Cyber scams rife at social networks: Microsoft

May 12, 2011 by Glenn Chapman
File photo shows a Pakistani browsing the Internet at a cyber cafe in Karachi. Social networks are "lucrative hot beds" for cyber scams as crooks endeavor to dupe members of online communities, according to a Microsoft security report released on Thursday.

Social networks are "lucrative hot beds" for cyber scams as crooks endeavor to dupe members of online communities, according to a Microsoft security report released on Thursday.

"Phishing" attacks that use seemingly legitimate messages to trick people into clicking on booby-trapped links, buying bogus software, or revealing information rocketed 1,200 percent at social networks last year, it said.

"We continue to see evolve attack methods such as a significant rise in social network phishing," Microsoft malware protection center manager Vinny Gullotto said in the Security Intelligence Report.

Phishing using as a "lure" represented 84.5 percent of all such trickery in December as compared with 8.3 percent at the start of 2010, according to the report.

Microsoft analyzed data gathered from more than 600 million computer systems worldwide from July through December of last year for the semi-annual study.

"The popularity of has created new opportunities for cyber to not only directly impact users, but also friends, colleagues and family through impersonation," the report said.

"These techniques add to an existing list of social engineering techniques, such as financial and product promotions, to extort money or trick users into downloading malicious content."

Social engineering is a reference to fooling people to access machines or data instead of trying to hack into networks using software skills.

Microsoft noticed a "polarization" of cyber and a surge in the use of "marketing-like" deception tactics to steal money from people.

"On one side, highly sophisticated criminals skilled at creating exploits and informed with intelligence about a target's environment pursue high-value targets with large payoffs," the report said.

"On the other side, there are cyber criminals using more accessible attack methods, including social engineering tactics and leveraging exploits created by the more skilled criminals, to take a small amount of money from a large number of people."

Criminals used malicious software to trick people with false advertisements, fake , and pay-per-click schemes that generate cash when Internet links are activated, according to .

Detections of software crafted to infect machines with pop-up advertisements meanwhile rose 70 percent from the middle of last year to the end of December, the report indicated.

"With more consumers and devices coming online every day, cyber criminals now have more opportunities than before to deceive users through attack methods like adware, phishing and rogue security software," said Graham Titterington of Britain-based analyst firm Ovum.

"It's becoming increasingly difficult for consumers to decipher legitimate communications and promotions given the sophistication of tools criminals are using."

Rogue security software, referred to as "scareware," was one of the most common ways for cyber criminals worldwide to bilk people out of money and steal information from computers.

The ploy seeks to dupe Internet users by pretending to find viruses and other problems on computers and then offering to sell a program to fix the situation. The software being hawked is a virus.

Computer users were advised to guard against threats by keeping programs updated, using reputable software, and not clicking links or opening files without making certain they are safe.

Explore further: Twitter rules out Turkey office amid tax row

add to favorites email to friend print save as pdf

Related Stories

Facebook fights 'phishing' scam

May 01, 2009

Facebook Thursday said it has blocked a link at the heart of a "phishing" scam being used to dupe members into revealing passwords to accounts at the social networking website.

Cyber criminals cloak their tracks

Feb 13, 2008

The 2007 X-Force Security report from IBM finds a disturbing rise in the sophistication of attacks by criminals on Web browsers worldwide. According to IBM, by attacking the browsers of computer users, cyber criminals are ...

Recommended for you

Twitter rules out Turkey office amid tax row

5 hours ago

Social networking company Twitter on Wednesday rejected demands from the Turkish government to open an office there, following accusations of tax evasion and a two-week ban on the service.

How does false information spread online?

7 hours ago

Last summer the World Economic Forum (WEF) invited its 1,500 council members to identify top trends facing the world, including what should be done about them. The WEF consists of 80 councils covering a wide range of issues including social media. Members come ...

User comments : 0

More news stories

Quantenna promises 10-gigabit Wi-Fi by next year

( —Quantenna Communications has announced that it has plans for releasing a chipset that will be capable of delivering 10Gbps WiFi to/from routers, bridges and computers by sometime next year. ...

Floating nuclear plants could ride out tsunamis

When an earthquake and tsunami struck the Fukushima Daiichi nuclear plant complex in 2011, neither the quake nor the inundation caused the ensuing contamination. Rather, it was the aftereffects—specifically, ...

Unlocking secrets of new solar material

( —A new solar material that has the same crystal structure as a mineral first found in the Ural Mountains in 1839 is shooting up the efficiency charts faster than almost anything researchers have ...

Patent talk: Google sharpens contact lens vision

( —A report from Patent Bolt brings us one step closer to what Google may have in mind in developing smart contact lenses. According to the discussion Google is interested in the concept of contact ...

How kids' brain structures grow as memory develops

Our ability to store memories improves during childhood, associated with structural changes in the hippocampus and its connections with prefrontal and parietal cortices. New research from UC Davis is exploring ...