12
Social Media Attacks By Laura Jung

Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks

Embed Size (px)

Citation preview

Page 1: Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks

Social Media AttacksBy Laura Jung

Page 2: Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks

How the Attacks StartPopularity of these sites with millions of users

makes them perfect places for cyber attacks or cybercriminal activities

Typically happen when user log in to their social networking sites like Facebook or Twitter

Users encounter malicious posts while browsing people’s profiles

Page 3: Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks

ContinuedPosts usually include malicious URLs that can

lead to malware download pages or can trigger spamming routines

Cyber criminals have started using public interest in social media to send spammed messages from a legitimate social media site

Page 4: Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks

Types of Attacks: Facebook

Lifejacking attacks: Cybercriminals are making creative and interesting posts to use as bait such as celebrity news or popular events

Once clicked, the user is becoming an accomplice to the attack because the spam is automatically reposted on their wall and their contacts’ wall as well

A popular version of this attack causes users to like a post without the users’ consent

Sometimes this will lead users to survey sites which the cybercriminal can even profit from

Page 5: Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks

Facebook: Rogue Applications

Rogue Applications: On social media sites, users are able to play games that have open platforms where almost anyone can submit applications

Cybercriminals use this to set up applications that can be used for spamming or phishing attacks.

Page 6: Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks

Facebook Chat AttacksOne of the most common attacks occurs on

Facebook chat because cybercriminals can strike up conversation with friends and communicate with their contacts in real time

Chat messages can be used to spread malware or promote phishing applications by impersonating you on chat and messaging your contacts the spam or malware to your contacts.

Have been able to impersonate security team of social media sites in the past.

Page 7: Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks

Facebook Chat Attacks Viral spam chain: where if you click a link on

Facebook it will send out massive spam to your Facebook connections

To prevent it make sure you do not open these type of links, which usually have the old Facebook look

Page 8: Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks

Example

Page 9: Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks

Results

Page 10: Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks

TwitterSpammed Tweets: Despite the short character

count many cybercriminals have found a way to use this to their advantage by creating short compelling posts with links. ( free vouchers, weight loss programs)

Malware downloads: Twitter is also used to spread malicious malware download links similar to Facebook.

Page 11: Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks

KOOBFACEMost popular type is KOOBFACE, which is a

multiplatform worm that targets both Facebook and Twitter, which leads users to fake YouTube page where they can download the malware

KOOBFACE is dangerous because it is capable of stealing personal information from your social media pages such as email, interests, employer.

Page 12: Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks

Prevention Use basic online precautionary measures

Users need to watch out for bogus notifications

When looking at other people’s pages, user needs to realize not everything on pages is safe.

Users should make sure to protect the privacy of their data and to remember that anything posted is publically available.

Think and analyze before you click the link

Understand the security settings and avoid sharing personal details.

If you notice it report it to the site’s security team.