Sophos: Facebook Failing to Tackle Likejacking
Likejacking attacks are clickjacking scams that exploit Facebook's 'like' button. The attack automatically updates a user's profile to say they 'like' a specific page on the social network.
This is then shared with other Facebook users via the news feed, and any of the friends that click on the link will be subject to the same fate.
There have been a number of likejacking attacks on the site recently, including third-party pages entitled 'The Prom Dress That Got This Girl Suspended from School', 'This man takes a picture of himself EVERY DAY for 8 years!' and most recently, '101 Hottest Women in the World' which was accompanied by a picture of Jessica Alba.
Sophos said that while the attacks are yet to deliver malicious payloads, they demonstrate an exploitable weakness in the way that Facebook works, putting users at potential risk from further malware or phishing attacks.
"Facebook clearly hasn't been security-conscious enough in the implementation of its social 'like' plugin. This leaves the system open to abuse by spammers and scammers, and exposes users to the risk of outside threats," said Graham Cluley, senior technology consultant at Sophos.
Cluely suggested one solution would be for Facebook to implement ways for members to make a more conscious decision as to whether they want to 'Like' third party content or not.
"By having a pop-up box asking whether users are sure they want to 'Like' a particular page, or offering the option to disable the third-party 'like' feature entirely, the spread of these attacks would be much easier to control," he said.
"What's clear is that Facebook needs to set up a proper early-warning system to alert users about breaking threats. It seems wrong that the only place where Facebook users can read about the latest attacks is on the pages run by security vendors on Facebook, rather than Facebook's own security pages."