Home Invites Blogs Careers Chat Events Forums Groups Members News Photos Polls Singles Videos
Home > Blogs > Post Content

Examining How Facebook Got Hacked (190 hits)

Zero-Day Exploit Bypassed Java Protections to Install Malware

By Eric Chabrow, February 16, 2013. Follow Eric @GovInfoSecurity

Even the most savvy information technologists aren't immune from cyber-attacks. Just ask Facebook. The social-media titan says it fell victim to a sophisticated attack discovered in January in which an exploit allowed malware to be installed on employees' laptops.

In a blog posted by Facebook Security on Feb. 15, the company said it found no evidence that Facebook user data was compromised.

Here's what happened at Facebook, according to its blog:

Several Facebook employees visited a mobile developer website that was compromised. The compromised website hosted an exploit that then allowed malware to be installed on these employees' laptops.

"The laptops were fully-patched and running up-to-date anti-virus software," the blog says. "As soon as we discovered the presence of the malware, we remediated all infected machines, informed law enforcement and began a significant investigation that continues to this day."

Facebook Security flagged a suspicious domain in its corporate DNS (Domain Name Servers) logs and tracked it back to an employee laptop. The security team conducted a forensic examination of that laptop and identified a malicious file, and then searched company-wide and flagged several other compromised employee laptops.

After analyzing the compromised website where the attack originated, Facebook found the site was using a previously unseen, zero-day exploit to bypass the Java sandbox (built-in protections) to install the malware. Facebook immediately reported the exploit to Oracle, and Oracle confirmed Facebook's findings and provided a patch on Feb. 1 that addressed the vulnerability.

Facebook says it wasn't the only victim of this exploit. "It is clear that others were attacked and infiltrated recently as well," the blog says. "As one of the first companies to discover this malware, we immediately took steps to start sharing details about the infiltration with the other companies and entities that were affected. We plan to continue collaborating on this incident through an informal working group and other means."

The social-media company says it is working with law enforcement and the other organizations affected by this attack. "It is in everyone's interests for our industry to work together to prevent attacks such as these in the future," Facebook says.

Sharing threat information has received much attention in Washington this past week. President Obama, in his State of the Union address on Feb. 12, announced an executive order that calls on the government to share cyberthreat information with critical infrastructure owners and called for legislation to allow businesses to share threat information with the government and with each other [see Obama Issues Cybersecurity Executive Order]. The following day, the heads of the House Permanent Select Committee on Intelligence introduced a bill to do just that [see Is Compromise in Offing for CISPA?] .

Facebook is the latest high-profiled media company to reveal it's been victimized by intruders. The New York Times, Wall Street Journal, Twitter and Washington Post have reported their websites being attacked [see N.Y. Times' Transparent Hack Response and Twitter, Washington Post Report Cyberattacks].

The Facebook attack is reminiscent of the 2011 breach at security provider RSA, when a well-crafted e-mail tricked an RSA employee to retrieve from a junk-mail folder and open a message containing a virus that led to a sophisticated attack on the company's information systems [see 'Tricked' RSA Worker Opened Backdoor to APT Attack].

http://www.govinfosecurity.com/examining-h...
Posted By: Steve Williams
Monday, February 18th 2013 at 1:54PM
You can also click here to view all posts by this author...

Report obscenity | post comment
Share |
Please Login To Post Comments...
Email:
Password:

 
Steve, hackers have the hunger crave to break in. This is the new kind of intruder of present day technology of communication.
By the way...
I'm hacking you telepathy right now! LOL!
Tuesday, February 19th 2013 at 6:37PM
MIISRAEL Bride
Is that why I've been thinking of you and wondering when I'd see you again? And her you are! And thanks for commenting on my blog Miisrael. It's a wonder no one reads this stuff since it can effect us Internet users in so many ways. I have a system log that shows unauthorized connection attempts, and these occur every few seconds. They are blocked by the firewall but they still annoy me. In the past I've been known to send some warning shots back at them. I just don't have the necessary tools installed on my current PC.
Tuesday, February 19th 2013 at 6:54PM
Steve Williams
Facebook has had its share of security attacks. Hopefully President Obama's Cyber Security Plans will initialize a change.

Thanks Steve for sharing this information.
Tuesday, February 19th 2013 at 7:06PM
Aphrodite Cox
You know I like to read your blogs w/o question...

