Advertisment

We are monitoring Internet threat landscape for outbreaks of Koobface and other malware

author-image
DQW Bureau
New Update



Advertisment

What are the popular ways that spammers have leveraged on social
networking sites to target victims?

Spammers have leveraged social networking sites in many ways to send spam.
One of the popular methods is fake invitations which usually contains a link
that redirects to the user to spam website. This vector targets all users,
regardless of whether they have an account or not. Other popular methods being
sending spoofed 'Merge account' notification, fake photo tag/comment messages,
third party applications, and delivering notifications to spread malware. In one
example, spammers sent messages prompting users to download a social networks
toolbar, which was actually a Trojan.

Has Symantec come across any new techniques used by cyber criminals
targeting social networking site users?

Symantec, recently, witnessed an instance of botmasters tweeting their
commands to zombie computers, through smartphones. Symantec has detected a new
Trojan botnet creator tool, called "TwitterNet Builder." The threat, called
Trojan. Twebot, uses a Twitter account to issue instructions to the Trojans
created by the builder. When building Trojan. Twebot, the user is able to supply
a public Twitter account for Trojan. Twebot to follow. Because Trojan. Twebot
does not try to obfuscate commands on Twitter, it will not be difficult for
security staff to find and close accounts abusing their service in this way.
Cyber criminals are also leveraging social networking sites to drop Trojans into
unsuspecting users' systems. For example, spam e-mails such as the one on the
left have been doing the rounds on the Internet hoping to lure recipients into
downloading a Facebook toolbar.

Advertisment

What are the new things that cyber criminals look at when attacking users
other than passwords or email addresses?

Apart from passwords and e-mail IDs, cyber criminals could be looking at
tricking users into revealing their credit card information with tempting offers
— ranging from discounted goods to attractive job options. They could also look
at fooling victims into parting with their money to purchase
counterfeit/ineffective products. Since social networking sites are trusted
environments, they have also become a playground for cyber criminals to carry
out social engineering attacks. More and more, attackers are going directly
after the end user and attempting to trick them into downloading malware or
divulging sensitive information under the auspice that they are doing something
perfectly innocent.

A year has passed since Koobface was first detected; yet it's still
active. What is Symantec doing in this regard?

The Koobface worm infects users by using social engineering attacks. It
spreads by abusing social networking websites or by employing search engine
optimization techniques to lure potential victims to malicious sites. Symantec's
security products are designed to remove malware such as Koobface by disabling
system restore (Windows Me/XP), updating virus definitions, running a full
system scan and deleting any values added to the registry.

The company is also constantly monitoring Internet threat landscape for
outbreaks of Koobface and other malware through Global Intelligence Network,
which includes researchers throughout the world collecting information about
online fraud, malicious code and security risks, analyzing them to figure out
how they work, and then developing real time updates to Symantec products that
protect computers at homes and in workplaces around the world.

Advertisment

What are the simple steps a user can take to check a malicious mail?

One of the ways to check malicious mail is to unsubscribe from legitimate
mailings that you no longer want to receive. When signing up to receive mail,
verify what additional items you are opting for at the same time. Deselect items
that you do not want to receive. Further, one should avoid publishing e-mail
address on the Internet and delete all spams regularly. One should avoid
clicking on suspicious links in e-mails or IMs as these may be links to spoofed
websites.

When visiting a website it is better to type the Web addresses directly into
the browser rather than relying upon links within messages.

Sharath Kumar

Source: CIOL

Advertisment