SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Commercial Crime International

                                                                                                      Cybercrime

     Online Social Networks – Launch pads for Malware
 The advent of social networks                Social networks hold a plethora of personal information on the users that
      has turned the online world             form the network. Individual connections between users collectively form
        into a virtual society. And           a web of connections. To build each link between users an implicit trust
    whilst social networks serve              is required between the two users and implicitly across the entire network.
    as seamless communication                 Any information provided by an individual user through chained connec-
                                              tions becomes a part of the full network. If an attacker is able to exploit
channels, they are also an ideal
                                              one user in the social network, they have the potential to be able to
          launch pad for malware              push malicious content (such as malicious URL’s) into the network.
    infections. There has been a              The connectivity of the network enables the spread of the exploitation.
     tremendous increase in the               That is, the attacker exploits the weakest link in the chain. This exploita-
       dissemination of malware               tion process is aided by the inability of users (and their stored objects)
   infections through social net-             to determine the legitimacy of content flowing through the social network.
     works. But the security and              The infection process begins with the exploitation of human ignorance
 privacy mechanisms of social                 and curiosity followed by spreading of the infection through the trust
  networks have proven insuffi-               upon which the network is based.
    cient to prevent exploitation.
 Aditya Sood and Richard                      In order to start the exploitation process, an attacker can pick any issue
 Enbody explain the dangers.                  that affects human emotions to drive the user in a social network to follow
                                              the path generated by the attacker. Topics such as weather calamities,
                                              political campaigns, national affairs, medical outbreaks and financial
                                              transactions are used for initiating infections. Phishing and spamming are
                                              used extensively for spreading messages on these topics with malicious
                                              intent. Basically, it is a trapping mechanism used by attackers to infect
                                              an entire online social network.

                                              Exploit Mechanisms – The Art of Infection
                                              Since social network exploitation begins by exploiting an individual user’s
                                              trust, curiosity, or ignorance common attack strategies have emerged:
                                              One of the simplest infection techniques is the injection of malicious
                                              URLs into a user’s message wall. Since it can be difficult to differentiate
                                              between the legitimate URLs and illegitimate ones, even a careful user
                                              can be tempted to click on the link. Unfortunately for the user, clicking
                                              the hyperlink can result in automatic download of malware from a mali-
Aditya K Sood is a senior security            cious domain through the browser.
researcher and PhD candidate at                       Browser Exploit Packs (BEP) hold a number of browser-based
Michigan State University. He is also         exploits that are bundled together to customise the response to a victim.
a founder of SecNiche Security Labs,          When a user visits a malicious domain, the BEP fingerprints the browser
an independent arena for cutting              version and the related environment of the user machine. Based on this
edge computer security research.
                                              information, a suitable exploit is served to the user which exploits the
                                              integrity of that particular browser.
                                                      Drive-by-Download attacks are triggered by visiting a malicious
                                              page. They exploit browser vulnerabilities in plugins and built-in compo-
                                              nents. Successful exploitation of the vulnerability results in the execution
                                              of shell code that in turn downloads the malware into the system. A
                                              variation of the Drive-by-Download attack is the Drive-by-Cache attack
                                              that can exploit browser cache functionality in order to execute malware.
                                                      Malicious advertisements (malvertisements) are yet another tech-
                                              nique to spread malware infections through online social networks. When
                                              an attacker injects the malicious link in a user message board, it is linked
                                              to a third party website which has malicious advertisements embedded
                                              in it. These advertisements are further linked to malicious JavaScripts
                                              that are retrieved by the browser, which executes the malicious content
Richard J. Enbody Ph.D, is associ-
Richard Enbody,                               in the context of running browser with the user’s privileges.
ate professor in the Department of
Computer Science and Engineering              The biggest problem with the online social networks is that they do not
at Michigan State University (USA).           have sufficient built-in protection against malware. For example, current
                                                                                                    continued on page 12/
December 2011                           More information online at www.icc-ccs.org                                      11
Cybercrime

