470 likes | 609 Vues
This article explores the various automated social engineering attacks targeting online social networks (OSNs) like Facebook. It highlights techniques such as identity theft, social phishing, and context-aware spam that exploit user relationships and trust dynamics. The discussion includes the evolution of privacy on Facebook and how users can mitigate risks associated with sharing personal information. It also emphasizes the importance of recognizing malicious links and the ongoing research aimed at strengthening collaborative security in social networking environments.
E N D
Automated Social Engineering Attacks in OSNs Yazan Boshmaf Konstantin Beznosov Matei Ripeanu
Facebook: Sharing • Social Attributes • Demographics • Preferences Facebook Archives. http//www.facebook.com
Facebook: Sharing • Social Structure • Friends • Mutual Friends Facebook Archives. http//www.facebook.com
Facebook: Public Access Sample! Whoops!
Facebook: Privacy Evolution MCKEON, M. The evolution of privacy in Facebook. http://mattmckeon.com.facebook-privacy
Facebook: Privacy Evolution MCKEON, M. The evolution of privacy in Facebook. http://mattmckeon.com.facebook-privacy
Facebook: Privacy Evolution MCKEON, M. The evolution of privacy in Facebook. http://mattmckeon.com.facebook-privacy
Facebook: Privacy Evolution MCKEON, M. The evolution of privacy in Facebook. http://mattmckeon.com.facebook-privacy
Facebook: Privacy Evolution MCKEON, M. The evolution of privacy in Facebook. http://mattmckeon.com.facebook-privacy
Facebook: Privacy Evolution MCKEON, M. The evolution of privacy in Facebook. http://mattmckeon.com.facebook-privacy
Automated Cross-Site ID Theft Bilge, L., Strufe, T., Balzarotti, D., and Kirda, E. All your contacts are belong to us: automated identity theft attacks on social networks. In WWW ’09
Automated Cross-Site ID Theft Bilge, L., Strufe, T., Balzarotti, D., and Kirda, E. All your contacts are belong to us: automated identity theft attacks on social networks. In WWW ’09
Automated Cross-Site ID Theft From Facebook Bilge, L., Strufe, T., Balzarotti, D., and Kirda, E. All your contacts are belong to us: automated identity theft attacks on social networks. In WWW ’09
Automated Cross-Site ID Theft Sample! Why did it work? Bilge, L., Strufe, T., Balzarotti, D., and Kirda, E. All your contacts are belong to us: automated identity theft attacks on social networks. In WWW ’09
Context-Aware Spam Brown, G., Howe, T., Ihbe, M., Prakash, A., and Borders, K. Social networks and context-aware spam. In CSCW 2008
Social Phishing Jagatic, T. N., Johnson, N. A., Jakobsson, M., and Menczer, F. Social phishing. Communications ACM 2007
Web Applications Attacks Evron, G. New Facebook worm warning: Wanna see somethong hot?http://darkreading.com/blog/archives/2009/11/new_facebook_wo.html
Can be Turned into a Botnet! Anthanasopolous, E., Makridakias, A., Antonatos, S., Antoniades, D., Ioannidis, S., Anagnostakis, K. G., and Markatos, E. P. Antisocial networks: Turning a social network into a botnet. In ISC ’08
Koobface Botnet TrendMicro. The real face of koobface. Technical report 2009
Research Questions Mwahaha!
The Attack - Crawling Target Adversary
The Attack - Ranking Target 8 Adversary 3 1 2 4 7 5 6
The Attack - Infiltrating Target 8 Adversary 3 1 2 4 7 5 6
The Attack - Infiltrating Target 8 Adversary 3 1 2 4 7 5 6
The Attack - Infiltrating Target 8 Adversary 3 1 2 4 7 5 6
The Attack - Infiltrating Target 8 Adversary 3 1 2 4 7 5 6
The Attack - After Target 8 Adversary 3 1 2 4 7 5 6
The Attack - After Target Adversary
A Network of “Trust” Target Adversary
Surveillance Target Adversary
Amplified Social Engineering Target Adversary Aha! Yeah, I posted the picture! Will send you a link soon. Sarah, the Pool event last week was awesome!
Towards Social Collaborative Security Hey Kosta, check out this link http://www.malicous.com Looks malicious!
Towards Social Collaborative Security Hey Kosta, check out this link http://www.malicous.com Looks malicious! ? Hey all, this link is malicious http://www.malicous.com Collaboration Network Social Network
The Big Picture • Vulnerability: • Authenticity of online relationships + public information • Things to evaluate: • The attack in real-settings (Now, simulation-only). • Usability and expressiveness of privacy controls vs. privacy implications realized by users. • Identified issues: • How can social networking sites, or OSNs, distinguish between fake and real online identities (Social Sybil Nodes)? • Future work: • Social Collaborative Security (threat identification, opinion mining, reasoning, alert diffusion, etc.)