Facebook is the new playground for phishers. Why? The social networking site has made things relatively easy for computer criminals. So far, the consequences have been relatively mild — mostly, some annoying emails. But if facebook and other social networking sites don’t get a handle on security issues soon, a serious outbreak could occur.
Behind every successful criminal computer hack a simple two-step process: gain trust, then exploit that trust with an attack. Computer criminals will tell you that gaining trust is the hard part. Consider a real-world parallel: Breaking into a bank is difficult. But if you befriend a guard, he’ll eventually let you walk right in through the front door.
That’s why facebook attacks are so easy, says Mary Landesman, senior researcher at computer security firm ScanSafe.
“Facebook users assume a level of trust they just should not assume when using the site,” she said.
Phishing attacks have been popping up nearly every week on Facebook and other social sites like Twitter. Victims receive e-mails from friends with innocent-sounding messages, such as “click on this video.” Those who are duped then surrender their login information on a rogue Web site, and then a criminal is off to the races with their identity.
People who would never fall for an old-fashioned phishing note are getting tripped up by Facebook phish for one simple reason: They trust the sender.
“People are pretty unguarded in the social networking environment,” said Kevin Haley, director of Symantec Corp.’s security response team. “You figure you’re surrounded by friends, so why have your guard up?”
He likened Facebook attacks to scam artists that prey on church communities, where members typically share a high level of trust.
By creating what looks like a safe, fun environment, Facebook has created an ideal breeding ground for phishing attacks. In fact, some Facebook software even helps the cause. For example, Facebook makes it relatively easy to send messages to groups of friends, or to post notes that appear on their Web pages. That means one stolen login account can lead to a lot of trouble.
Worse yet, some of the techniques Facebook employs fly directly in the face of accepted security practices. Facebook regularly sends e-mail to users with links in the message. “To follow the comment thread, follow the link below,” reads a typical note. Clicking on the link then prompts users to log in.
That is precisely the formula phishers use to trick victims into divulging their passwords — an e-mail with a link that leads to a login page.
The Facebook method is a recipe for disaster. It’s difficult for users to tell the difference between a legitimate Facebook message and a phishing e-mail. That’s why many banks stopped sending e-mails with links years ago. And in general, that is why e-mail is no longer regarded as a secure form of communication — outside the social networking universe, anyway.
But Facebook has trained their users to click on links in e-mail. And with the steady advance of third-party applications that require sharing of data, Facebook has trained users to play fast and loose with personal information, too.
“We’ve barely gotten users to the point where they have a basic understanding of passwords, and the idea of not using the same password for everything,” Landesman said. Facebook’s use of e-mail and links “is a huge contributing factor (to the phishing problem).”
Facebook could make a simple change and stop many of these phishing attacks — all notification e-mails could say simple “login on our homepage to see the message,” for example, forcing users to always arrive at the site the old-fashioned way — by typing in www.facebook.com in a Web browser’s address bar.
This wouldn’t eradicate phishing. E-mails within Facebook’s system sent between users also include links, and these could also lead to trouble. Because linking to articles is such an important part of Facebook use, there’s no realistic way for Facebook to abolish all e-mail links. But anyone who clicks on such a link sent from within Facebook’s system wouldn’t need to log in again. Over time, users would learn there’s never a need to supply their password after clicking on a link, and wouldn’t be primed to do so when a phisher’s e-mail arrived.
Things could be much worse
So far, most Facebook scams have been designed to steal passwords. But the next successful scam e-mail could be much worse. It could lead users to a cleverly designed Web site booby-trapped with a nasty virus that deletes files or finds its way around a victim’s PC and steals credit card information. Such an attack wouldn’t require the victim to log in; merely visiting the page would be enough.
Of course, these are the same hazards that Internet users face every day — supplying login information to impostor Web sites is bad, landing on booby-trapped Web sites even worse. But Facebook users are especially vulnerable, because they trust the site and their friends. The firm bears responsibility to act before the problem gets worse.
Facebook isn’t entirely to blame, of course. Some of it is old-fashioned techno-naivete. Users tend to be too trusting when a new technology arrives. Just two months ago we celebrated the 10th anniversary of the Melissa virus, the first e-mail worm that really shut down the entire computing world. Its method sounds quaint — or even silly — today. The Melissa message, which appeared to come from a co-worker or friend, read simply: “Here is that document you asked for … don’t show anyone else ;-).” Few Net users would fall for that trick in a standard e-mail today. But Facebook users are falling for very similar criminal tactics because they are working in a new medium. Many will have to touch this new stove and find out that, here too, they can be burned.
Here, too, Facebook is a victim of its own success. Mary Landesman points out that because nearly all Facebook messages are legitimate, recipients are much more likely to fall for the occasional e-mail trap. On the other hand, most traditional e-mail messages are spam (80 to 90 percent) and most inboxes are full of malicious messages, so consumers are much more wary when using regular e-mail.
“The fact that a majority of Facebook correspondence is still valid gives people a false sense of security,” she said.
Facebook didn’t ask for the job of Internet security cop, but that’s the job the company has now. So far, phishing attempts have been clumsy, often marked by broken English and silly-looking URLs. One recent message urged recipients to click on a link with arcane labels like “Check 121.im.”
But this weekend, a more sophisticated version included a link that looked like this:
(We’ve altered the link so it doesn’t work)
Notice how believable the link is. It appears to link users to Facebook.com, when in fact it sends clickers to a Web site in Russia (Web browsers ignore all the characters before the semicolon in a link). Expect a steady progression in phishing techniques during the next few months.
Facebook is taking some actions to ward off disaster. It hired security firm MarkMonitor, which has experience in getting phishing Web sites removed from the Internet. The firm says it’s already removed 240 phishing sites since the beginning of the year. When it discovers an ongoing phishing attack, Facebook reaches into users’ inboxes and removes the harmful messages. Because it’s a closed system, that technique is effective at preventing a large outbreak, at least on messages from within Facebook.
But the technology is limited and reactive. Facebook can only shut down an attack after it has started. And it can’t remove notification e-mails that are sent outside its systems, leaving users who get those e-mails still vulnerable.
Facebook is hardly the only social networking site with a problem. Twitter, which was hit this weekend by the same Russian video phishing note as Facebook, also makes things easier for crooks. Last week, security firm Trend Micro said that 13,000 Twitter users were hit by the so-called Twittercut phish, which promised to help clickers quickly gain 1,000 new followers.
Because there are multiple domains that can be used to log in to a Twitter account, Landsman points out, users are less likely to be skeptical of a link to an unusual Web site.
But Facebook is the 800-pound gorilla with the 200 million users. It should set the tone for a new set of social networking security standards. It should stop pushing users to share information with third-party applications, stop using e-mail links as a main tool of communication, and work harder to educate users about the risks they’ll encounter while using the site.
RED TAPE WRESTLING TIPS
The oldest of all Web security advice still applies. Never click on a link you didn’t expect, even if it comes from an old friend. Always type in Web addresses manually. Think before you click. Count to five if you have to.
Landesman also says that social network site users should avoid what she calls “promiscuous friending.” The wider your network of friends, the more likely one of them will get hit with a virus and their computer will attack yours. Limit your friends and you’ll limit your exposure.
This article was completely taken from MSNBC Red Tape Chronicles / WHY PHISHERS LOVE FACEBOOK by Bob Sullivan http://redtape.msnbc.com/2009/06/my-entry.html#posts