Social NOTworking Site's 2nd in 2 Daze!

Facebook was attacked withyet another phishing campaign Thursday that compromised lots of accounts tocollect users' passwords.  Hackers broke into some Facebook members' accounts and sent emails to all their friends luring them to visit cloned websites which were designed as Facebook home pages.  Purpose?  To entice facebookies to log-in and thereby obtain their username password.   According to articles I've perused, the website domains included www.121.im, www.123.im andwww.151.im.

Facebook said it detected the attack (after they got phaced) and deleted alllinks to the fake sites. The purpose of the attack was obviously to get username and passwords for a future spam scam to phfriends.

Update:  From CNET: (see  link below in related stories)  "Phacebook stopped a phishing attack on Thursday, its second day in arow of dealing with a worm on the site that lures people to a fake Phacebook page and prompts them to log in.   Phacebook has faced two phishing attacks in the past two days but officials aren't sure whether they are related.


Unsuspecting Facebook users get a message from a friend urging them to"check this out" and including a link to a Web page that appears to bea Facebook log-in page, but it is a fake site that steals theirinformation when they type in their username and password. The wormalso sends a copy of the message to the infected Facebook member'scontacts.
In the latest attack, the Web address was "FBStarter.com." In Wednesday's attack, the address was "BAction.net."
The attacks were stopped within a few hours in each case, said Facebookspokesman Barry Schnitt. He said it was too early to say whether thetwo phishing attacks are related. "We are investigating," Schnitt said."




Reblog this post [with Zemanta]

Posted by John B. Frank Friday, May 15, 2009

0 comments

Payments Industry News Blog

Search the PIN Debit Blog by Subject

Kapersky Calls for Mass Adoption of Card Readers

Kapersky Calls for Mass Adoption of Card Readers