As real Flash patches go out, fake ones hit thousands of Facebook users

On the heels of two real Flash Player security updates being distributed by Adobe Systems this week, hackers are spreading a fake update for the media player via a scam on Facebook that has exposed at least 5,000 users to the threat.

In the past week, Adobe has released two security updates that address newly discovered or zero-day flaws affecting the latest versions of Flash Player. One went out in the middle of last week and another was released over the weekend to address a separate flaw. Both updates addressed bugs that hackers were actively exploiting and prompted a fair amount of news coverage and concern from security experts.

But as Adobe whisked out a patch to protect its users from the latest threat, hackers began spreading a fake Flash Player update through a three-day Facebook scam beginning Friday that attempts to install a backdoor that can be used to install other malware.

While the attack is not particularly sophisticated in that it relies on trickery rather than exploiting a software flaw, BitDefender, the security firm that uncovered the Facebook campaign, said the hackers lured more than 5,000 Facebook users to their attack page within one hour.

The hackers are targeting the social network’s users by tagging would-be victims in photos that purport to be racy videos. In a nutshell, they’re abusing Facebook’s tag system to capture the attention of users and then lead them to a web page outside of the social network. From there, with the promise of a porn video, users are encouraged to install a fake Flash Player update that is actually malware.

There are a number of tell-tale signs that the promised videos are suspicious. For one, the tag comes from someone outside the target’s list of friends. Secondly, the URL at the bottom of the still-frame is a link from Google’s URL shortening service and not YouTube. Third, anyone who clicks on the supposed video is sent to a web page outside of the social network.

That page which visitors land on assesses the browser and the OS being used by visitors, with checks for Windows desktops, Android smartphones, Sony PlayStation consoles, media players, smart cars, TV sets and older feature phones. The hackers serve up a different threat for each platform.

According to Bogdan Botezatu, a senior threat analyst at Bitdefender, people visiting the site from a ‘low-interaction terminal’ — that is, one that Flash Player does not support — are directed to a bogus but premium-priced SMS service.

Windows users however “get the full service”, which leads to the fake Flash Player update. This includes “a redirect to a fake Facebook page where you are prompted to download a so-called Flash Player update in order to be able to watch the video, which now turns out to be a spicy one rather than what was promised in the original Facebook post, ” he noted.

Botezatu said the fake Flash update is actually an SFX file (a self-extracting executable archive built with WinRar) that installs two pieces of malware once clicked upon: one is the backdoor and the other is used to spread the scam on Facebook accounts through PCs that have been compromised.

This article is brought to you by Enex TestLab, content directors for CSO Australia.


Upcoming IT Security Events

Feb 3rd, Feb 4th, Feb 6th 2015

Join @NirZuk #PaloAltoNetworks for Breakfast (lunch in Auckland) on keeping your enterprise safe from risk. Cyber attacks continue to increase in volume and sophistication leaving traditional security practices completely ineffective. 

Register Today Seats are limited

March 3rd, March 5th, March 9th 2015

Join CSO for the day@#csoperspectives and hear from @kimzetter @LeviathanSec

3 International Keynote speakers, 36 Key IT Security Industry Speaker, 21 Exhibitors, Security Analysts and many more.. Register today

Dont miss one of the biggest IT Security events in ANZ (registration is free, but seats are limited)

Join the CSO newsletter!

Error: Please check your email address.

Tags Bogdan BotezatuadobeFlash patchesbitdefenderthousandsCSO AustraliaGoogle’s URLsecurity updatesEnex TestLabFacebook users

More about Adobe SystemsBitDefenderCSOEnex TestLabFacebookGoogleIT SecuritySony

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Liam Tung

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place