For example, although Facebook and other social media providers devote considerable resources to scrub the service of scams and pornography, “black hat” hackers have adopted a technique of “cloaking” malicious content by using AI to display a benign site to reviewers while redirecting users who click the same link to a different site altogether. Often the redirect is to offers of services and items not permitted by Facebook’s rules, or to “clickbait” that entices the user to select a link that installs malware on the unsuspecting user’s computer.
Other attacks on social media include “waterhole attacks” where hackers plant malware on websites frequented by groups of affiliated users in order to infect these users’ devices and computers with malware designed to spread quickly throughout the victims’ working (or home) data environment, and, having done so, collect data and access codes.
In the Syrian conflict, rebels reportedly set up fake social media sites appearing to belong to female supporters. The false sites would request photos from the state fighters and respond with (fake) photos of young women containing malware designed to infect the fighters’ network and to capture personal and tactical information once downloaded.
Other techniques used to infiltrate computing environments and steal data include:
- Likejacking – where fake “like” buttons are used to install malware;
- Fake apps – that trick users into installing phony apps that steal access credentials;
- Fake plug-ins – designed to induce users to install browser “updates” which, in fact, are designed to steal propriety information stored on connected computers.
The latest revelations involving Cambridge Analytica raise the stakes even higher. It’s important to remember that most “innovations” in the weaponization of information use and misuse really are old tricks applied in new ways. As social networks become a hub for delivery of news, entertainment and even communication services designed for consumers, they also have become an often permanent tool used by hackers and social engineers intent on misappropriating personal information and business secrets. As such, it’s important to keep apprised of and alert for “older” methods of misbehavior even as newer techniques are revealed.
Or, to quote President Ronald Reagan, “Trust, but verify.”