Home Security Cute doggy – 'I won't bite'

As if malware-ridden apps and drive-by infections from websites are not enough, now you can get malware from clicking on an image on social media sites.

Check Point Technologies security researchers have identified a new attack vector, named ImageGate, which embeds malware in image and graphic files.

Attackers are embedding malicious code into image files and uploading them to social media websites including LinkedIn and Facebook exploiting a security misconfiguration on such sites. When you click on an image, the file is downloaded instead of opened resulting in an immediate infection.

For the past three days’ ransomware-variant Locky, has been spread via ImageGate. Check Point says it advised Facebook and LinkedIn of the potential attack vector in early September, but the loophole still exists.

Oded Vanunu, head of Check Point’s Products Vulnerability Research, said, “As more people spend time on social networking sites, hackers have turned their focus to finding a way to use these platforms. Cyber criminals understand these sites are usually ‘white listed’ and they are continually searching for new techniques to use them as hosts for malicious activities. To protect users against the most advanced threats, Check Point researchers strive to identify where attackers will strike next.”

Check Point recommends the following preventive measures:

  • If you have clicked on an image and your browser starts downloading a file, do not open it. Any social media website should display the picture without downloading any file.
  • Don’t open any image file with unusual extension (such as SVG, JS or HTA).

A detailed and technical disclosure will be published by Check Point after major social media sites fix the vulnerability to minimise attackers from taking advantage of this information.

Comment

It is not the first time that malware has been found in images – its called steganography where code and messages can be hidden in images.

In March 2014, some .jpg files were found to contain the malicious Zeus banking Trojan code. Phishing emails encouraged you to visit websites where clicking on a cute kitten or funny dog caused “drive-by” infections. On the whole, Browsers were updated to prevent such attacks.

This, however, is the first time that social media sites – a new attack vector - have been targeted, apparently with considerable success because they were slow to respond to Check Point's warnings.

Check Point has a brief video about ImageGate here.

 

LEARN NBN TRICKS AND TRAPS WITH FREE NBN SURVIVAL GUIDE

Did you know: Key business communication services may not work on the NBN?

Would your office survive without a phone, fax or email?

Avoid disruption and despair for your business.

Learn the NBN tricks and traps with your FREE 10-page NBN Business Survival Guide

The NBN Business Survival Guide answers your key questions:

· When can I get NBN?
· Will my business phones work?
· Will fax & EFTPOS be affected?
· How much will NBN cost?
· When should I start preparing?

DOWNLOAD NOW!

Ray Shaw

joomla stats

Ray Shaw ray@im.com.au  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!

 

 

 

 

Connect

Join the iTWire Community and be part of the latest news, invites to exclusive events, whitepapers and educational materials and oppertunities.
Why do I want to receive this daily update?
  • The latest features from iTWire
  • Free whitepaper downloads
  • Industry opportunities