
In our first article we explored how
social networks can be described as powerful communication tools capable of
reaching clique groups and/or vast audiences instantaneously and globally. We
explored two theories behind social networking:
- Social networks as a powerful tool enabling citizens to coordinate their observation and management of government(s) and corporations, and where deemed necessary, coordinate (non-violent) struggle against perceived injustices; and
- Social networks as a powerful tool custom-built for exploitation by governments and powerful organisations to monitor individual, group, regional, and global sentiments and trends.
We then explored a variety of ways
governments are interacting with social media, ranging from government
interference in the activities of the major social networking companies;
adoption of tools for monitoring of communications over social
networking; implementation of methods for the direct analysis of social
networks through active infiltration; seeking legal authority to install
software on your computer without your permission; and even preventing access
to social media.
In this article, we discuss methods
being employed to infiltrated user accounts, and the potential impact
infiltration can have on people and organisations on a potentially massive
scale.
Countless criminal organisations
have used social networks for all kinds of social engineering attacks with the
intent of gathering sensitive information, or to spread malware or steal
financial information from users.
“Social engineering” is an act of
psychological manipulation. All social engineering techniques are based on
specific attributes of human decision-making known as cognitive biases. These
biases, sometimes called “bugs in the human hardware”, are exploited in various
combinations to create cyber attacks that exploit weaknesses in both computers
and humans simultaneously.
Popularity
can have its down side
Are you excited about the new
‘friend request’ from that attractive looking stranger in your Facebook account?
An experiment, over a short eight-week period, by researchers at British
Columbia University in Canada, simply created 102 ‘fake’ Facebook user accounts
referred to as Socialbots, with the sole intent of making as
many friends as possible and harvesting data. The Socialbots began contacting
Facebook users by making random ‘friend requests’ and were accepted by one in
five people they contacted. Once the Socialbot made some “friends”, it
increased its number of friends by using the social networks of those users who
accepted it, befriending the friends of friends.
These friend requests by the now
popular Socialbot were far more likely to be accepted. The research team found
that a staggering 60-80 per cent of these requests were successful. As a
result, they were able to harvest 46,500 email addresses and 14,500 physical
addresses from users’ profiles, including a massive 250Gb of personal data.
What is critical to understand is that this information can be gathered AS SOON
as the friend request is accepted. Then a copy can be stored offline, for later
recall at any time. Therefore the actual owner can no longer recover, or change
or delete that personal data that someone may have recorded. Facebook’s
“Facebook Immune System”, the massive security system protecting users, and
which checks some 25 billion actions every day, did not detect the infiltration
of the Socialbots. This demonstrates a very simple but effective capability to
attack people at random. (We will talk about targeted attacks shortly below.)
Indiscriminate
attacks in the wild
The well-known Socialbot malware, called the “Koobface” virus, is specifically created to
target social network platforms. Unlike most other malware, Koobface spreads
“actively” by delivering messages to people who are “friends” of a user whose
computer has already been infected. Targeted social network platforms include
Facebook, MySpace and Twitter as well as others. Once the host has been
infected, Koobface connects back to so-called command and control servers
(C&C), or receives directives on actions to perform or to upload
compromised information. In this way the agent is able in a short time to build
its own botnet, a huge number of Internet computers that, although their owners
are unaware of it, have been set up to forward spam or viruses to other hosts
on the Internet.
The most common infection method is
via fake content on a compromised web site. It is sufficient to click on one of
the links that Koobface has posted on the fake web site. Typically, this link
would attract users by offering a download of a cool video or application. If
they then download and execute the file, Koobface infects their system.
This malware is a typical example of
an agent that could be used:
- by cyber crime to monetise an assault to social networks platforms; and
- by governments to infiltrate social networks to perform intelligence operations, or to spread viruses developed with cyber espionage intent.
Let’s recall a case in recent months
when a Nato chief’s personal details were exposed thanks to a series of attacks
moved through social network platforms.
