Presentation is loading. Please wait.

Presentation is loading. Please wait.

Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.

Similar presentations


Presentation on theme: "Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks."— Presentation transcript:

1 Social Media Attacks By Laura Jung

2 How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks or cybercriminal activities Typically happen when user log in to their social networking sites like Facebook or Twitter Users encounter malicious posts while browsing people’s profiles

3 Continued Posts usually include malicious URLs that can lead to malware download pages or can trigger spamming routines Cyber criminals have started using public interest in social media to send spammed messages from a legitimate social media site

4 Types of Attacks: Facebook Lifejacking attacks: Cybercriminals are making creative and interesting posts to use as bait such as celebrity news or popular events Once clicked, the user is becoming an accomplice to the attack because the spam is automatically reposted on their wall and their contacts’ wall as well A popular version of this attack causes users to like a post without the users’ consent Sometimes this will lead users to survey sites which the cybercriminal can even profit from

5 Facebook: Rogue Applications Rogue Applications: On social media sites, users are able to play games that have open platforms where almost anyone can submit applications Cybercriminals use this to set up applications that can be used for spamming or phishing attacks.

6 Facebook Chat Attacks One of the most common attacks occurs on Facebook chat because cybercriminals can strike up conversation with friends and communicate with their contacts in real time Chat messages can be used to spread malware or promote phishing applications by impersonating you on chat and messaging your contacts the spam or malware to your contacts. Have been able to impersonate security team of social media sites in the past.

7 Facebook Chat Attacks Viral spam chain: where if you click a link on Facebook it will send out massive spam to your Facebook connections To prevent it make sure you do not open these type of links, which usually have the old Facebook look

8 Example

9 Results

10 Twitter Spammed Tweets: Despite the short character count many cybercriminals have found a way to use this to their advantage by creating short compelling posts with links. ( free vouchers, weight loss programs) Malware downloads: Twitter is also used to spread malicious malware download links similar to Facebook.

11 KOOBFACE Most popular type is KOOBFACE, which is a multiplatform worm that targets both Facebook and Twitter, which leads users to fake YouTube page where they can download the malware KOOBFACE is dangerous because it is capable of stealing personal information from your social media pages such as email, interests, employer.

12 Prevention Use basic online precautionary measures Users need to watch out for bogus notifications When looking at other people’s pages, user needs to realize not everything on pages is safe. Users should make sure to protect the privacy of their data and to remember that anything posted is publically available. Think and analyze before you click the link Understand the security settings and avoid sharing personal details. If you notice it report it to the site’s security team.


Download ppt "Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks."

Similar presentations


Ads by Google