T 5.158 Abuse of social networks

Social networks are very successful platforms that are attracting more and more members. However, besides various advantages, there are also certain security risks which the users should not loose sight of:

Example

"Evil twin": A social network was used by a data phisher to create a forged profile of a celebrity. Due to the publicly available images and the quick creation of a seemingly authentic web page it was not easily possible for the visitors of the online profile to discover that the identity was falsified. The attacker placed a link, supposedly to a video, on the profile page. In fact, this link lead to a forged log-in page on an external website. The attacker stored the victim's log-in data obtained in this way in a so called drop zone.
In general, spying out access data of a social network does not mean a financial loss for the users. If, however, the data falls into the wrong hands, a loss of image may be a possible consequence of an online profile manipulated by phishers. In the present case, the attacker did not exploit a vulnerability in the web application. This phishing variant is possible on any online platform which does not verify the identity of the users. More significant damage than manipulations to profiles can be caused by sending messages within the online platform which contain links to websites manipulated with malware. Due to the basis of trust between the users, the attacker should have a high success rate. The same rule as for phishing e-mails applies to social networks: links contained in messages should be encountered with a healthy scepticism.