Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

Websense Research: Surefire Way to Hack Someone? Pretend You Are Facebook

New Websense Security Labs Research Finds Cybercriminals Imitating Social Networks to Spread Malware – Fraudsters Target Users at Work
  • 14 May, 2009 09:10

<p>SYDNEY — May 14, 2009 — Websense, Inc. (NASDAQ: WBSN) today released the results of new research conducted by Websense Security Labs™ that reveals a growing domain-name cloning trend among cybercriminals seeking to take advantage of the huge number of social networking users, particularly Facebook, MySpace and Twitter users.</p>
<p>Criminals are increasingly using domain names that include words like Facebook, MySpace and Twitter, with no official connection to the real sites, to trick unsuspecting visitors to visit fake Web sites and lure them to input sensitive information or download malicious code. In fact, Websense Labs research indicates that in a research sample taken from the Websense URL database, more than 200,000 phony copycat sites were found, all using the terms Facebook, MySpace or Twitter in their URLs. Examples similar to samples found include,, or (note these are just sample site names that are similar to the sites researchers found).</p>
<p>Further research shows that the hackers are taking steps to create these cloned domains to circumvent security measures put in place by organisations to filter the original domain in a business setting. Many of the domains are proxy avoidance sites which are used to try to evade traditional Web filtering technology.</p>
<p>Taking advantage of the huge increase of social networking-savvy “Millennial” users entering the workforce, and the 276 percent growth of Facebook among the 35-54 year old segment over the past six months, Facebook was the most popular domain used to dupe users, with more than 150,000 known fake URLs charted during the research period.</p>
<p>“These new threats illustrate that attackers will continue to target Facebook, MySpace and Twitter, along with other social networking sites, for three reasons,” said Charles Renert, senior director, advanced content research, Websense. “These Web sites are popular – fraudsters are able to target lots of victims; people trust the content on it – because they think it’s from other people in their network; and they are easy to compromise because they allow anybody to create and post content. Traditional Web filtering is not enough to protect users from threats on trusted sites, and isn’t enough to keep up with fraudsters generating new URLs almost instantaneously to avoid detection. Only real-time analysis of Web content can prevent users from being exploited by this attack.”</p>
<p>This isn’t the first time Facebook users have been targeted by hackers. In late April, Websense Labs detected a phishing campaign targeting Facebook users <http:> . The scam, labeled “FBStarter” by security researchers redirected users to a phishing page that spoofs Facebook's sign-in page. By entering their user name and password, they give attackers the information necessary to log into their account and spam their friends.</http:></p>
<p>Data gathered from the Websense Threatseeker™ Network <http:> shows that sites that allow user-generated content comprise the majority of the top 50 most active distributors of malicious content and that more than 70 percent of these sites have hosted malicious code in the last six months, as well as malicious comment spam and the URL and domain spoofing noted in the most recent research.</http:></p>
<p>For more information about Websense solutions including the Websense® Web Security Gateway, the industry’s most effective secure Web gateway for Web 2.0 content control, content filtering and threat protection, visit:</p>
<p>About Websense, Inc.</p>
<p>Websense, Inc. (NASDAQ: WBSN), a global leader in integrated Web, data and email security solutions, provides Essential Information Protection™ for more than 44 million product seats under subscription. Distributed through its global network of channel partners, Websense software and hosted security solutions help organisations block malicious code, prevent the loss of confidential information and enforce Internet use and security policies. For more information, visit <file:> .</file:></p>

Most Popular

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Media Release

More media release

Market Place