SocialFacebook IDs Porn Spam Attackers

Facebook IDs Porn Spam Attackers

Facebook has identified the group or individual responsible for the attack on its systems that spammed users with porn and violent images earlier this week. Facebook said that the attack "exploited a browser vulnerability" to spread the images.

Facebook LogoFacebook has identified the group or individual responsible for an attack on its systems that spammed users with porn and violent images earlier this week. Facebook said that the attack “exploited a browser vulnerability” to spread the images in news feeds and wall pages.

The content was spread unknowingly when people were tricked into copying and pasting malicious JavaScript into their browsers. No Facebook accounts were compromised or accessed during the spam attack, according to Facebook.

The social site has determined who was behind the attack and is working with legal enforcement agencies on the matter, but declined to share these details with the public at this time. However, Facebook has ruled out hacking group Anonymous, which early reports had suggested could be responsible.

Sophos Canada senior security advisor Chester Wisniewski said in a blog post that Facebook users probably pasted the JavaScript into their browser because they thought they may have won a prize.

Wisniewski explained that the attack is particularly difficult to circumvent because the flaw is related to a browser rather than the Facebook site.

However, Wisniewski questioned why Facebook was attacked in such a way, as attackers generally use flaws for financial gain rather than what appears to be a “purely malicious act”.

Sophos UK senior technology consultant Graham Cluley added in a blog post that the attack had the potential to damage the social network’s reputation.

“It’s precisely this kind of problem which is likely to drive people away from the site. Facebook needs to get a handle on this problem quickly, and prevent it from happening on such a scale again,” he said.

Facebook claimed that most of the spam has already been eliminated, and that the company is working to improve its systems to better defend against similar attacks.

“Our engineers have been working diligently on this self-XSS vulnerability in the browser. We’ve built enforcement mechanisms to quickly shut down the malicious pages and accounts that attempt to exploit it,” said a spokesman.

This article was originally published on V3.

Resources

The 2023 B2B Superpowers Index

whitepaper | Analytics The 2023 B2B Superpowers Index

8m
Data Analytics in Marketing

whitepaper | Analytics Data Analytics in Marketing

10m
The Third-Party Data Deprecation Playbook

whitepaper | Digital Marketing The Third-Party Data Deprecation Playbook

1y
Utilizing Email To Stop Fraud-eCommerce Client Fraud Case Study

whitepaper | Digital Marketing Utilizing Email To Stop Fraud-eCommerce Client Fraud Case Study

1y