Social networks threats

29
SOCIAL NETWORKS THREATS AND TRENDS ALEXANDRU CATALIN COSOI ALEXANDRU CATALIN COSOI HEAD OF ONLINE THREATS HEAD OF ONLINE THREATS [email protected] [email protected]

Transcript of Social networks threats

Page 1: Social networks threats

SOCIAL NETWORKSTHREATS AND TRENDS

ALEXANDRU CATALIN COSOIALEXANDRU CATALIN COSOIHEAD OF ONLINE THREATSHEAD OF ONLINE THREATS

[email protected]@BITDEFENDER.COM

Page 2: Social networks threats

Viruses

Email worms

Exploit worms

Rootkits

Backdoor Trojans

Sources of Attack

RemovableMedia

Instant Messaging

Clients

Types of Threats Proliferation Mediums

Email AttachmentsScript Kiddies

Threat landscape – Past Threat landscape – Past

2

Page 3: Social networks threats

3

Viruses

Email worms

Exploit worms

P2P worms

IM worms

Rootkits

Backdoor Trojans

Spyware

Adware

Greyware

Sources of Attack

Legitimate, Compromised Multi-media Websites

RemovableMedia

MobileDevices

Public WiFi Networks

Instant Messaging

Clients

Hackers

Web 2.0 Applications

Types of Threats

SPAM Email Attachments

Legitimate Businesses

P2P NetworksPhishingOrganized Crime

Foreign Governments

THREAT LANDSCAPE – PRESENT THREAT LANDSCAPE – PRESENT

Proliferation Mediums

Page 4: Social networks threats

What Urls Am I Talking About?What Urls Am I Talking About?

Page 5: Social networks threats

Where Do Urls Come From?Where Do Urls Come From?

Page 6: Social networks threats

SLIDE 2

Web 2.0Web 2.0

Nice Blue Birdie

Page 7: Social networks threats

SLIDE 3

TwitterTwitter

• Huge growth in the last years• Approximately 7 mil tweets / hour• In Sept 2008, Twitter had a growth of 343%

o (sept 2007 vs sept 2008. according to Nielsen-Online)

In Feb 2009, the growth was of 1382% (feb 2008 – feb 2009, according to Nielsen-Online)

Page 8: Social networks threats

SLIDE 4

Time on Site Time on Site

Page 9: Social networks threats

SLIDE 5

Types of Twitter SpamTypes of Twitter Spam

• Following Spam• Tweet Spam• Direct Message Spam• Trending Subject Spam• Reply/Trackback Spam• ReTweet Spam

Page 10: Social networks threats

SLIDE 16

Scale Free Networks Scale Free Networks

Social Connections are not random.Nodes with many connections will attract new connections easier than nodes with fewer connections

“The rich get richer and the poor get poorer”. Proverb provided by wikipedia

Page 11: Social networks threats

SLIDE 24

Imagine a malware URL from these guysImagine a malware URL from these guys

Page 12: Social networks threats

SLIDE 7

Facebook in NumbersFacebook in Numbers

• More Then 400 million active users• 5.14 % from total word population• 20.18% from worldwide internet users• Over 700 000 bussiness

Page 13: Social networks threats

SLIDE 8

Social Games on FacebookSocial Games on Facebook

Page 14: Social networks threats

SLIDE 9

Facebook’s “Russian Bride”Facebook’s “Russian Bride”

Page 15: Social networks threats

SLIDE 10

Facebook E-mail SpamFacebook E-mail Spam

Page 16: Social networks threats

SLIDE 12

Haiti Hoaxes and scamsHaiti Hoaxes and scams

Page 17: Social networks threats

SLIDE 13

Phishing for FacebookPhishing for Facebook

Page 18: Social networks threats

SLIDE 14

Phishing & Malware on FacebookPhishing & Malware on Facebook

• Facebook blocked an important number of phishing and malware attacks

• Facebook worms use short, provocative and catchy messages

Page 19: Social networks threats

The ads worm (this Tuesday)The ads worm (this Tuesday)

Page 20: Social networks threats

The ads worm (this Tuesday)The ads worm (this Tuesday)

Page 21: Social networks threats

The ads worm (this Tuesday)The ads worm (this Tuesday)

Page 22: Social networks threats

SLIDE 15

User AcceptanceUser Acceptance

• To see how many people accept connect with unknown users

• To see how many people follow unknown links from unknown users

• To see how many people really block unknown connections request

• 3 honeypot users: one profile without picture and containing as few details as possible(1st profile), another profile with a picture and a few details(2nd profile) and yet another profile with a large amount of details and pictures(3rd profile).

Page 23: Social networks threats

SLIDE 16

User Acceptance – SetupUser Acceptance – Setup

• 3 honeypot users• one profile without picture and containing as few

details as possible• one profile with a picture and a few details• one profile with a large amount of details and

pictures

Page 24: Social networks threats

SLIDE 18

User Acceptance - ResultsUser Acceptance - Results

Page 25: Social networks threats

The august study – user acceptanceThe august study – user acceptance

Page 26: Social networks threats

The august study – personal information lossThe august study – personal information loss

Page 27: Social networks threats

The august study – confidential information lossThe august study – confidential information loss

Page 28: Social networks threats

SafegoSafego

Page 29: Social networks threats

Questions?Questions?

Alexandru Catalin COSOIHead of Online Threats Lab

eMail: [email protected]