Malicious links Facebook – Part 1

Malicious links Facebook – Part 1
Spread the love

Malicious links Facebook – Part 1

 

There are many ways to bypass the privacy of the user on Facebook and publish posts for malicious links, some of which are pornographic, some of which are videos of murder, and many many more.

Today we will start by mentioning the first of these methods, which is a relatively old method, and I had previously recorded a video about this method, but today I will explain it again.

First method:

This method is based on a method of phishing called clickjacking or click catching, as it is considered a type of attack targeting applications and websites that works by adding a web page over another web page.

 

Where the user and the browser interact with these pages with the malicious page without his knowledge, he sees the usual part of the page is lost and the malicious part is not seen.

 

Phishers on the Internet exploit this method in a number of ways, including by integrating it with a social media site to launch attacks called Likejacking or catching likes.

Where scammers design web pages as soon as their browser clicks on a specific area on this page, such as clicking on the file download button or an image or even playing a video inside this page, the browser does a liking on his account on the social networking site Facebook without Flag of it on a link hidden inside this page by the page designer.

 

This link, for which the user was forced to like it, will appear to his friends and followers, so that it increases the possibility of clicking on it and visiting it by others, and thus they fall with the same trick.

These scammers take advantage of these methods to increase the number of visits to their sites, thus increasing the site’s ranking globally and increasing the income from ads such as Google ads and others.

Pranksters can also force browsers to like pages without knowing them, or to follow a specific user on Facebook or Twitter, and countless other things.

This type of attack depends on a language specific to programming web sites, which is the language of javascript, which if not handled properly will lead to dangerous things.

Malicious links Facebook – Part 1

Fortunately, there are many ways to stop and limit this type of attack, which has been made available by security researchers. Where these methods can be applied to both the site browser (the visitor) side, the server side, or both.

On your part, you as a site browser, if you are dealing with a firefox browser you have to install an extension called NoScript, which in turn stops this type of attack.

This method only publishes the links without your knowledge (of course the browser must have logged on from the same browser that they visited the link from) and do not refer to friends in the post, and these things have happened previously with some friends and then I recorded a previous video about This topic and analyzes how it works.

Previous topic link from here: How some sites break your Facebook privacy.

This is the first and simplest method of posting links on accounts, which I hope I have been able to communicate to you in a clear and simple way.

The second way:

Let us now turn to a new method of these methods that can be used by scammers to post such links on your account and exploit and bypass your privacy.

Another method that publishes malicious links is Facebook applications, where any developer can develop applications that provide services to users of the social networking site Facebook. As if you publish wisdom, hadiths, and Quranic verses on the accounts of its subscribers, or that the applications are in the form of games or others.

When you subscribe to any Facebook application, you will be transferred to a page asking you to confirm the things and powers that this application will deal with in your personal account.

After you choose and accept these powers, your access token will be created for this application, so that this application will be able to implement and use the powers that you gave it to you through this code.

These codes and for all users subscribed to this application are usually stored in a database for the application to be used every time the application wishes to deal with your account.

So if we assume that this application is a reliable application and from a trusted site and authority that will not publish posts on your account or monitor you without your knowledge, then any penetration of the server hosting this application by any hacker, the hacker will be able to deal with your account without your knowledge.

Regardless of whether the person who publishes these links is the developer of the application or someone who hacked the server hosting the application, this is a threat to your privacy and you are the one who allowed this to be done with your participation in such applications.

These applications usually have different powers as we mentioned, depending on the things that were requested of you when you subscribe to them, so if you enabled the application to publish on your account or access a list of friends, then the application becomes able to publish any links or posts in your name in addition The possibility of referring to your friends on these posts, which threatens a greater number of people and friends, and those who watch these publications from falling victim to this type of attack.

This matter we followed in the malicious applications such as the application “know who visited your account” or “about your image for a cartoon” or other and we noticed that its spread was very fast.

So please review the applications that you have subscribed to by going to the settings of the account and then to the applications to know what applications have been subscribed to and what are the permissions for each application.

 

Malware Analysis Tools

mmker

I'm a Computer Engineer Information Technology fields, specially in Info-sec field. Also, i'm freelance instructor in Ethical Hacking, Secure Web Development, Penetration Testing and Security Awareness. I have the following certificates : CEH, CHFI, ECSA, LPT Master, & ISO 27001 LI.

Leave a Reply

Your email address will not be published. Required fields are marked *

3 + nine =