                   from page 11
                                                  EDF fined for hacking Greenpeace
                                          EDF, the French energy firm,                             UK’s executive director, John
                                          was recently fined Euro 1.5 million                      Sauven, said: “The evidence
social networks do not scan the           by a Paris court for spying on                           presented at the trial showed that
URL’s and embedded content                Greenpeace. It must also pay                             the espionage undertaken by EDF
coming from third party servers           Greenpeace Euro 500,000 in dam-                          in its efforts to discredit Greenpeace
such as Content Delivery Networks.        ages. Two EDF employees were                             was both extensive and totally
Therefore, there is no mechanism          jailed, along with the head of the                       illegal. The company should now
to detect the authenticity of URL’s       company they hired to hack into the                      give a full account of the spying
that are passed as message con-           environmental charity’s computers.                       operation it mounted.”
tent among the user objects in the
online social networks. In addition, it   EDF was charged with complicity                          Whilst anti-nuclear activists are
is easy to upload malvertisements,        in concealing stolen documents and                       reportedly furious at what EDF did,
and social networks fail to raise         complicity to intrude on a computer                      a security expert has commented
any warning. Online social networks       network. It was claimed the com-                         that the only real surprise is that
are not harnessing the power of           pany had organised surveillance                          this sort of trojan-assisted industrial
Safe Browsing API’s from Google           not only of Greenpeace in France,                        espionage has not reached the
or similar services to instantiate a      but broadly across Europe since                          courts before.
verification procedure before post-       2004. And it was stated that in
ing a URL back to a user profile.         2006, EDF hired a detective agency,                      Philip Lieberman said that the case
Lack of such basic protections is         Kargus Consultants, run by a former                      is notable because the saga started
a key factor in making the social         member of France’s secret services,                      more than five years ago. And, he
networks vulnerable to exploitation.      to find out about Greenpeace                             wondered, how many other cases of
Finally, many social network users        France’s intentions and its plan                         trojan-assisted industrial espionage
are not knowledgeable enough              to block new nuclear plants in the                       have been carried out in recent
to differentiate between real and         UK. The agency allegedly hacked                          years. What does this case tell us?
malicious entities. Ignorance not         the computer of Yannick Jadot,                           Quite simply that trojan-assisted
only results in exploitation, but also    Greenpeace’s then campaigns                              infections are almost certainly an
greatly impacts the overall security      director, taking 1,400 documents.                        integral part of the modern-day
of online social networks. Because                                                                 private detective’s IT arsenal when
of the high connectivity and need         At the trial, EDF said it had been                       conducting industrial espionage,”
for trust in a social network users       victim of overzealous efforts, and                       he said. And we should ask whether
are particularly dependent on the         had been unaware anyone would                            terrorists are using the same tech-
built-in security features of online      hack a computer. But Greenpeace                          niques to assist their campaigns.
social networks, but the security
features are not tough enough
to thwart many malware attacks.

Conclusion
Robust security and privacy mecha-
nisms are indispensable for safe                  Published monthly by Commercial Crime Services,
online social networking. Built-in            Cinnabar Wharf, 26 Wapping High Street, London E1W 1NG, UK.
security is necessary because                      Tel: +44 (0) 20 7423 6960 Fax: +44 (0) 20 7423 6961
attackers exploit the trust, curiosity                                        Website: www.icc-ccs.org
                                                     Email: ccs@icc-ccs.org Website: www.icc-ccs.org
and ignorance to garner maximum                         Editor: Andy Holder Email ajholder@gmail.com
profit. User awareness regarding
security concerns is important but                                                ISSN 1012-2710
can only spread gradually, so social       No part of this publication may be reproduced, stored in a retrieval system, or translated in any form or by
networks should be proactive and           any means, electronic, mechanical, photocopying, recording, or otherwise without the prior permission of
                                           the publishers.
develop more sophisticated and
stringent mechanisms to thwart             While every effort has been made to check the information given in this publication, the authors, editors,
malware infections. Safe and secure        and publishers cannot accept any responsibility for any loss or damage whatsoever arising out of, or
transmission of the information and        caused by the use of, such information. Opinions expressed in Commercial Crime International are those of
robust user’s privacy should be the        the individual authors and not necessarily those of the publisher.
paramount concern of the social
                                                                           Copyright 2011. All rights reserved.
networking companies.

