Tag Archives: scams

Rest in Peace Scams

      No Comments on Rest in Peace Scams

The rise of “rest in peace” scam messages on social media sites continues. Jackie Chan, Morgan Freeman, Will Smith, Keanu Reeves, and Rihanna are only a few of the celebrities that have been proclaimed dead in recent scams. The sensational messages usually include links to a video. Before the user gets to see the video, they are tricked into manually sharing the bait message with all of their family and friends in order to spread the scam further. Even after sharing the post, the user will still not be able to see the fake video. Rather, they will be redirected to a site with advertisements that asks the user to fill out a survey. The ads and surveys generate revenue for the scammer. Other variants of the scam ask the user to download a malicious browser extension or application. This kind of scam is not new, but as long as they make money, they will continue.

Facebook RIP scam 1.png

Figure 1. Fake video scam shared across social media sites

Some scammers are currently focusing on Paul Walker and Roger Rodas, who both recently died in a car accident. Even though the base of the story is true, the scammers are using these tragic deaths to try to promote fake videos which claim to include unseen footage of the crash. One scam group has specialized in the use of malicious Facebook applications to boost the reach of the scam. With a simple geo IP location JavaScript, the scammers can determine the user’s location and redirect their browser to a site that suits their region. This is straight forward and common behavior nowadays. The redirects can point to malicious Facebook apps, remotely hosted scams sites, or phishing sites. Luckily, in this example, the phishing website does not look very convincing, as some browsers break the layout of the site.

Facebook RIP scam 2.png

Figure 2. Fake Facebook login Web page with broken layout

Unfortunately, the redirects can sometimes skip one of Facebook’s warnings about malicious URLs. Whenever a user clicks on a link in a Facebook post, the browser will get redirected to a transfer script. If Facebook thinks that the destination URL is suspicious, a warning message is displayed, informing the user and allowing them to report the post as spam. Since the Web page is shown in an iframe below the warning, it is possible, in some rare cases, that the scammer could automatically redirect the user to a new site. As a result, the user will only see the warning message for less than a second before they are sent to the malicious Facebook application page. Often, multiple redirects are involved until the final page is reached.

Facebook RIP scam 3.png

Figure 3. Link redirection warning

If a user attempts to install a malicious application, the app asks for permission to read the user’s data and to post in their timeline. The scammer’s main goal here is to post the message through the user’s Facebook account without the victim’s knowledge so that more people fall for the scam.  Once the user installs the application, the scam message is posted to their timeline and the user is redirected to the survey scam Web pages.

A few hundred people per hour have clicked on each of these links and some have installed the application. Of course, Facebook is doing its best to block the malicious links and remove the applications as fast as possible. Unfortunately the bad guys have automated scripts on their side. Each of the analyzed domains hosted more than 2,000 copies of the malicious Facebook application, each under a slightly different name. This allows the scammers to rotate the malicious links once the app is blocked.

Facebook RIP scam 4.png

Figure 4. Scam application asking for permissions

As always, Internet users are advised to follow best practices:

  • Be vigilant and skeptical when reading sensational stories on social media sites
  • Do not install plugins or tools from untrusted sites
  • Think twice before filling out verification surveys in order to access content
  • When installing social applications, verify that the requested permissions are really required

Symantec customers are protected against these types of attacks by various IPS signatures and our URL reputation blocking service.

Symantec would like to encourage Facebook users to report any scams that they encounter to Facebook. The Facebook security team is currently working on this particular scam and they are blocking and removing the threat as new versions appear.

?? Twitter ??: Twitter ????????????

      No Comments on ?? Twitter ??: Twitter ????????????

12 月 2 日、多くの Twitter ユーザーが騙されて、@VerifiedReport または @MagicReports という名前の偽の Twitter アカウントをフォローしてしまうという事例がありました。どちらも、ユーザーと報道機関やジャーナリストとの間で Twitter 社が行っている実験の一部であると称し、多数の Twitter ユーザーをフォローしながら次のようにツイートしています。「This is a Twitter experiment. We are changing the way users interact with journalists and news organizations.(これは Twitter 実験です。ユーザーとジャーナリストや報道機関との対話方法を変えようと試みています。)」
 

Twitter Exp 1.png

図 1. @VerifiedReport に関する MagicRecs からの通知
 

多くの場合、この 2 つのアカウントがユーザーの目にとまったきっかけは、@MagicRecs という正規の Twitter アカウントからの通知でした。
 

Twitter Exp 2.png

図 2. Twitter の実験的アカウント MagicRecs
 

MagicRecs は、Twitter 社が作成した実験的アカウントであり、「ユーザーのネットワークで何か興味をそそることがあったとき、個別対応したお勧め情報をダイレクトメッセージ(DM)として送信」します。このサービスは、Twitter のモバイルアプリの機能として最近統合され、Twitter 社によると「フォローしているお友達が立て続けに、ある人をフォローしたり、特定のツイートをお気に入りに登録したりリツイートした場合に、その動きを知らせるプッシュ通知を受け取ることが可能になりました」