It's hard to keep any protection from hackers. literary they are almost one step ahead of any preventive devices. It's a good practice to keep something to fight them off, but I am with you I've not the necessary equipped with guarded tools installed either. It's a caution light on all the time-- they will come in many cloaks. Facebook as you know has much better protection any home pc computer, and looked at what happens, they break into FACEBOOK!

@ Aphrodite I'm glad to see some security change coming. This is some great info as well.
Tuesday, February 19th 2013 at 7:19PM
MIISRAEL Bride
Hi Aphrodite!

Improving the Security of the Nation’s Critical Infrastructure

The Nation increasingly relies on the Internet to run the systems that light our houses, provide gas for our cars, and ensure our water is safe to drink. Collectively, these diverse systems represent our cyber critical infrastructure. Linking our critical infrastructure to the Internet brings considerable benefits, but our daily reliance on this critical infrastructure means that we are vulnerable to disruptions in our ability to use it. Unfortunately, the threats against our cyber critical infrastructure are numerous, ranging from sophisticated nation states to common criminals.

The government’s senior-most civilian, military, and intelligence professionals all agree that inadequate cybersecurity within this critical infrastructure poses a grave threat to the security of the United States. Most recently, we have seen an increased interest in targeting public and private critical infrastructure systems by actors who seek to threaten our national and economic security. Along with dissuading their actions, we must better protect the critical systems that support our way of life.

Because of the importance of our cyber critical infrastructure, and the seriousness of the threats, the President issued an Executive Order yesterday directing federal departments and agencies to use their existing authorities to provide better cybersecurity for the Nation. These efforts will by necessity involve increased collaboration with the private sector and a whole-of-government approach.

In developing the order, the Administration sought input from stakeholders of all viewpoints in industry, the public sector, the legislative branch, and the advocacy community. Their input has been vital in crafting an order that incorporates the best ideas and lessons learned from industry experience, legislative efforts, and successful federal efforts. Over the course of the past six months, we hosted over 30 organizations, representing all 18 critical infrastructure sectors, and heard from over 200 companies directly. We also met with trade associations representing an additional 6,000 companies, over $7 trillion in annual economic activity, and over 15 million employees to discuss their concerns and ideas for solutions. As a result of our outreach, numerous stakeholders responded positively to the Executive Order.

The Executive Order: Improving security for our cyber critical infrastructure presents a set of complex issues. The Executive Order addresses the three areas that are necessary to address the problem holistically: information sharing, a flexible risk-based Framework of core practices based on existing standards, and privacy protections. (For more details, see our Fact Sheet on the Executive Order.)

Information Sharing. It is a national priority to efficiently, effectively, and appropriately increase the volume, timeliness, and quality of cyber threat information shared with authorized individuals and companies. One of the primary efforts of the Executive Order is to better enable information sharing on cyber threats between the private sector and all levels of government. The Executive Order fosters improved public-private sharing in three important ways.

First, it expands the Department of Homeland Security’s Enhanced Cybersecurity Services program to provide near real-time sharing of information on cyber threats with critical infrastructure companies and state and local governments.

Second, it directs federal agencies to provide timely notification to companies if we have information indicating that a company is the target or victim of a cyber intrusion. Finally, the Executive Order directs DHS to expedite the processing of clearances for appropriate state and local government and private sector personnel to enable the federal government to efficiently share cyber threat information at the sensitive and classified level.

Cybersecurity Framework: The Executive Order directs the National Institute of Standards and Technology (NIST) to lead the development of a framework to reduce cyber risks to critical infrastructure. NIST will work with industry to identify existing voluntary consensus standards and industry best practices to incorporate into the framework.

The Administration recognizes that there are private-sector cyber leaders in our critical infrastructure sectors who are already implementing strong cybersecurity controls, policies, and procedures. Rather than burdening such organizations with more to do, the Executive Order puts these innovators at the core of informing and driving the development of voluntary best practices for the framework. In this way, we can distil common cybersecurity practices from the experts that know them best and leverage them to improve the security of the Nation’s critical infrastructure.

The framework does not dictate “one-size fits all” technological solutions. Instead, it promotes a collaborative approach to encourage innovation and recognize the differing needs among critical infrastructure sectors. Organizations who want to upgrade their cybersecurity will have the flexibility to decide how best to do so using a wide range of innovative products and services available in the marketplace.

