470 likes | 599 Views
Automated Social Engineering Attacks in OSNs. Yazan Boshmaf Konstantin Beznosov Matei Ripeanu. The Not-So-Private Social Web. Or, Web 2.0. Facebook: Sharing. Social Attributes Demographics Preferences. Facebook Archives. http//www.facebook.com. Facebook: Sharing. Social Structure
E N D
Automated Social Engineering Attacks in OSNs Yazan Boshmaf Konstantin Beznosov Matei Ripeanu
Facebook: Sharing • Social Attributes • Demographics • Preferences Facebook Archives. http//www.facebook.com
Facebook: Sharing • Social Structure • Friends • Mutual Friends Facebook Archives. http//www.facebook.com
Facebook: Public Access Sample! Whoops!
Facebook: Privacy Evolution MCKEON, M. The evolution of privacy in Facebook. http://mattmckeon.com.facebook-privacy
Facebook: Privacy Evolution MCKEON, M. The evolution of privacy in Facebook. http://mattmckeon.com.facebook-privacy
Facebook: Privacy Evolution MCKEON, M. The evolution of privacy in Facebook. http://mattmckeon.com.facebook-privacy
Facebook: Privacy Evolution MCKEON, M. The evolution of privacy in Facebook. http://mattmckeon.com.facebook-privacy
Facebook: Privacy Evolution MCKEON, M. The evolution of privacy in Facebook. http://mattmckeon.com.facebook-privacy
Facebook: Privacy Evolution MCKEON, M. The evolution of privacy in Facebook. http://mattmckeon.com.facebook-privacy
Automated Cross-Site ID Theft Bilge, L., Strufe, T., Balzarotti, D., and Kirda, E. All your contacts are belong to us: automated identity theft attacks on social networks. In WWW ’09
Automated Cross-Site ID Theft Bilge, L., Strufe, T., Balzarotti, D., and Kirda, E. All your contacts are belong to us: automated identity theft attacks on social networks. In WWW ’09
Automated Cross-Site ID Theft From Facebook Bilge, L., Strufe, T., Balzarotti, D., and Kirda, E. All your contacts are belong to us: automated identity theft attacks on social networks. In WWW ’09
Automated Cross-Site ID Theft Sample! Why did it work? Bilge, L., Strufe, T., Balzarotti, D., and Kirda, E. All your contacts are belong to us: automated identity theft attacks on social networks. In WWW ’09
Context-Aware Spam Brown, G., Howe, T., Ihbe, M., Prakash, A., and Borders, K. Social networks and context-aware spam. In CSCW 2008
Social Phishing Jagatic, T. N., Johnson, N. A., Jakobsson, M., and Menczer, F. Social phishing. Communications ACM 2007
Web Applications Attacks Evron, G. New Facebook worm warning: Wanna see somethong hot?http://darkreading.com/blog/archives/2009/11/new_facebook_wo.html
Can be Turned into a Botnet! Anthanasopolous, E., Makridakias, A., Antonatos, S., Antoniades, D., Ioannidis, S., Anagnostakis, K. G., and Markatos, E. P. Antisocial networks: Turning a social network into a botnet. In ISC ’08
Koobface Botnet TrendMicro. The real face of koobface. Technical report 2009
Research Questions Mwahaha!
The Attack - Crawling Target Adversary
The Attack - Ranking Target 8 Adversary 3 1 2 4 7 5 6
The Attack - Infiltrating Target 8 Adversary 3 1 2 4 7 5 6
The Attack - Infiltrating Target 8 Adversary 3 1 2 4 7 5 6
The Attack - Infiltrating Target 8 Adversary 3 1 2 4 7 5 6
The Attack - Infiltrating Target 8 Adversary 3 1 2 4 7 5 6
The Attack - After Target 8 Adversary 3 1 2 4 7 5 6
The Attack - After Target Adversary
A Network of “Trust” Target Adversary
Surveillance Target Adversary
Amplified Social Engineering Target Adversary Aha! Yeah, I posted the picture! Will send you a link soon. Sarah, the Pool event last week was awesome!
Towards Social Collaborative Security Hey Kosta, check out this link http://www.malicous.com Looks malicious!
Towards Social Collaborative Security Hey Kosta, check out this link http://www.malicous.com Looks malicious! ? Hey all, this link is malicious http://www.malicous.com Collaboration Network Social Network
The Big Picture • Vulnerability: • Authenticity of online relationships + public information • Things to evaluate: • The attack in real-settings (Now, simulation-only). • Usability and expressiveness of privacy controls vs. privacy implications realized by users. • Identified issues: • How can social networking sites, or OSNs, distinguish between fake and real online identities (Social Sybil Nodes)? • Future work: • Social Collaborative Security (threat identification, opinion mining, reasoning, alert diffusion, etc.)