Prevent malware attacks on social networks: 3 tips

The FBI has shut down the Butterfly botnet, but others will follow. Heed this advice so you don't become a victim.
  • Tony Bradley (PC World (US online))
  • — 13 December, 2012 00:52

Social networks like Facebook are fertile territory for cyber attacks. The nature of a social network is that it connects you with other people you ostensibly know and trust--so you're more likely to open a message or click a link without thinking twice, which is a bad idea.

The Butterfly botnet that plagued Facebook earlier this year infected an estimated 11 million PCs and raked in roughly $850 million in ill-gotten gains. Facebook was instrumental in working with the FBI to shut down the threat, and to trace its origins to identify and arrest the perpetrators. Tal Be'ery, Web research team leader at Imperva, shares insight on the Yahos malware used to propagate the Butterfly botnet.

"The Yahos malware is reported to propagate via social engineering, and naturally it thrives in the hotbed of social networks. An infected user will send a message to all of his friends "How does this photo look?" with an attached Malware file or malware link. Users naturally trust messages they receive from friends and will follow the link and will get infected themselves and the malware will try to spread to all of their friends, ad infinitum."

Yahos is not unique to Facebook, but with a billion registered users Facebook is a prime target for any social network-based attack. The social connections in Facebook, and the ways people share information and cutesy photos with each other make it easy prey for a social engineering attack. This wasn't the first attack aimed at social networks, and it won't be the last.

Here are three simple things you can do to avoid these attacks and protect your PC and your personal data:

1. Keep your friends close

Take a look at your "friends" on Facebook and on other social networks. How many of those people are people you know personally and trust? Use discrimination in choosing your social network contacts to minimize your exposure to these threats.

2. Exercise caution

Society at large has been brainwashed with the mantra to not open unsolicited or suspicious email file attachments, and to not click on links within email messages. That same common sense logic has to be extended to social networking. Do not open attachments or follow links on messages--even from friends you know--on social networks unless you know what it is. A message to you out of the blue and lacking context should immediately raise some red flags.

3. Protect your PC

Many attacks exploit known vulnerabilities, or even use known malware variants as a means of propagation. Keep your operating system and applications patched and up to date, and use security software to detect and block malware. A security tool with data access monitoring can provide additional protection by ensuring that sensitive information isn't leaving your PC without your knowledge.

Truth be told, the tips for avoiding attacks are pretty much the same as you should follow for email. Use some common sense, and exercise some health skepticism about every message and link, and you can defend yourself against the vast majority of attacks.

Tags: Internet-based applications and services, security, botnet, social networking, internet, fbi, Facebook, business security, malware

Today's Approach to Security is Broken

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Sophos Mobile Control

Data protection, policy compliance and device control for mobile devices

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.