Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Hackers harvest Facebook private data with social bots

Social network fails to catch fake malware profiles

Article comments

Facebook's fake account detection mechanisms can be defeated 80 percent of the time with the help of automated tools, researchers from the University of British Columbia have found after an eight week test.

The research team, composed of Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov and Matei Ripeanu, created a network of 102 bots designed to mimic humans on social networks, and released them on Facebook with the intent of befriending as many users as possible and collecting private information.

"Creating a user account on an OSN [online social network] involves three tasks: providing an active email address, creating a user profile, and sometimes solving a CAPTCHA. We argue that an adversary can fully automate the account creation process," the researchers wrote in a research paper which they plan to present at the 27th Annual Computer Security Applications Conference.

Failing detection

This is not a new type of attack: malware threats like Koobface have long used automatically created accounts to spam malicious links. This pushed Facebook to develop specialised detection mechanisms over the years.

Unfortunately, these defense systems are not effective enough, according to UBC researchers. The social bots they unleashed onto Facebook targeted 5,053 randomly selected users to whom they sent friend requests.

The rate at which the targeted individuals accepted these requests was 20 percent on average, with bots using female profiles having better success. However, the rate tripled when the bots started targeting friends of those who had accepted requests.

After befriending new users, the automated programs scraped their profiles, news feeds and wall posts for personal information. The collected data included things like gender, birth date, place of employment, names of attended schools, home city, current city, mail address, email address, phone number, IM account IDs and marital status.

The researchers stopped their test when the Internet traffic it generated became too heavy. The social bot network sent 3GB of data and received approximately 250GB over the course of eight weeks.

Dodging the blocks

During this time, Facebook's real-time protection system only blocked 20 of the 100 fake profiles. However, on closer investigation, it was determined that those profiles were actually flagged as spam by other users.

"Our results show that (1) OSNs, such as Facebook, can be infiltrated with a success rate of up to 80%, (2) depending on users' privacy settings, a successful infiltration can result in privacy breaches where even more users' data are exposed when compared to a purely public access, and (3) in practice, OSN security defenses, such as the Facebook Immune System, are not effective enough in detecting or stopping a large scale infiltration as it occurs," the researchers said.

Malware experts acknowledge Facebook's efforts to block automated account creation attempts on its social network. According to antivirus vendor BitDefender, the number of threats that use such techniques has decreased considerably during the past two years.

"This shift is mostly due to the fact that Facebook is continually working on improving the network's security, but, no matter the effort, cybercrooks still find ways to sneak in," Bogdan Botezatu, a spokesman for the company, said.

However, there is still a significant amount of malware that abuses already compromised accounts in order to spread on the social network. "There are numerous variants of different botnets that attempt to login to Facebook in order to spread adware or unwanted software," Adam Thomas, a threat researcher at GFI Software said.

In order to protect both their private information and their computers, social networking users should avoid accepting friend requests from unknown individuals and always be wary of links sent to them, even when the people who sent them are friends.


More from Techworld

More relevant IT news


Bob said: The next Facebook MySpace is seeking donations investors here wwwwepaycomdonatesocialcom Make a donation to a new social network being developed that does not spam collect or sell your personal information and gives users an opportunity to become business owners

Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *