Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cloud
    • Cybersecurity
    • Storage

    Facebook, Google Chat Used as Control Sites for Malware Attackers

    Written by

    Fahmida Y. Rashid
    Published January 27, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      An increasing number of sophisticated cyber-criminals are using social networking sites like Twitter and Facebook to manage targeted attacks, according to report from security firm Mandiant.

      In Mandiant’s latest “M-Trends” report, released Jan. 27, researchers observed more examples of “Advanced Persistent Threats” relying on social networks and Web-based services, such as Facebook, Google Chat and MSN, as a command and control mechanism. Attackers are using these networks to host malware and manage targeted attacks, the report found.

      Stealing data is still the top objective of these attackers and they are beginning to exploit legitimate sites in the same manner as spammers and mass-malware developers, Mandiant researchers found. Just as worms spread through Facebook and Twitter by spamming user Wall pages to links to malicious Web sites and applications, researchers found attackers employed social networking sites and Web services to launch sophisticated targeted attacks.

      Mandiant defines APT as a group of attackers that target the government, defense organizations, and financial, marketing and research industries. A type of targeted attack, APT is not a random attack where the criminals don’t care who got caught in their net as long as someone is. APT attackers have a clear idea of the kind of victims they are looking for. “They target vulnerable people more often than they target vulnerable systems,” Mandiant researchers wrote.

      Mandiant researchers found a downloader program that used Facebook’s internal messaging feature for C&C activities. Trojans opened backdoors on to victim computers using MSN and Google Chat for C&C, the report said. Other backdoor Trojans searched for, parsed, and executed C&C instructions that were embedded inside HTML comments on compromised Web pages, such as someone’s blog. There was also a malware tool that stole data from the compromised computer and sent files using Hotmail.

      In each of these cases, the attackers’ remote activity looked like normal SSL-encrypted traffic to popular Internet sites, making it nearly impossible for packet inspection and netflow anomaly analysis tools to differentiate the malicious from benign activity.

      Even as far back as 2009, there was a botnet which used Twitter and another botnet which used Amazon EC2 for remote control. Security experts predicted last year that more attackers would start using social networking platforms for command and control because it was easy to hide their activities in plain sight. Recently, there were instances of malware being hosted on the cloud storage service Rapidshare. According to Mandiant researchers, the attackers are now doing just that with increasing frequency.

      E-mail “spear phishing” seem to be the “weapon of choice” for establishing a foothold on social networking sites and services, according to the report. Spear phishing campaigns using infected ZIP, PDF, Word and Excel files were common. Once the users were compromised, the attackers could launch more attacks, even several months later, Mandiant said.

      According to Mandiant, APT attackers maintain their presence within a compromised network, and once removed, repeatedly seek to regain access.

      Mandiant said APT attackers will “increasingly leverage the broad array” of social networking, cloud computing, and online storage sites to conduct their operations. These services are widely available, can easily be obtained without sacrificing anonymity and can provide more versatility than a self-managed attack infrastructure.

      Prevention efforts will typically not work against APT, Mandiant said. Instead of trying to stop APT intruders from using legitimate sites to compromise their networks, organizations should make it difficult for the APT intruders to stay in the breached network, ultimately making them “too expensive” to attack, according to Mandiant.

      This is achieved when the security team can determine what the attacker is doing and to anticipate what the attacker will do next, Mandiant said. Organizations need to increase visibility across the enterprise by incorporating specialized monitoring systems that provide host- and network-based visibility, increased logging, and log aggregation, Mandiant said.

      Host-based detection tools look for indicators that the host had been compromised as well as signs of the tools, tactics and procedures used by the attacker. These tools can find unknown malware because they aren’t looking for actual signatures like a traditional anti-virus, the researchers said. Network-based tools do the same search on network traffic. Mandiant researchers listed nine different logs security managers should be looking at regularly, including internal DNS server logs, DHCP logs, internal Web proxy logs, firewall logs with ingress/egress TCP header information, and external Webmail access logs. Log aggregation tools help managers correlate information from numerous sources, highlight critical information and indexes all information for easy searching. The security team can use all the information to effectively detect and remove the compromised host, repeatedly forcing the attacker to start over to regain control, Mandiant said.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×