“Previously, if you suspected you may have malware installed on your device, you would either need to run anti-virus on your device or wait until Facebook identified an actionable threat. Now, with our new self-enrollment malware checkpoint, you will be able to proactively obtain your choice of a free anti-virus product to scan and clean your system.”
The announcement comes just months after Facebook announced malware-removal software partnerships with McAfee and Microsoft.
The new system offers McAfee’s Scan and Repair option and Microsoft’s Security Essentials platform. Once downloaded both applications offer the chance to scan for and remove suspected malware. The programs Facebook says will not interfere with already installed anti-virus programs. read more
A quick warning for Twitter users today, a new Twitter worm exploit has been discovered that uses the Google URL shortener service, sending users to fake antivirus sites.
The worm works by sending users through a goo.gl link to a site that offers a service called “Security Shield” which is in fact a piece of malware. The malware as detected by Sophos virus scans is called Troj/FakeAV-CMG.
Twitter is aware of the worm and their safety account claims they are “working to remove the malware links and reset passwords on compromised accounts.”
If you’ve followed a Goo.gl link in the last 24 hours, I would recommend running a full system scan and changing your Twitter password as soon as possible. read more
A leading security company claims that Twitter is being exploited by those who own and control botnets — clusters of computers taken over without owner knowledge and often used to launch denial of service attacks.
Arbor Networks suggests that Twitter accounts are being set up to broadcast links to malicious code. Those computers already part of the botnet would then follow these links, via RSS feed, in order to get new instructions/targets. read more
Security experts last week warned that a new strain of the Koobface virus is hitting Facebook, MySpace and other social networking sites. It looks for links and passwords to other social networking sites.
Social networking site owners work actively to put a lid on nefarious activity. On Tuesday, a federal judge in northern California issued a temporary restraining order against three people accused of widespread spamming and phishing attacks on Facebook. It comes three months after Facebook won a suit that prevents another group of spammers from using or accessing Facebook data and applications.
Virus creators are increasingly targeting social networking sites and other Web 2.0 technologies such as the micro-blogging site Twitter and instant messaging services from Google, AOL and others. Virus writers are also creating fake profiles of celebrities, real friends or business associates hoping people will link with them. Users can be tricked into linking to the fake profile, which can be loaded with various forms of malicious software.
The article by Brian Deagon showcased Facebook users who responded to an email from a “friend on Facebook” to visit a link that initiated a program that “rifled through his hard drive, installed malicious software and sent the same e-mail to all of Daradics’ friends on his Facebook profile.” read more
The Downadup worm, a malicious program that spreads using a recently patched Windows flaw, has compromised more than 3.5 million computers, security firm F-Secure stated this week.
The Downadup worm has successfully spread because it uses a major flaw that Microsoft patched in October to remotely compromise computers running unpatched versions of the Windows operating system. However, the malicious program’s greatest strength appears to be a feature that allows worm-controlled computers to download malicious code from a random drop point.
The program generates addresses for 250 different domains each day. The botnet controller need only register one of the domains and set up a download server to update the bot program with different functionality, said Mikko Hyppönen, chief research officer at F-Secure.
“The bad guys only need to predetermine one possible domain for tomorrow, register it, and set up a website, and they then gain access to all of the infected machines — pretty clever,” Hyppönen said in a blog post.
According to the report, the Downadup worm uses Windows XP’s vulnerability in processing remote procedure call (RPC) requests. While a patch was issued and warnings announced, not everyone has upgraded. The top countries hit by the MS08-067 Worms, as F-Secure calls them, are China, Brazil, and Russia, but it is expected to spread further unless server administrators and webmasters update and patch their Windows Servers and Windows programs immediately, including Internet Explorer.
The 2008 first half Security Threat Report, published by computer security company Sophos, has identified Google’s Blogger as being responsible for 2-percent of the world’s malware.
Apparently, hackers are setting up free blogs that host malicious code. You’ll also find evil links lurking in the comments section.
According to Google:
“Using Blogger, or any Google product, to serve or host malware is a violation of our product policies. We actively work to detect and remove sites that serve malware from our network.”
The United States received the distinct honor of being the home of the most infected Web pages (accounting for two out of every five). Following behind are China, Russia, Germany and the Ukraine. Let’s hope we carry this winning streak into the Olympics!
Up next, the infiltration of your mobile device. I can hardly wait.