Microsoft puts the kibosh on Facebook worm Koobface

Discussion in 'other anti-malware software' started by ronjor, Mar 11, 2009.

Thread Status:
Not open for further replies.
  1. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    164,045
    Location:
    Texas
    Article
     
  2. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    thanks alot for this value info:thumb:
     
  3. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    164,045
    Location:
    Texas
    You're welcome. :)
     
  4. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    i downloaded the updates from microsoft and also i was told that prevx edge stop it cold:) thanks again and please when you find similar info let us know:)
     
  5. Sully

    Sully Registered Member

    Joined:
    Dec 23, 2005
    Posts:
    3,719
    @Ronjor

    I love it. You used the word kibosh. lol. But, is that really how you spell it :D

    Sul.
     
  6. Rmus

    Rmus Exploit Analyst

    Joined:
    Mar 16, 2005
    Posts:
    4,020
    Location:
    California
    Isn't this the exploit where the victim gets infected after clicking a link to watch a video and then agreeing to update the flash player when a pop up appears?

    ----
    rich
     
  7. Triple Helix

    Triple Helix Specialist

    Joined:
    Nov 20, 2004
    Posts:
    13,275
    Location:
    Ontario, Canada
    Yes it is!

    TH
     
  8. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    164,045
    Location:
    Texas
    That's the one.
    Reuters
     
  9. Rmus

    Rmus Exploit Analyst

    Joined:
    Mar 16, 2005
    Posts:
    4,020
    Location:
    California
    Ah, yes - I remember now. This is a rather old exploit isn't it? I snagged a screenshot of the ploy back in December:

    koobface_1.jpg

    A year or so ago several of us gave some thought to the exploits making the rounds of the social network sites and wrote a few guidelines for users we know. They included,

    1) Always verify the receipt of an image or link from the person who sent it. This is just an extension of good email procedures.

    2) Always update plugins directly from the vendor's site using a bookmark, rather than respond to a message while on a web site.

    Later, we added this great advice from Brian Krebs: Never install something you didn't go looking for.

    Happily, no one we know has ever fallen for these tricks.

    Social network sites can be navigated and used safely with basic security procedures in mind.

    ----
    rich
     
  10. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    164,045
    Location:
    Texas
    While that is true, it is only true for those with a knowledge of secure computing. Judging by the number of infected computers out there, the message is not getting through.
     
  11. Rmus

    Rmus Exploit Analyst

    Joined:
    Mar 16, 2005
    Posts:
    4,020
    Location:
    California
    I certainly agree, which is why I and a few others last year decided to do something about it and make sure that at least those we know who use these sites get the message. This is especially important in families where children use these sites. In these cases, parents can control what gets downloaded/installed.

    ----
    rich
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.