{"id":1024,"date":"2013-09-13T17:03:30","date_gmt":"2013-09-13T17:03:30","guid":{"rendered":"http:\/\/business.kaspersky.com\/?p=1024"},"modified":"2020-12-24T04:00:37","modified_gmt":"2020-12-23T17:00:37","slug":"social-networks-a-threat-source-and-a-business-resource","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/social-networks-a-threat-source-and-a-business-resource\/1024\/","title":{"rendered":"Social networks: a threat source and a business resource"},"content":{"rendered":"<p>The middle of August was marked by several reports of Facebook security issues, all of them quite scandalous. Even though they didn\u2019t cause any catastrophic consequences for the users, they should not be underestimated. They are another reason for talking about the safety (or hazards) of social media from the point of view of corporate network administrators.<\/p>\n<p>Before discussing specific incidents, we have to note that the world\u2019s largest social networks were originally designed for collaboration and information exchange within a fairly narrow selection of people (such as Facebook and Livejournal). Then, the growing resources reached the point when the scope of social media became almost identical to the scope of the whole Internet. A few years ago social networks were most likely a problem for commercial companies (employees spent too much of their working time on social networks so it was easier just to ban their use altogether). But, commercial companies have recently been trying to use the popular resources to promote their products and brands. This duality does not make the lives of system administrators any easier.<\/p>\n<p>\u00a0<\/p>\n<p><b>Chapter One. The weird lines on Zuckerberg\u2019s wall<\/b><\/p>\n<p>Unemployed Palestinian information security expert \u1e30halil Shreateh <a href=\"http:\/\/khalil-sh.blogspot.ru\/p\/facebook_16.html\" target=\"_blank\" rel=\"noopener nofollow\">found<\/a> a serious flaw in Facebook which allowed posting messages on the wall of any user of the social network, ignoring whatever limitations were enabled. He made \u200b\u200bseveral attempts to inform the support team of Facebook about the bug but eventually he had to post a <a href=\"https:\/\/www.facebook.com\/photo.php?fbid=10151865722018885&amp;set=a.476649568884.293872.778218884&amp;type=1&amp;comment_id=11670033&amp;offset=100&amp;total_comments=110\" target=\"_blank\" rel=\"noopener nofollow\">message on the wall of Mark Zuckerberg<\/a> so that the technical support would realize that they were dealing with a software error.<\/p>\n<p>At that point, Shreateh\u2019s account was blocked and later they restored his access to Facebook but refused to pay the promised fee of $4,000 for the found vulnerability, referring to \u1e30halil\u2019s violation of the rules of the user agreement and of bug report registration.<\/p>\n<p>\u1e30halil was thoroughly hurt and promised to sell information of a possible vulnerability on the black market next time. Given the popularity of Facebook, his supply would meet the highest demand ever.<\/p>\n<p>How did it end? Facebook exuded odd inflexibility when dealing with an enthusiast who wanted to help, even though it was all over payment for the find. The story gained wide public attention \u2013 the worst publicity for Facebook, especially for benevolent enthusiasts and malicious hackers. Enthusiasts saw it as a sign that working with Facebook is worth nothing but social responsibility, and hackers got another reason to look for any serious breaches in Facebook and use it against the most popular social network in the world. Who will suffer in the end?<\/p>\n<p>Surely, the users will.<\/p>\n<p>\u00a0<\/p>\n<p><b>Chapter Two. Mass disabled applications<\/b><\/p>\n<p>In late August a great number of legitimate applications written by third-party developers for Facebook were disabled. In addition, the accounts of the developers <a href=\"https:\/\/news.ycombinator.com\/item?id=6208967\" target=\"_blank\" rel=\"noopener nofollow\">were blocked<\/a>.<\/p>\n<p>On August 13, the official developers blog posted an <a href=\"https:\/\/developers.facebook.com\/blog\/post\/2013\/08\/15\/summary-of-the-august-13th-app-outage\/\" target=\"_blank\" rel=\"noopener nofollow\">explanation<\/a> about why some applications for Facebook and developers\u2019 accounts were suspended without warning.<\/p>\n<p>\u201cThe Facebook Platform and our users are constantly under attack from malicious apps and we have many automated systems to protect the platform and our users. Occasionally we detect an attack that requires us to augment those automated systems. Specifically, we identify a malicious pattern, find all the apps that match that pattern, and then disable those apps. This normally results in thousands of malicious apps being disabled and improves our automated systems\u2019 ability to detect similar attacks in the future,\u201d wrote the author Eugene Zarakhovsky. According to him, on August 13th, they started with a broad pattern that correctly matched thousands of malicious apps but, unfortunately, also matched many high-quality apps \u2013 the system disabled a large number of legitimate third-party apps as malicious.<\/p>\n<p>\u201cWhen we detected this error, we immediately stopped the process and began work to restore access. The process took longer than expected because of the number of apps affected and bugs related to the restoration of app metadata,\u201d Zarakhovsky wrote.<\/p>\n<p>As a result, the technical support services of Facebook promised to revise their methods and technologies in order to minimize the possibility of similar incidents in the future.<\/p>\n<p>\u201cWe understand that incidents like these are disruptive to your businesses, and we sincerely apologize for the inconvenience,\u201d Zarakhovsky wrote.<\/p>\n<p>There are lots of malicious applications written for Facebook. That is a well-known fact. And cybercriminals try to use the popularity of the network for their own purposes. Any popular service is bound to become a target for cybercriminals, the more people use the service, the more people want to use it to spread malware and other unpleasant items.<\/p>\n<p>In the Hacker News\u2019 thread a Facebook\u2019s spokesman <a href=\"https:\/\/news.ycombinator.com\/item?id=6208967\" target=\"_blank\" rel=\"noopener nofollow\">wrote<\/a> that the number of false positives was 0.1%.<\/p>\n<p>The \u201cthousands of malicious applications\u201d mentioned by the official blog are another reason for system administrators of corporate networks to be concerned of the risks that social networks pose to corporate data.