Weitere Àhnliche Inhalte

Was ist angesagt?

Detecting Malicious Facebook Applications
Detecting Malicious Facebook ApplicationsDetecting Malicious Facebook Applications
Detecting Malicious Facebook Applications
1crore projects
 
12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malware12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malware
Digital Pymes
 
A pact with the devil
A pact with the devilA pact with the devil
A pact with the devil
UltraUploader
 
Malware
MalwareMalware
Malware
zelkan19
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
Samudin Kassan
 
Mod2 wfbs new starter
Mod2 wfbs new starterMod2 wfbs new starter
Mod2 wfbs new starter
Ian Thiele
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
IJECEIAES
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
UltraUploader
 

Was ist angesagt? (18)

When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickWhen web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sick
 
Detecting Malicious Facebook Applications
Detecting Malicious Facebook ApplicationsDetecting Malicious Facebook Applications
Detecting Malicious Facebook Applications
 
AVG Threat Report Q4 2012
AVG Threat Report Q4 2012AVG Threat Report Q4 2012
AVG Threat Report Q4 2012
 
Virus
VirusVirus
Virus
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
Stormy Weather
Stormy WeatherStormy Weather
Stormy Weather
 
Artificial Intelligence powered malware - A Smart virus
Artificial Intelligence powered malware - A Smart virusArtificial Intelligence powered malware - A Smart virus
Artificial Intelligence powered malware - A Smart virus
 
12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malware12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malware
 
A pact with the devil
A pact with the devilA pact with the devil
A pact with the devil
 
Malware
MalwareMalware
Malware
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Mod2 wfbs new starter
Mod2 wfbs new starterMod2 wfbs new starter
Mod2 wfbs new starter
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
 
Web use and misuse
Web use and misuseWeb use and misuse
Web use and misuse
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
 
C3
C3C3
C3
 
E-threat landscape report H1 2012
E-threat landscape report H1 2012E-threat landscape report H1 2012
E-threat landscape report H1 2012
 

Andere mochten auch

HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?
HackInTheBox -  AMS 2011 , Spying on SpyEye - What Lies Beneath ?HackInTheBox -  AMS 2011 , Spying on SpyEye - What Lies Beneath ?
HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?
Aditya K Sood
 
Browser Malware Taxonomy
Browser Malware TaxonomyBrowser Malware Taxonomy
Browser Malware Taxonomy
Aditya K Sood
 
Toorcon Seattle 2011 - Browser Exploit Packs
Toorcon Seattle 2011 - Browser Exploit PacksToorcon Seattle 2011 - Browser Exploit Packs
Toorcon Seattle 2011 - Browser Exploit Packs
Aditya K Sood
 
OWASP AppSec USA 2011 - Dismantling Web Malware
OWASP AppSec USA 2011 - Dismantling Web MalwareOWASP AppSec USA 2011 - Dismantling Web Malware
OWASP AppSec USA 2011 - Dismantling Web Malware
Aditya K Sood
 
Elsevier NESE - Spying on the Browser
Elsevier NESE - Spying on the BrowserElsevier NESE - Spying on the Browser
Elsevier NESE - Spying on the Browser
Aditya K Sood
 
Malvertising - Exploiting Web Advertising | Elsevier Computer Fraud and Secur...
Malvertising - Exploiting Web Advertising | Elsevier Computer Fraud and Secur...Malvertising - Exploiting Web Advertising | Elsevier Computer Fraud and Secur...
Malvertising - Exploiting Web Advertising | Elsevier Computer Fraud and Secur...
Aditya K Sood
 
DEF CON 20 - Botnets Die Hard - Owned and Operated
DEF CON 20 - Botnets Die Hard - Owned and OperatedDEF CON 20 - Botnets Die Hard - Owned and Operated
DEF CON 20 - Botnets Die Hard - Owned and Operated
Aditya K Sood
 
Prezentacja1
Prezentacja1Prezentacja1
Prezentacja1
pazia
 
Tefen anfahrt
Tefen anfahrtTefen anfahrt
Tefen anfahrt
tefen1
 
Proposta de exame ccss 1Âș avaliaciĂłn Alberto Rivas
Proposta de exame ccss 1Âș avaliaciĂłn Alberto RivasProposta de exame ccss 1Âș avaliaciĂłn Alberto Rivas
Proposta de exame ccss 1Âș avaliaciĂłn Alberto Rivas
Alberto Rivas
 
