{"id":2025,"date":"2010-11-27T13:15:14","date_gmt":"2010-11-27T18:15:14","guid":{"rendered":"http:\/\/rbach.net\/blog\/?p=2025"},"modified":"2022-12-30T15:47:22","modified_gmt":"2022-12-30T20:47:22","slug":"social-networks-are-risky","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/social-networks-are-risky\/","title":{"rendered":"Social Networks Are Risky"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20180108082814\/https:\/\/www.yellowpages.ca\/bus\/Ontario\/Innisfil\/Marty-s-Computer-Repair-Services\/100387772.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-4362\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"Social Networks Are Risky\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/11\/malware3.jpg?resize=105%2C105&#038;ssl=1\" alt=\"Social Networks Are Risky\" width=\"105\" height=\"105\" \/><\/a>According to the Czech security firm TrustPort, social networking&#8217;s popularity and ease of use can cause users to forget its risks.\u00a0 These risks include the <strong>loss of private personal data and malware infection<\/strong>.\u00a0 Even though social networking is new, a recent <a href=\"http:\/\/www.ibm.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">IBM<\/a> (<a href=\"https:\/\/www.nyse.com\/quote\/XNYS:IBM\" target=\"_blank\" rel=\"noopener noreferrer\">IBM<\/a>) <a href=\"https:\/\/web.archive.org\/web\/20150331054227\/http:\/\/www-935.ibm.com:80\/services\/us\/iss\/xforce\/\" target=\"_blank\" rel=\"noopener noreferrer\">X-Force<\/a> <a href=\"http:\/\/web.archive.org\/web\/20131019082300\/http:\/\/www-935.ibm.com\/services\/us\/iss\/xforce\/trendreports\/\" target=\"_blank\" rel=\"noopener noreferrer\">report<\/a> says the threats are not.\u00a0 According to IBM, traditional threats like <strong>phishing, malware, 419 fraud schemes, identity theft, data harvesting, and botnets<\/strong> now use social networks as attack vectors.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-4363\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"facebook\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/11\/facebook1.jpg?resize=75%2C75&#038;ssl=1\" alt=\"Facebook\" width=\"75\" height=\"75\" \/>Many social networking <strong>users fall victim<\/strong> to attackers offering <strong>new apps or features<\/strong> for joining the group.\u00a0 <a href=\"https:\/\/www.helpnetsecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Net Security.org<\/em><\/a> cites the <strong><a href=\"https:\/\/www.facebook.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a><\/strong> <a href=\"https:\/\/nakedsecurity.sophos.com\/2011\/05\/20\/profile-stalkers-on-facebook-check-out-the-viral-scam-thats-spreading\/\" target=\"_blank\" rel=\"noopener noreferrer\">Stalker Catcher<\/a> as an example of such a scam.\u00a0 Even though this malicious app appeared in 2009, Facebook users still fall victim to it.\u00a0 To start a Stalker Catcher attack, <em>Net Security.org<\/em> says users are lured to the group on the <strong>pretext<\/strong> that they will see exactly who and when is visiting their personal profile.\u00a0 The alleged instructions for feature activation result in nothing more and nothing less than sending group invitations to all contacts of the victim.<\/p>\n<p><a href=\"https:\/\/www.sunbeltsoftware.com\" target=\"_blank\" rel=\"noopener noreferrer\">Sunbelt Software<\/a> <a href=\"http:\/\/sunbeltblog.blogspot.com\/2010\/11\/new-lure-proxy-service-for-avoiding.html\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that the latest <strong>scam targeting Facebook<\/strong> users <strong>specifically targets kids<\/strong>.\u00a0 The scam promises a <strong>free<\/strong> proxy service for those who want to <strong>bypass parental controls and blocks<\/strong> set up by schools.\u00a0 The scam tempts the victims to try the service at hxxp:\/\/myfatherisonline.com to access Facebook in school.\u00a0 Of course, when the victims visit the website, they can&#8217;t find the advertised service.\u00a0 The researchers instead found a plethora of <strong>scam attempts<\/strong>.\u00a0 The victims are faced with an affiliate site containing <strong>malware, surveys, quizzes,<\/strong> and offers for <strong>free iPhones<\/strong> that will try to get them to subscribe to a premium rate service or sign up for <strong>spam<\/strong>.<\/p>\n<p>The number of users who voluntarily join fraudulent groups and send invitations to all their contacts is strikingly high.\u00a0 In the <a href=\"https:\/\/www.helpnetsecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Net Security.org<\/em><\/a> <a href=\"https:\/\/web.archive.org\/web\/20100208224610\/http:\/\/www.net-security.org:80\/secworld.php?id=8833\" target=\"_blank\" rel=\"noopener noreferrer\">article<\/a>, IBM says the informal feel of social networks is the real risk.<\/p>\n<blockquote><p>We&#8217;re all friends here,&#8221; you&#8217;re thinking to yourself, and you&#8217;re mind chooses to ignore the things that would usually set off alarm bells in your head. Who knows &#8211; maybe it&#8217;s our inherent sense of safety that we get when surrounded by lot of people? Safety in numbers, so to speak. In any case, most of us are just less careful.<\/p>\n<p style=\"font-size: 16px; font-style: normal; text-align: start;\">\n<\/blockquote>\n<p style=\"font-size: 16px;\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-4364\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"spam_logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/11\/spam_logo.jpg?resize=118%2C101&#038;ssl=1\" alt=\"SPAM\" width=\"118\" height=\"101\" \/><\/p>\n<p>These same users then <strong>access Facebook at work<\/strong>, exposing their employers to more risks.\u00a0 The anti-malware firm <a href=\"https:\/\/web.archive.org\/web\/20240415214827\/https:\/\/www.sophos.com\/en-us\" target=\"_blank\" rel=\"noopener noreferrer\">Sophos<\/a> recently found that reports (<a href=\"http:\/\/www.sophos.com\/sophos\/docs\/eng\/papers\/sophos-security-threat-report-jan-2010-wpna.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a>) by companies of <strong>spam and malware derived from social networks<\/strong> were up 70 percent from a year earlier and concludes that &#8220;Because of this, social networks have become one of the most significant vectors for data loss and identity theft.&#8221;<\/p>\n<p>Due to this <strong>carelessness<\/strong>, the criminals behind the scams quickly gain large databases of contacts.\u00a0 These databases are later sold to other cybercriminals and used for sending spam or for further phishing scams.\u00a0 Some fraudulent groups explicitly invite users to install a particular application, which is even more dangerous.\u00a0 According to the article, the risk of malware infection should never be underestimated.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>So the important message here is:<\/em><\/p>\n<ol>\n<li><em>Keep your computer up to date<\/em><\/li>\n<li><em>Use regularly updated antivirus and antispyware software<\/em><\/li>\n<li><em>Verify what you are doing before you do it<\/em><\/li>\n<li><em>If it is too good to be true, it probably is<br \/>\n<\/em><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005.\u00a0 You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>.\u00a0 Email the Bach Seat <a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The popularity and ease of use of social networks causes users to forget the risks of social networking according to security firm TrustPort<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,295],"tags":[3240,104,1096,43,4,281,2042],"class_list":["post-2025","post","type-post","status-publish","format-standard","hentry","category-security","category-social-networking","tag-3240","tag-facebook","tag-fb","tag-ibm","tag-security","tag-sophos","tag-trustport"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=2025"}],"version-history":[{"count":16,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2025\/revisions"}],"predecessor-version":[{"id":116993,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/2025\/revisions\/116993"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=2025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=2025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=2025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}