Online Security has become a growing Industry, for IT professionals as well as Criminals. It’s an ongoing battle against good and evil that is played out across our connected devices on a daily basis. Facebook and it’s users are often targeted by hackers, criminals , etc. The latest tool in their arsenal seems to be the very effective “Ramnit” worm, which has recently been credited with capturing more tha n 45,000 Facebook log in credentials.
Seculert Cyber Threat management writes……..
Much has been written about the Ramnit worm and its transformation into a financial malware. And now, Seculert’s research lab has discovered that Ramnit recently started targeting Facebook accounts with considerable success, stealing over 45,000 Facebook login credentials worldwide, mostly from people in the UK and France.
Discovered in April 2010, the Microsoft Malware Protection Center (MMPC) described Ramnit as “a multi-component malware family which infects Windows executable as well as HTML files”, “stealing sensitive information such as stored FTP credentials and browser cookies”. In July 2011 a Symantec report [PDF] estimated that Ramnit worm variants accounted for 17.3 percent of all new malicious software infections.
In August 2011, Trusteer reported that Ramnit went ‘financial’. Following the leakage of the ZeuS source-code in May, it has been suggested that the hackers behind Ramnit merged several financial-fraud spreading capabilities to create a “Hybrid creature” which was empowered by both the scale of the Ramnit infection and the ZeuS financial data-sniffing capabilities. This synergy has enabled Ramnit to bypass two-factor authentication and transaction signing systems, gain remote access to financial institutions, compromise online banking sessions and penetrate several corporate networks. With the use of a Sinkhole, we discovered that approximately 800,000 machines were infected with Ramnit from September to end of December 2011.
It seems, however, that this is not the last twist. Recently, our research lab identified a completely new ‘financial’ Ramnit variant aimed at stealing Facebook login credentials. Since the Ramnit Facebook C&C URL is visible and accessible it was fairly straightforward to detect that over 45,000 Facebook login credentials have been stolen worldwide, mostly from users in the United Kingdom and France.
We suspect that the attackers behind Ramnit are using the stolen credentials to log-in to victims’ Facebook accounts and to transmit malicious links to their friends, thereby magnifying the malware’s spread even further. In addition, cybercriminals are taking advantage of the fact that users tend to use the same password in various web-based services (Facebook, Gmail, Corporate SSL VPN, Outlook Web Access, etc.) to gain remote access to corporate networks.
With the recent ZeuS Facebook worm and this latest Ramnit variant, it appears that sophisticated hackers are now experimenting with replacing the old-school email worms with more up-to-date social network worms. As demonstrated by the 45,000 compromised Facebook subscribers, the viral power of social networks can be manipulated to cause considerable damage to individuals and institutions when it is in the wrong hands.
* Seculert has provided Facebook with all of the stolen credentials that were found on the Ramnit servers.
- Ramnit Worm Goes After Facebook Credentials (pcworld.com)
- Dammit Ramnit! Worm slurps 45,000 Facebook passwords (go.theregister.com)
- ‘Ramnit’ worm hijacks 45,000 Facebook logins (zdnet.com)
- Worm Steals At Least 45,000 Facebook Logins (escapistmagazine.com)
- ‘Ramnit’ malware targets Facebook, steals 45,000 passwords (business.financialpost.com)
- Hackers Steal 45,000 Facebook Passwords & Logins (readwriteweb.com)
- Worm steals 45,000 Facebook login credentials, infects victims’ friends (arstechnica.com)
- Worm Steals 45,000 Facebook Login Credentials, Infects Victims’ Friends (webmonkey.com)
- 45,000 Facebook passwords stolen by Ramnit worm (slashgear.com)
- Worm Hits Facebook, Steals Nearly 50,000 Login Credentials (inquisitr.com)