Ppt publishing house research
Ppt   publishing house researchPpt   publishing house research
Ppt publishing house research
AsmaSabir
 
O sonho de mariana
O sonho de marianaO sonho de mariana
O sonho de mariana
jppc2010
 
Gd newsletter nov11
Gd newsletter nov11Gd newsletter nov11
Gd newsletter nov11
Andrew Jordan
 
Boletim 266 - 27/11/11
Boletim 266 - 27/11/11Boletim 266 - 27/11/11
Boletim 266 - 27/11/11
stanaami
 
PrĂĄctica de parentesco copia
PrĂĄctica de parentesco   copiaPrĂĄctica de parentesco   copia
PrĂĄctica de parentesco copia
UGMA.
 

Andere mochten auch (20)

HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?
HackInTheBox -  AMS 2011 , Spying on SpyEye - What Lies Beneath ?HackInTheBox -  AMS 2011 , Spying on SpyEye - What Lies Beneath ?
HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?
 
Browser Malware Taxonomy
Browser Malware TaxonomyBrowser Malware Taxonomy
Browser Malware Taxonomy
 
Toorcon Seattle 2011 - Browser Exploit Packs
Toorcon Seattle 2011 - Browser Exploit PacksToorcon Seattle 2011 - Browser Exploit Packs
Toorcon Seattle 2011 - Browser Exploit Packs
 
OWASP AppSec USA 2011 - Dismantling Web Malware
OWASP AppSec USA 2011 - Dismantling Web MalwareOWASP AppSec USA 2011 - Dismantling Web Malware
OWASP AppSec USA 2011 - Dismantling Web Malware
 
Elsevier NESE - Spying on the Browser
Elsevier NESE - Spying on the BrowserElsevier NESE - Spying on the Browser
Elsevier NESE - Spying on the Browser
 
Malvertising - Exploiting Web Advertising | Elsevier Computer Fraud and Secur...
Malvertising - Exploiting Web Advertising | Elsevier Computer Fraud and Secur...Malvertising - Exploiting Web Advertising | Elsevier Computer Fraud and Secur...
Malvertising - Exploiting Web Advertising | Elsevier Computer Fraud and Secur...
 
NGR Bot Analysis Paper
NGR Bot Analysis PaperNGR Bot Analysis Paper
NGR Bot Analysis Paper
 
ToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android InfectionsToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android Infections
 
OWASP App Sec US - 2010
OWASP App Sec US - 2010OWASP App Sec US - 2010
OWASP App Sec US - 2010
 
DEF CON 20 - Botnets Die Hard - Owned and Operated
DEF CON 20 - Botnets Die Hard - Owned and OperatedDEF CON 20 - Botnets Die Hard - Owned and Operated
DEF CON 20 - Botnets Die Hard - Owned and Operated
 
Bondy
BondyBondy
Bondy
 
Prezentacja1
Prezentacja1Prezentacja1
Prezentacja1
 
Tefen anfahrt
Tefen anfahrtTefen anfahrt
Tefen anfahrt
 
Proposta de exame ccss 1Âș avaliaciĂłn Alberto Rivas
Proposta de exame ccss 1Âș avaliaciĂłn Alberto RivasProposta de exame ccss 1Âș avaliaciĂłn Alberto Rivas
Proposta de exame ccss 1Âș avaliaciĂłn Alberto Rivas
 
Programa Bandera Euskadi Basque Country
Programa Bandera Euskadi Basque CountryPrograma Bandera Euskadi Basque Country
Programa Bandera Euskadi Basque Country
 
Ppt publishing house research
Ppt   publishing house researchPpt   publishing house research
Ppt publishing house research
 
O sonho de mariana
O sonho de marianaO sonho de mariana
O sonho de mariana
 
Gd newsletter nov11
Gd newsletter nov11Gd newsletter nov11
Gd newsletter nov11
 
Boletim 266 - 27/11/11
Boletim 266 - 27/11/11Boletim 266 - 27/11/11
Boletim 266 - 27/11/11
 
