Hackers Target MySpace and Facebook 93
Stony Stevenson writes "The security firm Fortify Software has warned against a series of attacks against Facebook and MySpace. Buffer overflows that enabled hackers to exploit the Aurigma ActiveX image uploading software used by social networking sites were at the heart of the assault. 'Criminal hackers now view social networking sites as their best target for attacks ... [partially because] such sites are designed to be usable by "unsophisticated" consumers, meaning that the barrier to entry for attacks is potentially lower as users are more likely to click on a link that leads to malware.'"
Re:Just what kids on Myspace and Facebook need... (Score:4, Funny)
Re:Just what kids on Myspace and Facebook need... (Score:5, Funny)
Re: (Score:2)
Just buy a dog.
Re: (Score:2, Informative)
Re:Just what kids on Myspace and Facebook need... (Score:5, Funny)
I can't really tell the difference.
Re: (Score:2)
Re: (Score:3, Informative)
Hackers target ActiveXploit (Score:2)
that the sites are stupid, and they have stupid users that
use an insecure platform that provides the vector.
Re: (Score:2)
Re: (Score:2)
I was no longer using it. The link I set it up for had been changed, so I replaced it with hello.jpg.
Hotlinkers beware, I spend $$ on my bandwith, at the very least download the photo and upload it to imageshack or some other service.
Internet Explorer based exploit (Score:5, Insightful)
Re: (Score:1)
Re:Internet Explorer based exploit (Score:5, Informative)
Re:Internet Explorer based exploit (Score:5, Interesting)
Re: (Score:2)
But seriously... why do I have to run an application on my PC to upload a photo? I take these nice bazillion pixel photos and Facebook after doing endless minutes of something, turns them into postage stamps. Why don't Facebook users just upload their pics to a real photo site and then throw a sheep at all their friends with the URL branded on it. Their whole infrastructure is disgustingly lame.
H
Re:Internet Explorer based exploit (Score:4, Funny)
Re: (Score:2)
Re: (Score:2, Insightful)
Re: (Score:2)
Re: (Score:2)
Hurry! Install now! Be the first in your subnet to be pwned by an ActiveX eXploit.
HEY! (Score:5, Funny)
(received as a comment on my page this morning)
Re:HEY! (Score:5, Informative)
The hacks are pretty interesting as they are socially viral and not necessarily driven by sofware or the transmission of a virus.
Maybe I need to RTFA, but this type of hacking has got to be the most prevalent type on Myspace.
Re: (Score:1)
Anyone know anything more about this?
Re: (Score:2)
"Legitimate" businesses target young people too. (Score:5, Insightful)
Cable, telco and banks and apparel vendors all have young people in their sites. Predatory lending credit cards, special internet "deals" with students and massive advertising budgets that should make the companies involved blush, are aimed at people ages 14 to 25.
Why? because that's where the money is.
Why do the theives use ActiveX exploits? Because they can.
Sheep, meet Mr. Slaughter. Mr. Slaughter .... gross!
Re:"Legitimate" businesses target young people too (Score:2, Insightful)
young people in their sites
The word you were looking for is "sights" :). All improper usage aside, while I don't disagree with the sentiment of your post, it's important to note that the style of exploitation being discussed differs in that it's highly illegal and completely indiscriminate in nature. It's also more than likely that the sources of these attacks are individuals operating from jurisdictions outside the reach of U.S. law enforcement, which makes punishing the offenders sort of difficult.
Do your friends and family a f
Re:"Legitimate" businesses target young people too (Score:2, Insightful)
A Troll's Dream (Score:5, Funny)
Re:A Troll's Dream (Score:5, Funny)
Re: (Score:3)
Not only did he invoke one of the slashdot holy wars to complete his trifecta, but managed to quietly work in an IP controversy by referencing scrabble/scrabulous which itself is just the result of the buzz surrounding an app on a social networking site like facebook/myspace thereby completing a circular reference and ending up exactly where we started.
At the very least he should get 50 bonus points for using all his letters!
(And if you look closely, so did I.)
Re: (Score:2)
Comment removed (Score:5, Insightful)
Re:That... (Score:5, Interesting)
Re: (Score:1)
Re: (Score:2)
My bad.
Re:That... (Score:5, Insightful)
Linux, Macintosh, BSD Unix, and Non-Windows systems do not support ActiveX controls anyway so it is mostly Windows systems that are effected by the exploit, and only Windows users who use Internet Explorer and not those who use Firefox.