Privacy and Civil Liberties Protections: The Executive Order reflects the Administration’s deep commitment to ensuring that processes for sharing cyber threat and incident information between the federal government, state, and local government, and private companies incorporates rigorous protections for individual privacy and civil liberties. Accordingly, the Executive Order directs departments and agencies to incorporate privacy and civil liberties protections into cybersecurity activities based upon widely-accepted Fair Information Practice Principles, and other applicable privacy and civil liberties frameworks and polices. The Executive Order also requires regular privacy assessments and public reporting of any privacy and civil liberties impacts.

More Action is Needed: This Executive Order represents an important step in improving cybersecurity protections for our critical infrastructure, and reflects recommendations from many different groups, including the bi-partisan Commission on Cybersecurity for the 44th Presidency and the Recommendations of the House Republican Cybersecurity Task Force. However, more is needed. Executive action alone cannot create the new tools and authorities needed to meet the Nation’s collective cybersecurity challenges. The Administration continues to urge Congress to pass legislation to more fully address our Nation’s cybersecurity needs.

For decades, industry and all levels of government have worked together to protect the physical security of critical assets that reside in private hands - from airports and seaports to national broadcast systems and nuclear power plants. Similarly, we must now work in partnership to protect the cyber critical infrastructure systems upon which so much of our economic well-being, national security, and daily lives depend.

As we have made clear, industry has a significant role to play as well. As a first step, I would urge Chief Executive Officers (CEOs) to ask their team these five questions and ensure that they are satisfied with the answers. Additionally, I ask that industry, academia, the advocacy community, and all who are interested, participate in the NIST process to develop the Cybersecurity Framework. Visit NIST’s website to view NIST’s request for information (RFI) and find out how to participate.

As the President’s Cybersecurity Coordinator, I look forward to engaging all stakeholders in this important national mission.

Michael Daniel is Special Assistant to the President and Cybersecurity Coordinator.

http://www.whitehouse.gov/blog/2013/02/13/...

Tuesday, February 19th 2013 at 7:37PM
Steve Williams
Please Login To Post Comments...
Email:
Password:

 
More From This Author
LETTERS TO TRUMP
Why was the public not told when they were discovered in November?
McCarthy thanks Trump after House speaker vote: 'He was with me from the beginning'
Donald Trump's 'Digital Trading Cards' Sold Out In One Day — Netting $4.4 Million
AFPAC II (2021) Nick Fuentes Full Speech
Ousted Twitter counsel Jim Baker vetted 'Twitter Files' without Elon Musk's knowledge, Matt Taibbi reveals
Herschel Walker Interview at First Baptist Atlanta
Nick Fuentes is not a White Supremacist
Forward This Blog Entry!
Blogs Home

(Advertise Here)
Who's Online
>> more | invite 
Black America Resources
100 Black Men of America
www.100blackmen.org

Black America's Political Action Committee (BAMPAC)
www.bampac.org

Black America Study
www.blackamericastudy.com

Black America Web
www.blackamericaweb.com

CNN Black In America Special
www.cnn.com/blackinamerica

NUL State of Black America Report
www.nul.org

Most Popular Bloggers
agnes levine has logged 24541 blog subscribers!
reginald culpepper has logged 12075 blog subscribers!
miisrael bride has logged 8261 blog subscribers!
tanisha grant has logged 5720 blog subscribers!
rickey johnson has logged 4922 blog subscribers!
>> more | add 
Latest Jobs
NETWORK ENGINEER with Arizona State University in Tempe, AZ.
SENIOR NETWORK ENGINEER with Arizona State University in Tempe, AZ.
DOC State School Teacher - Multiple Endorsements & Facilities - State of Connecticut - Accepting applications through 1/21/26 with State of Connecticut - Department of Correction, Unified School District #1 in Various locations in CT, CT.
Advanced Manufacturing Vocational Instructor - State of Connecticut - Accepting applications through 2/2/26 with State of Connecticut - Department of Correction, Unified School District #1 in Various locations in , CT.
Hospitality Vocational Instructor - State of Connecticut (Accepting applications through 2/2/26) with State of Connecticut - Department of Correction, Unified School District #1 in Various locations in , CT.
>> more | add