PrĂĄctica de parentesco copia
PrĂĄctica de parentesco   copiaPrĂĄctica de parentesco   copia
PrĂĄctica de parentesco copia
 

Ähnlich wie Commercial Cyber Crime - Social Networks Malware

Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...
UltraUploader
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
karenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
croysierkathey
 
Gg2511351142
Gg2511351142Gg2511351142
Gg2511351142
IJERA Editor
 
Gg2511351142
Gg2511351142Gg2511351142
Gg2511351142
IJERA Editor
 

Ähnlich wie Commercial Cyber Crime - Social Networks Malware (20)

Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
 
Gg2511351142
Gg2511351142Gg2511351142
Gg2511351142
 
Gg2511351142
Gg2511351142Gg2511351142
Gg2511351142
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attack
 
cyber crime
cyber crime cyber crime
cyber crime
 
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
 
Em36849854
Em36849854Em36849854
Em36849854
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
PC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To CompromisePC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To Compromise
 
2013 Threat Report
2013 Threat Report2013 Threat Report
2013 Threat Report
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 

Mehr von Aditya K Sood

Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
Aditya K Sood
 
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...
Aditya K Sood
 
Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...
Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...
Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...
Aditya K Sood
 
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
Aditya K Sood
 
Dissecting Java Server Faces for Penetration Testing
Dissecting Java Server Faces for Penetration Testing Dissecting Java Server Faces for Penetration Testing
Dissecting Java Server Faces for Penetration Testing
Aditya K Sood
 
VxWorks - Holistic Security (Art of Testing)
VxWorks - Holistic Security (Art of  Testing)VxWorks - Holistic Security (Art of  Testing)
VxWorks - Holistic Security (Art of Testing)
Aditya K Sood
 
Art of InfoJacking, Source Conference Seattle, 2011
Art of InfoJacking, Source Conference Seattle, 2011Art of InfoJacking, Source Conference Seattle, 2011
Art of InfoJacking, Source Conference Seattle, 2011
Aditya K Sood
 
ISSA Journal Paper - JavaScript Infection Model
ISSA Journal Paper - JavaScript Infection ModelISSA Journal Paper - JavaScript Infection Model
ISSA Journal Paper - JavaScript Infection Model
Aditya K Sood
 
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
Aditya K Sood
 

Mehr von Aditya K Sood (20)

Emerging Trends in Online Social Networks Malware
Emerging Trends in Online Social Networks MalwareEmerging Trends in Online Social Networks Malware
Emerging Trends in Online Social Networks Malware
 
Enfilade: Tool to Detect Infections in MongoDB Instances
Enfilade: Tool to Detect Infections in MongoDB InstancesEnfilade: Tool to Detect Infections in MongoDB Instances
Enfilade: Tool to Detect Infections in MongoDB Instances
 
Detecting Ransomware/Bot Infections in Elasticsearch
Detecting Ransomware/Bot Infections in ElasticsearchDetecting Ransomware/Bot Infections in Elasticsearch
Detecting Ransomware/Bot Infections in Elasticsearch
 
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
 
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
 
Network Security : Book Review : Targeted Cyber Attacks : Aditya K Sood
Network Security : Book Review : Targeted Cyber Attacks : Aditya K SoodNetwork Security : Book Review : Targeted Cyber Attacks : Aditya K Sood
Network Security : Book Review : Targeted Cyber Attacks : Aditya K Sood
 
Abusing Glype Proxies - Attacks, Exploits and Defences
Abusing Glype Proxies - Attacks, Exploits and DefencesAbusing Glype Proxies - Attacks, Exploits and Defences
Abusing Glype Proxies - Attacks, Exploits and Defences
 
NIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin Magazine
NIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin MagazineNIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin Magazine
NIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin Magazine
 
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
 
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
 
Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
 
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...
 
Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...
Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...
Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...
 
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
 
PenTest Magazine Teaser - Mobile Hacking
PenTest Magazine Teaser - Mobile HackingPenTest Magazine Teaser - Mobile Hacking
PenTest Magazine Teaser - Mobile Hacking
 
Dissecting Java Server Faces for Penetration Testing
Dissecting Java Server Faces for Penetration Testing Dissecting Java Server Faces for Penetration Testing
Dissecting Java Server Faces for Penetration Testing
 
VxWorks - Holistic Security (Art of Testing)
VxWorks - Holistic Security (Art of  Testing)VxWorks - Holistic Security (Art of  Testing)
VxWorks - Holistic Security (Art of Testing)
 
Art of InfoJacking, Source Conference Seattle, 2011
Art of InfoJacking, Source Conference Seattle, 2011Art of InfoJacking, Source Conference Seattle, 2011
Art of InfoJacking, Source Conference Seattle, 2011
 
ISSA Journal Paper - JavaScript Infection Model
ISSA Journal Paper - JavaScript Infection ModelISSA Journal Paper - JavaScript Infection Model
ISSA Journal Paper - JavaScript Infection Model
 
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
 

KĂŒrzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

KĂŒrzlich hochgeladen (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Commercial Cyber Crime - Social Networks Malware

  • 1. Commercial Crime International Cybercrime Online Social Networks – Launch pads for Malware The advent of social networks Social networks hold a plethora of personal information on the users that has turned the online world form the network. Individual connections between users collectively form into a virtual society. And a web of connections. To build each link between users an implicit trust whilst social networks serve is required between the two users and implicitly across the entire network. as seamless communication Any information provided by an individual user through chained connec- tions becomes a part of the full network. If an attacker is able to exploit channels, they are also an ideal one user in the social network, they have the potential to be able to launch pad for malware push malicious content (such as malicious URL’s) into the network. infections. There has been a The connectivity of the network enables the spread of the exploitation. tremendous increase in the That is, the attacker exploits the weakest link in the chain. This exploita- dissemination of malware tion process is aided by the inability of users (and their stored objects) infections through social net- to determine the legitimacy of content flowing through the social network. works. But the security and The infection process begins with the exploitation of human ignorance privacy mechanisms of social and curiosity followed by spreading of the infection through the trust networks have proven insuffi- upon which the network is based. cient to prevent exploitation. Aditya Sood and Richard In order to start the exploitation process, an attacker can pick any issue Enbody explain the dangers. that affects human emotions to drive the user in a social network to follow the path generated by the attacker. Topics such as weather calamities, political campaigns, national affairs, medical outbreaks and financial transactions are used for initiating infections. Phishing and spamming are used extensively for spreading messages on these topics with malicious intent. Basically, it is a trapping mechanism used by attackers to infect an entire online social network. Exploit Mechanisms – The Art of Infection Since social network exploitation begins by exploiting an individual user’s trust, curiosity, or ignorance common attack strategies have emerged: One of the simplest infection techniques is the injection of malicious URLs into a user’s message wall. Since it can be difficult to differentiate between the legitimate URLs and illegitimate ones, even a careful user can be tempted to click on the link. Unfortunately for the user, clicking the hyperlink can result in automatic download of malware from a mali- Aditya K Sood is a senior security cious domain through the browser. researcher and PhD candidate at Browser Exploit Packs (BEP) hold a number of browser-based Michigan State University. He is also exploits that are bundled together to customise the response to a victim. a founder of SecNiche Security Labs, When a user visits a malicious domain, the BEP fingerprints the browser an independent arena for cutting version and the related environment of the user machine. Based on this edge computer security research. information, a suitable exploit is served to the user which exploits the integrity of that particular browser. Drive-by-Download attacks are triggered by visiting a malicious page. They exploit browser vulnerabilities in plugins and built-in compo- nents. Successful exploitation of the vulnerability results in the execution of shell code that in turn downloads the malware into the system. A variation of the Drive-by-Download attack is the Drive-by-Cache attack that can exploit browser cache functionality in order to execute malware. Malicious advertisements (malvertisements) are yet another tech- nique to spread malware infections through online social networks. When an attacker injects the malicious link in a user message board, it is linked to a third party website which has malicious advertisements embedded in it. These advertisements are further linked to malicious JavaScripts that are retrieved by the browser, which executes the malicious content Richard J. Enbody Ph.D, is associ- Richard Enbody, in the context of running browser with the user’s privileges. ate professor in the Department of Computer Science and Engineering The biggest problem with the online social networks is that they do not at Michigan State University (USA). have sufficient built-in protection against malware. For example, current continued on page 12/ December 2011 More information online at www.icc-ccs.org 11
