All the latest UK technology news, reviews and analysis


Clandestine Fox hackers spreading malware via Facebook, Twitter and LinkedIn

10 Jun 2014
Social Media

The hacker group behind a notorious campaign targeting a critical vulnerability affecting multiple versions of Microsoft Internet Explorer has altered its strategy to spread malware using social media, according to security firm FireEye.

FireEye senior threat analyst Mike Scott reported the Clandestine Fox hackers altered their attack strategy after Microsoft issued a patch for the IE flaw, in a blog post. Scott said FireEye uncovered the new attack campaign after detecting a number of malicious social network messages targeting its customers.

"The attackers used a combination of direct contact via social networks as well as contact via email, to communicate with their intended targets and send malicious attachments. In addition, in almost all cases, the attackers used the target's personal email address, rather than his or her work address," read the post.

"This could be by design, with a view toward circumventing the more comprehensive email security technologies that most companies have deployed, or also due to many people having their social network accounts linked to their personal rather than work email addresses."

FireEye director of technology strategy Jason Steer told V3 while the Clandestine Fox strikes are only targeting very specific groups, the effectiveness of the tactic means it is only a matter of time before the wider crime community learns from them.

"Sites like Facebook and LinkedIn are prime sites to look for and target people. If you create a fake profile with a throwaway email account you can be anyone you like and if you access it via Tor no one knows where you connect from either and hence hard to trace back. Then you connect with the target," he said.

"These types of attacks will be reused and recycled into attacks by other gangs in the cybercrime industry as the effectiveness of their APT-style attacks slows. It will then be used by hacktivists, lone hackers and then by general cyber criminals all looking to use their hack against targets of interest or finally against the general man on the street."

Steer recommended businesses take a variety of precautionary measures to protect themselves from future social media-based hack campaigns. These include deleting suspicious messages and requests from people you don't know without opening them and using long passwords that are not shared across multiple accounts.

Clandestine Fox is one of many hacker campaigns uncovered in recent months. Crowdstrike reported discovering a Putter Panda hack campaign spying on high-tech firms involved in space, aerospace and communications industries earlier this week.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Alastair Stevenson
About

Alastair has worked as a reporter covering security and mobile issues at V3 since March 2012. Before entering the field of journalism Alastair had worked in numerous industries as both a freelance copy writer and artist.

View Alastair's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus
Related jobs
Poll

IT curriculum poll

With coding now compulsory in schools, how important are digital skills for the next generation of school leavers?
61%
9%
21%
9%

Popular Threads

Powered by Disqus
V3 Security Summit

V3 Security Summit Day 1: Advanced threat, IoT and phishing guidance incoming

Register and stay tuned for the latest cyber security news, analysis and guidance

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv3may

Getting started with virtualisation

Virtualisation can help you reduce costs, improve application availability, and simplify IT
management. However, getting started can be challenging

ibmv3may

Converting big data and analytics insights into results

Successful leaders are infusing analytics throughout their organisations to drive smarter decisions, enable faster actions and optimise outcomes

Data Business Analyst - Wealth Management - Risk - Reg

I am currently hiring a Data Business Analyst on behalf...

Investment Management Business Analyst

I am seeking a bright, confident Buy side Business Analyst...

BI & Data Architect (Retail Banking)

We are currently recruiting for a BI & Data Architect...

Senior Informatica Developer

Senior Informatica Developer London, UK 6 Month Contract...
To send to more than one email address, simply separate each address with a comma.