I am guessing that a lot of 12 to 24 year olds that have their own credit card or their parent's credit card or bank account or somehow work an have their own bank account are the ones targeted by this, as people aged 12 to 24 are most likely to use Windows with Internet Explorer and not know about the exploits out there, and just surf and click on anything they want.
A lot of family members and friends have children aged within that range who use their family's computer and after it gets so infected with malware that they cannot use it, they call me to come over and fix it for them. Nope, Linux, BSD Unix, or switching to a Mac is not an option for them, in some cases I switched them to Linux only to have them make me switch them back to Windows because certain web sites only work with Internet Explorer, or certain games they bought won't run under WINE or they have no idea how to configure WINE to run them for them. Dual-Booting just confuses them more, as does running Windows in a virtual machine. If they bought a Mac, a few weeks later they'd tell me to remove OSX off it and put Windows on it. So basically, they stick to Windows and Internet Explorer, even if I install Firefox for them. Also I install the Google Pack with StarOffice, but of course they want MS-Office instead because their friends and co-workers don't know how to open up ODT open text format documents, and they keep forgetting to "Save As" into MS-Word 97-2002 Format so their coworkers and friends can read their documents.
Re: (Score:2, Insightful)
Chances are that people who uploaded images recently and ran Internet Explorer that used the ActiveX control might have gotten their password and personal information stolen.
For the love of Pete, it's a remote code execution [cert.org] vulnerability. We're talking about a lot more than a use's MySpace password getting lifted. Why couldn't the submitter be bothered to provide a link that actually describes the issue in detail, instead of just a sensationalist news article that gives virtually no technical information?
Re: (Score:2)
What they don't know is that it is a remote exploit that a hacker can use in an email or web page by giving an embedded link to Facebook or MySpace that contains URL data that will exploit the ActiveX control used for image uploading by those web sites so that it runs code on their Internet Explorer to steal information, install
This is going to sound harsh, but.. (Score:1)
Re: (Score:3, Insightful)
Re: (Score:1)
Re: (Score:2)
Linux, BSD Unix, Mac OSX doesn't always work for most people, they need the ability to run native Windows programs and an emulator or virtual machine only slows them down or confuses them. Dual-Booting also confuses them as they try to run or install Windows programs under Linux, Mac OSX, etc. The only r
In other words.. (Score:1, Insightful)
Seriously though, who here actually granted MySpace or Facebook access to your email account in order to find your "friends"? Anything else (the social website has access to) is butter in the frosting
It really amazes me just how much personal information people are willing to put on the internet these days. Even if said information is not explicitly granted to a particular website, a gre
Re:In other words.. (Score:5, Informative)
Hackers? (Score:3, Funny)
huh? (Score:2)
so what you are saying is.... (Score:3)
Re: (Score:3, Insightful)
Re: (Score:3, Funny)
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
Oh, someone told me it was 80%
Re: (Score:2)
The problem is how do we spot them? They won't all be posting under their real name and using that horrible typo "internets".
Re: (Score:2)
Easy, everyone that uses "your" instead of "you're" are the dumb ones. Find them, and things should calm down.
Stop the presses... (Score:2)
I'm shocked I tell you!!!
Seriously though, doesn't this happen every day? Why is this more newsworthy than the the usual background level of social network hacking attempts and ActiveX suckiness?
Re: (Score:1)
In other news... (Score:1)
Honestly, who is this "news" to/for?
Re: (Score:2)
But seriously, half of me agrees with you since this should be completely obvious, but the other half knows that people like my mom still don't realize it's risky to open an eCard even if it comes from someone she knows. If these "news" stories keep getting out there, maybe the thick-headed people out there will finally get the picture... then again, if they haven't gotten it by now, this type of thing just makes them more scared instead o
AOL users of (Score:2)
Re: (Score:1)
Facebook rolled out a fix quickly (Score:3, Informative)
http://secwatch.org/advisories/1020254/ [secwatch.org]
steveha
Dupe (Score:1)
-ellie
Not just client-side ActiveX issues on Facebook (Score:4, Insightful)
Already caught by the cops (Score:2)
Oh, wait...nevermind.
Code Audit (Score:2)
Because browsers have poor upload abilities (Score:2)
With all the effort going into interactive sites, AJAX, user communities, media distribution and so on, the actual process of uploading files to a site is just as crap as it was in 1995.
In both IE and Firefox, the sum total of the upload user interface is a text box with a browse button, followed by an almost unnoticeable progress indication in the status bar. If anything goes wrong, the upload is abo
Re: (Score:1)
Re: (Score:2)
ActiveX (Score:1)
Hack Away (Score:1)
Rain is wet... (Score:1)