  • 2. Cybercrime from page 11 EDF fined for hacking Greenpeace EDF, the French energy firm, UK’s executive director, John was recently fined Euro 1.5 million Sauven, said: “The evidence social networks do not scan the by a Paris court for spying on presented at the trial showed that URL’s and embedded content Greenpeace. It must also pay the espionage undertaken by EDF coming from third party servers Greenpeace Euro 500,000 in dam- in its efforts to discredit Greenpeace such as Content Delivery Networks. ages. Two EDF employees were was both extensive and totally Therefore, there is no mechanism jailed, along with the head of the illegal. The company should now to detect the authenticity of URL’s company they hired to hack into the give a full account of the spying that are passed as message con- environmental charity’s computers. operation it mounted.” tent among the user objects in the online social networks. In addition, it EDF was charged with complicity Whilst anti-nuclear activists are is easy to upload malvertisements, in concealing stolen documents and reportedly furious at what EDF did, and social networks fail to raise complicity to intrude on a computer a security expert has commented any warning. Online social networks network. It was claimed the com- that the only real surprise is that are not harnessing the power of pany had organised surveillance this sort of trojan-assisted industrial Safe Browsing API’s from Google not only of Greenpeace in France, espionage has not reached the or similar services to instantiate a but broadly across Europe since courts before. verification procedure before post- 2004. And it was stated that in ing a URL back to a user profile. 2006, EDF hired a detective agency, Philip Lieberman said that the case Lack of such basic protections is Kargus Consultants, run by a former is notable because the saga started a key factor in making the social member of France’s secret services, more than five years ago. And, he networks vulnerable to exploitation. to find out about Greenpeace wondered, how many other cases of Finally, many social network users France’s intentions and its plan trojan-assisted industrial espionage are not knowledgeable enough to block new nuclear plants in the have been carried out in recent to differentiate between real and UK. The agency allegedly hacked years. What does this case tell us? malicious entities. Ignorance not the computer of Yannick Jadot, Quite simply that trojan-assisted only results in exploitation, but also Greenpeace’s then campaigns infections are almost certainly an greatly impacts the overall security director, taking 1,400 documents. integral part of the modern-day of online social networks. Because private detective’s IT arsenal when of the high connectivity and need At the trial, EDF said it had been conducting industrial espionage,” for trust in a social network users victim of overzealous efforts, and he said. And we should ask whether are particularly dependent on the had been unaware anyone would terrorists are using the same tech- built-in security features of online hack a computer. But Greenpeace niques to assist their campaigns. social networks, but the security features are not tough enough to thwart many malware attacks. Conclusion Robust security and privacy mecha- nisms are indispensable for safe Published monthly by Commercial Crime Services, online social networking. Built-in Cinnabar Wharf, 26 Wapping High Street, London E1W 1NG, UK. security is necessary because Tel: +44 (0) 20 7423 6960 Fax: +44 (0) 20 7423 6961 attackers exploit the trust, curiosity Website: www.icc-ccs.org Email: ccs@icc-ccs.org Website: www.icc-ccs.org and ignorance to garner maximum Editor: Andy Holder Email ajholder@gmail.com profit. User awareness regarding security concerns is important but ISSN 1012-2710 can only spread gradually, so social No part of this publication may be reproduced, stored in a retrieval system, or translated in any form or by networks should be proactive and any means, electronic, mechanical, photocopying, recording, or otherwise without the prior permission of the publishers. develop more sophisticated and stringent mechanisms to thwart While every effort has been made to check the information given in this publication, the authors, editors, malware infections. Safe and secure and publishers cannot accept any responsibility for any loss or damage whatsoever arising out of, or transmission of the information and caused by the use of, such information. Opinions expressed in Commercial Crime International are those of robust user’s privacy should be the the individual authors and not necessarily those of the publisher. paramount concern of the social Copyright 2011. All rights reserved. networking companies.