Advertisement
YOU ARE HERE: LAT HomeCollections

INTERNET

ID thieves find a niche in online social networks

Scam artists are taking advantage of a trusting arena to get members to divulge passwords and other information.

May 05, 2008|Joseph Menn | Times Staff Writer

Michael Maris became an unwitting spammer.

The 22-year-old college student from Chicago received messages last year from annoyed friends on MySpace, wondering why he had used the social networking site to send them pitches for male enhancement products.

He checked his outgoing mail folder and discovered that someone had hacked into his account, then blasted the unsolicited messages to each of his 70 MySpace pals. Among the recipients were his nieces, ages 14 and 16.

"I couldn't believe that it happened," he said.

Social networking sites, which let users create detailed profile pages and connect with friends, are becoming the hot new thing for identity thieves, both amateur and professional. As improved spam filters and skeptical consumers make bogus e-mail less successful, scam artists are taking advantage of the atmosphere of trust that exists within these online circles of friends.

Symantec Corp., a tech security firm, recently reported that 91% of the bogus U.S.-based websites used in so-called phishing attacks during the second half of 2007 imitated the log-in pages of two unnamed social networking sites -- believed by industry executives to be the two biggest, MySpace and Facebook. Phishing tries to trick recipients into visiting phony websites and disclosing account numbers, passwords and other personal data.

"The bad guys are very adaptable. If something doesn't work, they come up with something new," said Kevin Haley, a product executive at Symantec. "Users feel more comfortable surrounded by their friends online -- what could be safer?"

Sometimes financial gain isn't the objective. Cyber-bullies have taken over the social networking accounts of acquaintances to post vicious rants or engage in mischief.

Frank Nein, a new-media executive in Los Angeles, is still perturbed that a man showed up at the home of his 12-year-old daughter after another girl impersonated her during MySpace chats.

Nicole Whiting, a 19-year-old nanny from Charlotte, N.C., fielded questions from friends about her new boyfriend, Patrick. They learned of the relationship on what they thought was her Facebook page.

One problem, she said: "I don't even know a Patrick."

It turned out that "some lonely guy" had copied her pictures from her MySpace page, borrowed her first name and created a Facebook profile for an imaginary girlfriend. Her problem ended after she tracked down Patrick and complained.

But experts warn that victims of more sophisticated scams won't get off so easy. The same kind of hucksters who dreamed up e-mail scams featuring Nigerian dictators are now focused on cracking social networks to peddle products and engage in identity theft.

In more organized campaigns, scammers distribute free widgets that purport to help users decorate their profile pages but secretly use the log-on information to spam their friends, as happened to Maris. Other crooks surreptitiously install software that records keystrokes to steal financial data, or they use personal details gleaned from the profiles to make e-mail fraud attempts more credible.

One common technique on social networking sites involves sending messages that appear to come from an online buddy, inviting the recipient to check out a new profile page. The page then asks the recipient to log in.

It's a scam. Although the page looks as if it's on MySpace or Facebook, thieves have set it up to capture log-in names and passwords. The con artists can then try those names and passwords to gain access to e-mail accounts, financial accounts and other websites, given that many people use the same password widely.

For scammers, knowing the names of a target's friends can be a powerful tool. Last year researchers at Indiana University used simple tools to crawl through major networking sites and record the connections among Indiana students they found. They then sent e-mails that appeared to come from a friend also enrolled at the school.

About 72% of the recipients clicked on the e-mailed link and then entered their university user names and passwords at a fake site. In a control group where the e-mails came from strangers at the university, only 16% fell for it.

MySpace and other sites that rely on outside advertising networks also have been compromised by malicious banner ads that take advantage of security holes in users' Web browsers to install spyware. In addition, both MySpace and Facebook recently had security vulnerabilities in their systems for uploading photos. "Toolkits" for exploiting those vulnerabilities to forcibly install "malware" circulated rapidly in hacker communities.

Most attacks work only against people who lack updated firewalls, anti-virus systems and anti-spyware programs, but some can victimize anyone clicking the wrong link.

Advertisement
Los Angeles Times Articles
|
|
|