social networks threats
TRANSCRIPT
![Page 1: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/1.jpg)
SOCIAL NETWORKSTHREATS AND TRENDS
ALEXANDRU CATALIN COSOIALEXANDRU CATALIN COSOIHEAD OF ONLINE THREATSHEAD OF ONLINE THREATS
[email protected]@BITDEFENDER.COM
![Page 2: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/2.jpg)
Viruses
Email worms
Exploit worms
Rootkits
Backdoor Trojans
Sources of Attack
RemovableMedia
Instant Messaging
Clients
Types of Threats Proliferation Mediums
Email AttachmentsScript Kiddies
Threat landscape – Past Threat landscape – Past
2
![Page 3: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/3.jpg)
3
Viruses
Email worms
Exploit worms
P2P worms
IM worms
Rootkits
Backdoor Trojans
Spyware
Adware
Greyware
Sources of Attack
Legitimate, Compromised Multi-media Websites
RemovableMedia
MobileDevices
Public WiFi Networks
Instant Messaging
Clients
Hackers
Web 2.0 Applications
Types of Threats
SPAM Email Attachments
Legitimate Businesses
P2P NetworksPhishingOrganized Crime
Foreign Governments
THREAT LANDSCAPE – PRESENT THREAT LANDSCAPE – PRESENT
Proliferation Mediums
![Page 4: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/4.jpg)
What Urls Am I Talking About?What Urls Am I Talking About?
![Page 5: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/5.jpg)
Where Do Urls Come From?Where Do Urls Come From?
![Page 6: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/6.jpg)
SLIDE 2
Web 2.0Web 2.0
Nice Blue Birdie
![Page 7: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/7.jpg)
SLIDE 3
TwitterTwitter
• Huge growth in the last years• Approximately 7 mil tweets / hour• In Sept 2008, Twitter had a growth of 343%
o (sept 2007 vs sept 2008. according to Nielsen-Online)
In Feb 2009, the growth was of 1382% (feb 2008 – feb 2009, according to Nielsen-Online)
![Page 8: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/8.jpg)
SLIDE 4
Time on Site Time on Site
![Page 9: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/9.jpg)
SLIDE 5
Types of Twitter SpamTypes of Twitter Spam
• Following Spam• Tweet Spam• Direct Message Spam• Trending Subject Spam• Reply/Trackback Spam• ReTweet Spam
![Page 10: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/10.jpg)
SLIDE 16
Scale Free Networks Scale Free Networks
Social Connections are not random.Nodes with many connections will attract new connections easier than nodes with fewer connections
“The rich get richer and the poor get poorer”. Proverb provided by wikipedia
![Page 11: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/11.jpg)
SLIDE 24
Imagine a malware URL from these guysImagine a malware URL from these guys
![Page 12: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/12.jpg)
SLIDE 7
Facebook in NumbersFacebook in Numbers
• More Then 400 million active users• 5.14 % from total word population• 20.18% from worldwide internet users• Over 700 000 bussiness
![Page 13: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/13.jpg)
SLIDE 8
Social Games on FacebookSocial Games on Facebook
![Page 14: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/14.jpg)
SLIDE 9
Facebook’s “Russian Bride”Facebook’s “Russian Bride”
![Page 15: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/15.jpg)
SLIDE 10
Facebook E-mail SpamFacebook E-mail Spam
![Page 16: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/16.jpg)
SLIDE 12
Haiti Hoaxes and scamsHaiti Hoaxes and scams
![Page 17: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/17.jpg)
SLIDE 13
Phishing for FacebookPhishing for Facebook
![Page 18: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/18.jpg)
SLIDE 14
Phishing & Malware on FacebookPhishing & Malware on Facebook
• Facebook blocked an important number of phishing and malware attacks
• Facebook worms use short, provocative and catchy messages
![Page 19: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/19.jpg)
The ads worm (this Tuesday)The ads worm (this Tuesday)
![Page 20: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/20.jpg)
The ads worm (this Tuesday)The ads worm (this Tuesday)
![Page 21: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/21.jpg)
The ads worm (this Tuesday)The ads worm (this Tuesday)
![Page 22: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/22.jpg)
SLIDE 15
User AcceptanceUser Acceptance
• To see how many people accept connect with unknown users
• To see how many people follow unknown links from unknown users
• To see how many people really block unknown connections request
• 3 honeypot users: one profile without picture and containing as few details as possible(1st profile), another profile with a picture and a few details(2nd profile) and yet another profile with a large amount of details and pictures(3rd profile).
![Page 23: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/23.jpg)
SLIDE 16
User Acceptance – SetupUser Acceptance – Setup
• 3 honeypot users• one profile without picture and containing as few
details as possible• one profile with a picture and a few details• one profile with a large amount of details and
pictures
![Page 24: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/24.jpg)
SLIDE 18
User Acceptance - ResultsUser Acceptance - Results
![Page 25: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/25.jpg)
The august study – user acceptanceThe august study – user acceptance
![Page 26: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/26.jpg)
The august study – personal information lossThe august study – personal information loss
![Page 27: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/27.jpg)
The august study – confidential information lossThe august study – confidential information loss
![Page 28: Social networks threats](https://reader035.vdocuments.net/reader035/viewer/2022070318/5575da7dd8b42a917e8b503e/html5/thumbnails/28.jpg)
SafegoSafego