Security Market Segment LS
Friday, 25 November 2016 08:44

Cute doggy – 'I won't bite' Featured

By

As if malware-ridden apps and drive-by infections from websites are not enough, now you can get malware from clicking on an image on social media sites.

Check Point Technologies security researchers have identified a new attack vector, named ImageGate, which embeds malware in image and graphic files.

Attackers are embedding malicious code into image files and uploading them to social media websites including LinkedIn and Facebook exploiting a security misconfiguration on such sites. When you click on an image, the file is downloaded instead of opened resulting in an immediate infection.

For the past three days’ ransomware-variant Locky, has been spread via ImageGate. Check Point says it advised Facebook and LinkedIn of the potential attack vector in early September, but the loophole still exists.

Oded Vanunu, head of Check Point’s Products Vulnerability Research, said, “As more people spend time on social networking sites, hackers have turned their focus to finding a way to use these platforms. Cyber criminals understand these sites are usually ‘white listed’ and they are continually searching for new techniques to use them as hosts for malicious activities. To protect users against the most advanced threats, Check Point researchers strive to identify where attackers will strike next.”

Check Point recommends the following preventive measures:

  • If you have clicked on an image and your browser starts downloading a file, do not open it. Any social media website should display the picture without downloading any file.
  • Don’t open any image file with unusual extension (such as SVG, JS or HTA).

A detailed and technical disclosure will be published by Check Point after major social media sites fix the vulnerability to minimise attackers from taking advantage of this information.

Comment

It is not the first time that malware has been found in images – its called steganography where code and messages can be hidden in images.

In March 2014, some .jpg files were found to contain the malicious Zeus banking Trojan code. Phishing emails encouraged you to visit websites where clicking on a cute kitten or funny dog caused “drive-by” infections. On the whole, Browsers were updated to prevent such attacks.

This, however, is the first time that social media sites – a new attack vector - have been targeted, apparently with considerable success because they were slow to respond to Check Point's warnings.

Check Point has a brief video about ImageGate here.

 

Read 2395 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here




EXL AI IN ACTION VIRTUAL EVENT 20 MARCH 2025

Industry leaders are looking to transform their businesses and achieve measurable outcomes with AI.

As organisations across APAC navigate the complexities of AI adoption, this must-attend event brings together industry leaders, real-world demonstrations, and visionary panel discussions to bridge the gap between proof-of-concepts and enterprise-wide AI implementation.

Learn how to overcome common challenges in deploying AI at scale.​

Unlock cost savings, efficiency, and better customer experiences with AI.

Discover how industry expertise and data intelligence enable practical AI deployment.

Register for the event now!

REGISTER!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
Ray Shaw

joomla stats

Ray Shaw ray@im.com.au  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!

Share News tips for the iTWire Journalists? Your tip will be anonymous

Subscribe to Newsletter

*  Enter the security code shown: img0

WEBINARS & EVENTS

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments