- Pressemitteilung BoxID 497660
Facebook Facelift: Ice IX Malware Injects Fake Page to Commit Credit Card Fraud
The global reach and scale of the Facebook service has made it a favorite target of fraudsters. Trusteer recently wrote about criminals stealing e-cash vouchers from Facebook users and selling bulk Facebook login credentials.
This latest attack uses a web injection to present a fake web page in the victim's browser. The form requests the user provide their cardholder name, credit/debit card number, expiry date, CID and billing address. The attackers claim the information is needed to verify the victim's identity and provide additional security for their Facebook account.
For anyone who believes the cybercrime economy lacks the sophistication of the legitimate economy, the following marketing video provides conclusive evidence that it does not. Trusteer discovered this video circulating in underground forums. It demonstrates in step by step fashion a webinject cycle performed to attack Facebook users.
The video begins at the Facebook logon page with the criminal logging-in to a Facebook account.
Next, the video demonstrates the pop up created by the webinject that is being offered for sale. This pop up presents virtually the same message used in the Ice IX configuration Trusteer researchers discovered and analyzed. The only difference is the version in the video requests a social security number and date of birth, in addition to the information mentioned earlier. In the video, the criminal fills out the fields.
Finally, the information entered in the pop up is shown being delivered to the fraudster's messenger application.
"This video illustrates the seamless sophistication of pre-built webinjects that are readily available for purchase on the internet," said Trusteer CTO Amit Klein. "It also demonstrates how accomplished criminals are at marketing their malware products. Most of all, this attack highlights how fraudsters are branching out from their 'bread and butter' online banking schemes into lateral applications with much larger user populations. By attacking Facebook and other ubiquitous social networks fraudsters can tap a massive pool of victims. They can also use the information harvested from social network users to perpetuate fraud on multiple in fronts including online banking, retail, and even to penetrate enterprise and government networks."
Trusteer contacted Facebook to advise them that they would be mentioned in this blog. Facebook requested that they pass on some information about their site's security measures. Here's a summary of their response:
i) Facebook actively detects known malware on users' devices to provide Facebook users with a self-remediation procedure including the Scan-And-Repair malware scan. To self-enroll in this check point please visit - on.fb.me/AVCheckpoint
ii) Please advise your readers to report to Facebook any spam they find on the Facebook site, and remember Facebook will never ask for your credit card, social security, or any other sensitive information other than your username and password while logging in.
Diese Pressemitteilungen könnten Sie auch interessieren
Inhalt des Workshops: Ohne Internet geht nichts, aber Cybercrime, Malware, neuartige Attacken, und Achtung: Malware, die auch von gut beleumundeten Seiten kommen...
Match & Meet: NovaStor bietet Backup- und Storage-Händlern eine neue Plattform zum Wissens- und Erfahrungsaustausch
Die Auftaktveranstaltungen zu NovaStors neuer Match & Meet Veranstaltungsserie finden am 03. Juni 2013 in Frankfurt am Main und Heidelberg sowie am 05. Juni 2013...
. - Erhalten Sie das neueste Update zum Thema Bekämpfung von Produktfälschungen Gefälschte Druckverbrauchsmaterialien sind eine ernste Bedrohung für Unternehmen...