGuard researchers deemed the following applications the riskiest:

Facebook logo1. Facebook is the most dangerous social media site, largely based upon its popularity according to WatchGuard. With a 500+ million user following, Facebook offers a fertile attack surface for hackers. Add in the potential technical concerns, such as a questionable, open App API and now you have a recipe for disaster.

Twitter logo2. Twitter, many incorrectly assume that very little damage could be done in 140 characters. Twitter’s short-form posts lead to new vulnerabilities such as URL shorteners. While URL shorteners can help hackers hide malicious links. Twitter also suffers from Web 2.0 and API-related vulnerabilities that allow various attacks and Twitter worms to propagate among its users.

3. YouTube attracts attackers because it is one of the most popular online video sites. Hackers often create malicious web pages that masquerade as YouTube video pages. Additionally, attackers like to spam the comment section of YouTube videos with malicious links.

4. LinkedIn bears more burden than other social media sites; it is business-oriented. Thus, it makes a more attractive target to attackers, as LinkedIn is highly trusted. Because most users leverage LinkedIn to form business relationships or find jobs, they tend to post more valuable and potentially sensitive information to this social network.

4Chan logo5. 4chan is a popular imageboard, a social media site where users post images and comments. 4chan has been involved in many Internet attacks attributed to “anonymous,” which is the only username that all 4chan users can get. Some of 4chans image boards contain the worst depravities found on the Internet. Many hackers spam their malware to the 4chan forums.

Chatroulette logo6. Chatroulette allows webcam owners to connect and chat with random people. The nature of this anonymous webcam system makes it a likely target for Internet predators.

rb-

I have written about social media risks since 2009, yet many organizations still do not have a social media policy.  Why take the chances?

Does your organization have a social media policy?

Does anybody actually allow 4Chan or Chatroulette?

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.