Skip to main content

Beware of new Facebook spam


Have you been hit like millions of Facebook users by a new phishing scam that can result in crashing your computers or mobile phones and steal your passwords? If not, beware, do not open the files ending with “.at” or “.be”.

The phishing scam is being run through the spam messages which steals the sensitive information of the Facebook users.

In the attack, the messages are circulated with a subject line of “Hello” and a prompt to check out “areps.at” or other URLs ending in “.at”.

The mails with the subject line “Look at This” and links like -- goldbase.be, greenbuddy.be, silvertag.be, picoband.be -- leads to some malicious Web sites, which if visited, could secretly download malware onto computers through a “drive-by download” application.

The URL connectivity, before being blocked directs the visitor to a fake Facebook page and the mail ID and password are stolen as soon as it is logged-in again.

According to the All Facebook blog.Facebook, the password in such cases should be changed immediately and the same message should be sent across to one’s Facebook acquaintance.

“Whoever is behind the scam has been steadily amassing a large number of e-mail addresses and passwords over the past few weeks,” the blog says.

Though, Facebook spokesman Barry Schnitt said: “The impact of this attack or the previous ones are not widespread and only impacted a tiny fraction of a per cent of users.

“We’ve been updating our monitoring systems with information gleaned from the previous attacks so that each new attack is detected more quickly,” he said.

The site has blocked links to the new phishing sites from being shared on Facebook and has added them to the block lists of the major browsers.

The social networking site is working with partners to have the sites taken down completely, he said adding Facebook is also cleaning up phony messages and wall posts and resetting the passwords of affected users.

“We believe the bad guys here are phishing an account and then trying those credentials on webmail providers,” Schnitt said.

So, for example, if a user is compromised on Facebook and has the same login and ID password for their Gmail, the attacker may be able to intercept the Facebook password reset and compromise the account again in the future, he added. – (Press Trust of India)

Comments

Popular posts from this blog

Wanted

Despite leading newspaper’s refusing to publish the girls photographs, Sri Lankan Police has issued 83 girls images yesterday to all media organizations in the country with a view of seeking help from public to take them into custody. Among those images there are 81 of women and 4 men’s images. These girls have acted in XXX (porn) videos [Sri Lanka]. Please inform about these people dial 119. [Pic by Gossip Lanka]

LTTE Leader Prabakaran’s Body Identified-Army Commander

The body of LTTE leader Prabakaran has been identified, confirms Army Commander Pictures By Ada Derana

NISHANTHA MUTHUHETTIGAMA ARRESTED

Nishantha Muthuhettigama has been arrested by a special police team in Yakkalamulla, Galle moments ago, Senior DIG Southern Province Kingsley Ekanayaka told Ada Derana. Ekanayaka told Ada Derana earlier that a special police team was deployed to arrest SPC member Nishantha Muthuhettigama over an arrest warrant. The arrest warrant is regarding the incident where he allegedly threatened the Galle District Secretary.