@MagicRecs を利用したことがあるユーザーはそれを信頼しているので、詐欺師が正規サービスの信用を利用して偽の実験をでっちあげようとするのは当然のことと言えます。

なかには、この 2 つのアカウントが正規のものかどうか疑ったユーザーもいましたが、それ以外のユーザーは、特に @MagicRecs にお勧めされた後では、Twitter 社の従業員まで含めてこのアカウントをフォローしてしまいました。

 

.@verifiedreport は、セレブの電話番号を教えてくれるためのものなの? pic.twitter.com/gyZW16gbtX

— Taylor Lorenz (@TaylorLorenz) 2013 年 12 月 2 日

 

Twitter 社はその後、この 2 つのアカウントを停止しましたが、他にもまだ疑わしいアカウントが残っていて活動を続けています。@MagicFavs、@MagicSmacks、@MagicSext などがそれで、いずれも @MagicRecs によってお勧めされ、1,000 人近いフォロワーがいます。

シマンテックは、どちらのアカウントも DM を通じてリンクを送信しようとは試みていないことを確認しています。これらのアカウントが作成された意図は依然として不明ですが、少なくとも、新たな手口を試し続ける詐欺師が存在するということを思い出させる役には立っています。その新たな手口で、詐欺師は無警戒な Twitter ユーザーを欺いてリンクをクリックさせ、ログイン情報を盗み出したり、アフィリエイトプログラムの手法を利用して金銭を詐取したりすることを狙っているのです。

@MagicRecs のような正規のサービスを利用する場合でも、フォローするアカウントについては注意してください。特に Twitter 社が所有するアカウントであると称している場合には、Twitter で認証済みのアカウントかどうかを確認する必要があります。疑わしい様子がある場合、不正なアカウントである確率はやはり高いということを忘れないようにしてください。

 

* 日本語版セキュリティレスポンスブログの RSS フィードを購読するには、http://www.symantec.com/connect/ja/item-feeds/blog/2261/feed/all/ja にアクセスしてください。

Not a Twitter Experiment: Scammers Capitalize on Twitter Recommendations

Yesterday, a number of Twitter users were duped into following fake Twitter accounts known as @VerifiedReport and @MagicReports.  Both accounts claimed to be part of a Twitter experiment between users, news organizations, and journalists, and foll…

AVAST donates to Typhoon Haiyan recovery efforts

      No Comments on AVAST donates to Typhoon Haiyan recovery efforts

The Foundation arm of AVAST Software announced today that it will make a donation of 500,000 CZK (approximately $25,000) to support relief and recovery efforts in the Philippines following Typhoon Haiyan. “The greatest needs are for water, food and hygiene kits, and this will be coordinated through our main partner, People in Need, the biggest humanitarian […]

Halloween tricks move online

      No Comments on Halloween tricks move online

Back in the good ol’ days of Halloween, you only had to worry about your house getting egged or your big brother stealing the good candy. Halloween tricks have moved online, and along with any significant event or holiday, this spooky celebration marks an increase in malware. Cyber ghouls pull out their bag of tricks […]

Downloading the ‘Big 3 for Privacy’ to Your College-Bound Student

If your son or daughter is headed off to college this month, don’t shrink back on your commitment to family safety online. Being a college freshman at 17 or 18 doesn’t mean their wisdom download is at 100% complete (far from it). The words “privacy” and “dorm” don’t often show up in same sentence but Read more…

10 Smart Tech Habits to Pass On To Your Kids

We teach them how to drive, how to cook, and how to find their way through tough situations. But parents today have added another task to their “essential parenting” list they must impart and that is: good tech habits. The role of technology in families is only growing. Tech has become a rather hefty line Read more…

Do I Need to be Concerned About Cybercrime?

The short answer is yes! You should be concerned. And even if you’re not concerned for yourself, with the Internet all of us are interconnected so cybercrime does not just affect one person or one group, but all of us. Imagine your body being targeted by 100 million viruses. That is exactly what cybercriminals are Read more…

Phishing scam: University of Texas (San Antonio) email expiration

How’s this for a good phishing scam? Everything seems legit: 1. From email is “customerservice@utsa.edu” 2. No misspelled words and has decent grammar (however, some punctuation inconsistency) 3. Copyright (c) symbol next to the university name 4. Gmail did not filter it as spam, but left it in my normal inbox     Yes, if […]

Phishing scam: University of Texas (San Antonio) email expiration

How’s this for a good phishing scam? Everything seems legit: 1. From email is “customerservice@utsa.edu” 2. No misspelled words and has decent grammar (however, some punctuation inconsistency) 3. Copyright (c) symbol next to the university name 4. Gmail did not filter it as spam, but left it in my normal inbox     Yes, if […]