Targeted
attacks
As the Nato chief example proves,
social engineering techniques can also be used to target specific individuals.
In the first phase of the attack, a little bit of research is required to
determine the target’s “position” in society, and their likely “network” of
superiors, respected peers and colleagues. Once the attacker has identified
those people who are “important” to the target, a series of fake accounts are
created on the social network. Remember that more than one person can be called
by the same name. Furthermore, much of the data you need to create the fake
account (name, face, activities) is already public on other social networks. In
the case of Nato’s most senior commander, several fake Facebook accounts for
several of his colleagues were created, apparently by Chinese spies.
In a second phase of the attack, the
fake accounts try to contact the real one, by establishing a relationship. This
is exactly what happened when Senior British military officers and Ministry of
Defence officials accepted “friend requests” from the bogus account for
American Admiral James Stavridis.
At this point, the infiltration
attack has now been successfully executed. As a result, it is now possible to
steal sensitive information such as personal e-mail account addresses, photos,
messages, knowledge of the targets network of friends, which are all potential
future targets for subsequent phases of the attack.
Similar “social engineering”
incidents are worrying and show how vulnerable even the higher echelons of
strategic command can be.
There are some risks you face when
your “trusted” social network platform has a data breach:
An interesting case study occurred
when the professional social network LinkedIn was recently hacked, and users’
passwords stolen and leaked on the Internet. The company, through its blog,
confirmed the event, declaring that more than six million passwords were
compromised.
The LinkedIn hack is considered
particularly serious, because the popular social network focuses on
networking people in a business/professional context. LinkedIn members share
information about their professions and employments both in private business
and in governments. Each public association between user accounts acts as a
type of credential establishing a person’s standing and credibility in the
community as previously described.
Accessing a LinkedIn account can
expose significant information on the (potential) victims, their relations, and
participation in events and discussions related to specific ‘closed’
professional areas, with their inherent privacy levels. It is clear that the
information could represent the basis for other types of attacks,
and cyber espionage.
Another real risk is the possibility
of a massive phishing campaign being launched during these ‘compromised’
hours, inviting LinkedIn users to change their passwords, potentially providing
additional information to the criminal. Typically, such campaigns may include
strategic dissemination of additional malware types, typically via an e-mail
with a link (although this hypothesis has been excluded by LI) which redirects
him to the infected web site.
Ultimately, all this information
that has been garnered can be *stored forever* and utilized for a multitude of
reasons, to the benefit of the criminals and the perpetrators of your
infiltrated account and private information and network of friends and
colleagues.
What can you do to avoid being
compromised or exploited?
- Actively manage your privacy settings
- Don’t accept friend requests from random people. Share your data with fewer people, and only those that you really do know. Confirm with your friend via SMS / phone, before accepting online. Actually know the people you are befriending! Follow up any flagged concerns you may have about a friend’s online behaviour – they may not be who you think they are, or their account may have been compromised.
- Think before you click. Never click on suspicious links. Just because they “purportedly” came from a friend or organisation you know, does not make them safe. Report any abuse to the network service provider. You will be helping others be safer as well.
- Never enter your username/password on a site that is not using the URL of your social network provider.
- Always update your browsers and anti-virus to latest versions as they can protect against phishing and other attacks.
- Clear and delete old social network accounts. Over time you stop using accounts for one reason or another. Make sure the social network provider deletes them.
- Don’t assume your online correspondence is private. Many accounts have a default setting to ‘share’ (indiscriminately publish) when first created. Anything shared can be saved (and stored for ever), copied, and can of course even be indexed by search engines.
- Don’t share your location. Turn off broadcast features. Don’t leave notes saying you are on holiday. This is an invitation for criminals to visit your home.
Be sure to read our next article in
this series where we explore the *physical* risks associated with online social
networking.
0 comments → Social Networks Part 2 – Have you been infiltrated?
Post a Comment