Facebook malware
{{Short description|Malware incidents and responses on Facebook}}
File:Facebook t-shirt with whitehat debit card for Hackers.jpg" debit card that Facebook gives to certain researchers who report security bugs.]]
The social media platform and social networking service Facebook has been affected multiple times over its history by intentionally harmful software. Known as malware, these pose particular challenges both to users of the platform as well as to the personnel of the tech-company itself. Fighting the entities that create these is a topic of ongoing malware analysis.
Types of malware and notable incidents
Attacks known as phishing, in which an attacker pretends to be some trustworthy entity in order to solicit private information, have increased exponentially in the 2010s and posed frustrating challenges. For Facebook in particular, tricks involving URLs are common; attackers will maliciously use a similar website such as
In terms of applications, Facebook has also been visually copied by phishing attackers, who aim to confuse individuals into thinking that something else is the legitimate Facebook log-in screen.{{cite book|title=Detection of Intrusions and Malware, and Vulnerability Assessment: 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014, Proceedings|publisher=Springer|date=2014|isbn=9783319085098|pages=79, 84–85|url=https://books.google.com/books?id=2dokBAAAQBAJ|editor=Dietrich, Sven}}
In 2013, a variant of the "Dorkbot" malware caused alarm after spreading through Facebook's internal chat service.{{Cite web|date=2013-05-14|title=Dorkbot Malware Spotted on Facebook Chat|url=https://www.webtitan.com/blog/dorkbot-malware-on-facebook-chat-compromises-web-security/|access-date=2021-11-21|website=WebTitan DNS Filter|language=en-US}} With suspected efforts by cybercriminals to harvest users' passwords affecting individuals from nations such as Germany, India, Portugal, and the United Kingdom. The antivirus organization Bitdefender discovered several thousand malicious links taking place in a twenty-four hour period, and contacted the Facebook administration about the problem. While the infection was contained, its unusual nature sparked interest given that the attackers exploited a flaw in the file-sharing site MediaFire to proliferate phony applications among victims' Facebook friends.{{cite news|url=https://www.csoonline.com/article/2133458/malware-cybercrime/facebook-attacked-with-credential-harvesting-malware.html|title=Facebook attacked with credential-harvesting malware|first=Antone|last=Gonsalves|date=May 14, 2013|accessdate=January 10, 2018|publisher=CSOonline.com}}
The real computer worm "Koobface", which surfaced in 2008 via messages sent through both Facebook and MySpace, later became subject to inflated, grandiose claims about its effects and spread to the point of being an internet hoax. Later commentary claimed a link between the malware and messages about the Barack Obama administration that never actually existed. David Mikkelson of Snopes.com discussed the matter in a fact-checking article.{{cite web|url=https://www.snopes.com/computer/virus/koobface.asp|title='Koobface' Virus Warning|first=David|last=Mikkelson|website=Snopes.com|date=14 July 2008 |accessdate=January 10, 2018}}
On 26 July 2022, researchers at WithSecure discovered a cybercriminal operation that was targeting digital marketing and human resources professionals in an effort to hijack Facebook Business accounts using data-stealing malware.They dubbed the campaign as 'Ducktail' and found evidence to suggest that a Vietnamese threat actor has been developing and distributing the malware with motives appeared to be purely financially driven.{{cite web|url=https://techcrunch.com/2022/07/26/ducktail-facebook-business-hijack-accounts/|title=A newly discovered malware hijacks Facebook Business accounts|accessdate=26 July 2022|website=Tech Crunch|date=26 July 2022 }}
Responses
= Individual efforts =
In the same vein as actions by Google and Microsoft, the company's administration has been willing to hire "grey hat" hackers, who have acted legally ambiguously in the past, to assist them in various functions. Programmer and social activist George Hotz (also known by the nickname "GeoHot") is an example.{{cite web|url=https://www.cnet.com/news/geohot-now-a-facebook-employee/|title=Geohot now a Facebook employee|website=CNET|accessdate=January 10, 2018|date=June 28, 2011|first=Don|last=Reisinger}}
= Bug Bounty Program =
On July 29, 2011, Facebook announced an effort called the "Bug Bounty Program" in which certain security researchers will be paid a minimum of $500 for reporting security holes on Facebook's website itself. The company's [https://web.archive.org/web/20111222084843/http://www.facebook.com/whitehat/ official page] for security researchers stated, "If you give us a reasonable time to respond to your report before making any information public and make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service during your research, we will not bring any lawsuit against you or ask law enforcement to investigate you."{{cite web|url=https://facebook.com/whitehat|title=Facebook: Whitehat|publisher=Facebook|accessdate=January 10, 2018}} The effort attracted notice from publications such as PC Magazine, which noted that individuals must not just be the first to report the security glitch but must also find the problem native to Facebook (rather than an entity merely associated with it such as FarmVille).{{cite magazine|url=https://www.pcmag.com/article2/0,2817,2389460,00.asp|title=Facebook Offers $500 Bounty for Reporting Bugs: Why So Cheap|magazine=PC Magazine|accessdate=January 10, 2018|first=Sara|last=Yin|date=August 2, 2011}}
= Targeting of specific users =
In late 2017, Facebook systematically disabled accounts operated by North Koreans in response to that government's use of state-sponsored malware attacks. Microsoft did similar actions. The North Korean government had attracted widespread condemnation in the U.S. and elsewhere for its alleged proliferation of the "WannaCry" malware. Said computer worm affected over 230,000 computers in over 150 countries throughout 2017.{{cite news|url=https://www.washingtonpost.com/world/national-security/us-set-to-declare-north-korea-carried-out-massive-wannacry-cyber-attack/2017/12/18/509deb1c-e446-11e7-a65d-1ac0fd7f097e_story.html|newspaper=The Washington Post|title=U.S. declares North Korea carried out massive WannaCry cyberattack|date=December 19, 2017|accessdate=January 10, 2018|first1=Ellen|last1=Nakashima|first2=Philip|last2=Rucker}}