<\/p>\n<p>\u00a0<\/p>\n<p><b>Getting to know the risks<\/b><\/p>\n<p>Facebook is the most popular but just one of s multiple of social networks in the world.<\/p>\n<p>The question of their safety for business in general and for IT departments in particular arose a long time ago and is still very urgent. How safe is it for employers to have their employees use social networks at work?<\/p>\n<p>In early July, Kaspersky Lab\u2019s expert Kirill Kruglov wrote that surveys in Europe and the United States showed that employees would spend up to 30% of their working time \u201con personal issues.\u201d According to analysts it may cause millions of dollars of damage a year.<\/p>\n<p>Companies quite often solve the problem radically by blocking access to social media from work. However that may not be the best way to bolster team spirit (and it may reduce productivity and motivation), and secondly, as I said above, more and more companies try \u2013 with whatever success \u2013 to use social networks to promote their own products and brands. That is, Facebook, LinkedIn, Google Plus, and other resources become part of the business processes; therefore, denying access to them cannot be considered an optimal solution to the problem.<\/p>\n<p>The hazard\/safety question of social networks is essentially divided into two aspects. The first one is associated with deficiencies of the platforms themselves, for example, gaps like the one \u1e30halil Shreateh found. They are not harmless because there might have been a malicious link in place of the respectful message about the problem if Shreateh had been less \u201csocially responsible.\u201d<\/p>\n<p>Network attackers actively use social networks to send Nigerian scams and phishing emails as well as to steal personal data: last year LinkedIn officially acknowledged the leak of 6.5 million user passwords.<\/p>\n<p>The second personal aspect seems more important. Social media users have recently developed a persistent habit of \u201cparading their lives\u201d by posting a lot of personal (even intimate) information about themselves and their activities. Sometimes it is not just personal but professional life, too.<\/p>\n<p>The published information may seem perfectly innocent at first but a laborious and motivated cybercriminal can obtain enough data from disparate publications of the observed person to carry out a successful spearphishing attack against the colleagues of the employee. To lull their vigilance it often suffices to mention some details in the scam letter that seem to be known only to the employees of the attacked company. Digging this kind of data is available everywhere including office photographs or the last corporate picnic\u2019s descriptions.<\/p>\n<p>\u00a0<\/p>\n<p><b>What is to be done?<\/b><\/p>\n<p>The answers to this question are purely technical measures and tools of combating specific threats.<\/p>\n<p>In case the company\u2019s management believes that the damage caused by employees spending too much time on social networks cannot be endured any longer you can give the right to access social media, for example, to the marketing department only and block it for the rest of the staff. Our Kaspersky Endpoint Security solution allows restricting or blocking access to any resources at the level of security policies, allowlists and web traffic control functions, if necessary.<\/p>\n<p>If the social media access is granted to all or some specific departments there is a particular response to every kind of threat.<\/p>\n<p>Getting phishing emails via social media? Anti-phishing tools are deployed by default. Any malicious links to the resources organizing network attacks? <a href=\"https:\/\/www.kaspersky.com\/business-security\/endpoint-advanced#tab=frame-2\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Windows<\/a> has integrated security functions against malware and network attacks. The additional layers of defense are provided by the application\u2019s launch control system and the automatic anti-exploit protection.<\/p>\n<p>If the company adopts the BYOD paradigm and employees stick to their own devices for work and personal use, the security policies have to be applied equally to personal and corporate devices. Our solutions provide that just by installing the client on the personal device of an employee.<\/p>\n<p>Moreover, the employees should clearly understand that the corporate image is also built upon the things that the employees write about the company. Every single company decides what is acceptable for an employee to report about his or her work. However, users should at least grasp the consequences of accidental disclosure of sensitive corporate information in a social network\u2019s posting or in a wrongly shared file in Dropbox or Google Drive, or even by a photo of the whiteboard in the conference room.<\/p>\n<p>The attempts at teaching today\u2019s social networks\u2019 users to keep secrecy can hardly give any results but at least the employees had better be aware of the possible consequences of their actions in social media.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The middle of August was marked by several reports of Facebook security issues, all of them quite scandalous. Even though they didn\u2019t cause any catastrophic consequences for the users, they<\/p>\n","protected":false},"author":209,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[98],"class_list":{"0":"post-1024","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-business","7":"category-smb","8":"tag-social-networks"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/social-networks-a-threat-source-and-a-business-resource\/1024\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/social-networks-a-threat-source-and-a-business-resource\/1024\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/social-networks-a-threat-source-and-a-business-resource\/1024\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/social-networks\/","name":"social networks"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/1024","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=1024"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/1024\/revisions"}],"predecessor-version":[{"id":28690,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/1024\/revisions\/28690"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=1024"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=1024"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=1024"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}