Social networking breeds new wave of 'Trojan 2.0' attacks

The great Facebook boom of 2007 has been accompanied by a new generation of phishing and trojan horse virus attacks, according to security experts.

In its review of the year, MessageLabs noted that websites such as Facebook, Linked-In, and Plaxo presented rich pickings for identity thieves looking to gather personal information.

As the same company warned in November, scammers are now researching their targets and attempting to lure them to infected websites that will download invasive code to their personal computers. MessageLabs tracked several attacks on senior executives, including one aimed at 1,000 individuals in the finance sector during November 2007.

During the year, MessageLabs identified an average of 1,253 new web sites per day that harbored malware, equating to nearly half a million new malicious sites. It also found that social networking tools were the third most common trigger of its web security filtering rules.

"The rapid adoption rate of social networking sites such as Facebook has inevitably been exploited by cyber criminals intent on adding the content in these sites to their portfolio of tools," warned MessageLabs chief security analyst Mark Sunner.

"As we have seen in the past, mass adoption of new communication or web-based tools is often followed by a rise in the number of threats against it, and the Facebook effect will present new challenges to corporate and personal online security."

Almost on cue, McAfee's Avert Labs reported a new angle of attack this week that masquerades as a friend request on MySpace. When a user clicks on the picture or name of their new potential friend, an image appears that looks like a legitimate Windows Automatic Update dialogue box. Clicking the image starts what purports to be a Microsoft update. What the file really contains is "a malware cocktail" containing downloaders, Trojans, and a remote administration tool according to the Avert Labs blog. One way to guard against such attacks is to minimize your browser. If the dialogue box disappears, it is probably an impostor, McAfee advised.

As the MySpace Trojan indicates, malware attacks are becoming increasingly sophisticated. In Finjan's annual report, chief technology officer Yuval Ben-Itzhak warned of "Trojan 2.0" attacks that would exploit new web technologies such as social networks, blogs, RSS feeds, and so-called "mash-ups."

Hackers are getting paid according to the number of users they infect, so their main motivation is to develop attacks that go undetected for as long as possible. This development has spawned new techniques to evade signature-based and database-reliant security methods, he explained. For example, Finjan recently identified and named a Trojan virus Random JS Toolkit that changes every time it is accessed from an infected website, making it extremely difficult to block.

These Trojan 2.0 attacks represent a quantum leap for hackers in terms of technological sophistication, and pose a serious challenge to the IT community, Finjan said.

By John Stokdyk for our sister publication, AccountingWEB.co.uk

 

You may like these other stories...

With our recent coverage of the recent changes and complexities found in FATCA, we realized that regulations are just part of the story. Accounting professionals have to work with foreign financial professionals, and the...
Four years after the first iPad spreadsheet, users finally have a Microsoft-sanctioned solution. When I first installed Excel on my iPad, I immediately focused on its limitations, but upon reflection I see that Excel for...
Change. For some people, it can be a dirty word. Change means adjustment, re-thinking and perspective shifts—all daunting thoughts for an industry such as accounting that is based on mitigating risk and regulations...

Upcoming CPE Webinars

Apr 22
Is everyone at your organization meeting your client service expectations? Let client service expert, Kristen Rampe, CPA help you establish a reputation of top-tier service in every facet of your firm during this one hour webinar.
Apr 24
In this session Excel expert David Ringstrom, CPA introduces you to a powerful but underutilized macro feature in Excel.
Apr 25
This material focuses on the principles of accounting for non-profit organizations' revenues. It will include discussions of revenue recognition for cash and non-cash contributions as well as other revenues commonly received by non-profit organizations.
Apr 30
During the second session of a four-part series on Individual Leadership, the focus will be on time management- a critical success factor for effective leadership. Each person has 24 hours of time to spend each day; the key is making wise investments and knowing what investments yield the greatest return.