Facebook users still an irresistible target for phishing attackers, says Kaspersky

Still constitute 1 in 10 of all attacks of this type blocked by the firm's security software

Phishing attacks from inside Facebook have fallen back from the historic peak of 2013 but still constitute 1 in 10 of all attacks of this type blocked by Kaspersky's security software, the firm has reported.

The firm's latest analysis compares the figures for Q1 2014, which show blocks running at just under 11 per cent, putting it behind the Yahoo, now the main source. That compares with the Facebook average of 22 per cent of blocks for the whole of 2013, which means blocks have halved since last year.

The volume of attacks for users running Kaspersky was now around 20,000 per day, with a one-week surge in early 2014 reaching 120,000 per day. This sounds small next to the 1.2 billion Facebook accounts but this is only one security firm's measurement - anyone using another security product or nothing at all will obviously not show up.

As it happens, most blocks - up to 7500 - happened in the US, followed distantly by Germany and Canada; Russia barely reached the 1000 per day level although we should factor in the number of users Kaspersky has in each of these markets as well as Facebook's relative popularity.

It is also the case that users in some countries are more or less likely to follow a suspect link, triggering the protection. According to Kaspersky, around one in five users in India (as a percentage of its user base there) followed Facebook phishing links, compared to one in ten in the US and an extraordinarly low one or two in a hundred in Russia.

As has been the case for some time, most phishing message come from bogus accounts set up by criminals, sometimes containing threats that accounts will be blocked if users don't enter their credentials. Compromised user accounts are another tactic, which makes them incredibly difficult to filter.

"Fraudsters often lure their victims by promising them interesting content. When users follow the link provided, they land on a fake login page that contains a standard message asking them to log in before viewing the page," said Kaspersky Lab Web content analyst, Nadezhda Demidova.

"If users don't become suspicious and enter their credentials, their data will immediately be dispatched to cybercriminals."

The pattern of targeting social networks is long-established but Facebook remains top of the list because once inside its virtual walls, users quickly seem to become permissive about what they will click on. It's also a global platform so criminals can re-use the same strategies and tricks over and over.

Facebook has tried to fight back, only a week ago passing information to police in Greece who arrested two individuals accused of being involved with the Lecpetex Litecoin botnet spamming campaign. This is only one of a clutch that target the social media site.

Join the CSO newsletter!

Error: Please check your email address.

Tags YahooPersonal TechsecurityFacebook

More about FacebookKasperskyKasperskyYahoo

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by John E Dunn

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts