skip to main content
10.1145/1526709.1526784acmconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article

All your contacts are belong to us: automated identity theft attacks on social networks

Published:20 April 2009Publication History

ABSTRACT

Social networking sites have been increasingly gaining popularity. Well-known sites such as Facebook have been reporting growth rates as high as 3% per week. Many social networking sites have millions of registered users who use these sites to share photographs, contact long-lost friends, establish new business contacts and to keep in touch. In this paper, we investigate how easy it would be for a potential attacker to launch automated crawling and identity theft attacks against a number of popular social networking sites in order to gain access to a large volume of personal user information. The first attack we present is the automated identity theft of existing user profiles and sending of friend requests to the contacts of the cloned victim. The hope, from the attacker's point of view, is that the contacted users simply trust and accept the friend request. By establishing a friendship relationship with the contacts of a victim, the attacker is able to access the sensitive personal information provided by them. In the second, more advanced attack we present, we show that it is effective and feasible to launch an automated, cross-site profile cloning attack. In this attack, we are able to automatically create a forged profile in a network where the victim is not registered yet and contact the victim's friends who are registered on both networks. Our experimental results with real users show that the automated attacks we present are effective and feasible in practice.

References

  1. Modeling and Preventing Phishing Attacks. http://www.informatics.indiana.edu/markus/papers/phishing_jakobsson.pdf, 2005.Google ScholarGoogle Scholar
  2. Spear phishing: Highly targeted phishing scams. http://www.microsoft.com/protect/yourself/phishing/spear.mspx, 2006.Google ScholarGoogle Scholar
  3. CERT Advisory CA-2000-04 Love Letter Worm. http://www.cert.org/advisories/CA-2000-04.html, 2008.Google ScholarGoogle Scholar
  4. Facebook. http://www.facebook.com, 2008.Google ScholarGoogle Scholar
  5. Facebook by the Numbers. http://www.fastcompany.com/magazine/115/open_features-hacker-dropout-ceo-facebook-numbers.html, 2008.Google ScholarGoogle Scholar
  6. LinkedIn. http://www.linkedin.com, 2008.Google ScholarGoogle Scholar
  7. MeinVerzeichnis -- MeinVZ. http://www.meinvz.net/,2008.Google ScholarGoogle Scholar
  8. MySpace. http://www.myspace.com, 2008.Google ScholarGoogle Scholar
  9. New MySpace and Facebook Worm Target Social Networks. http://www.darknet.org.uk/2008/08/new-myspace-and-facebook-worm-target-social-networks, 2008.Google ScholarGoogle Scholar
  10. Sophos Facebook ID Probe.http://www.sophos.com/pressoffice/news/articles/2007/08/facebook.html, 2008.Google ScholarGoogle Scholar
  11. StudiVerzeichnis -- StudVZ. http://www.studivz.net, 2008.Google ScholarGoogle Scholar
  12. The Spamhaus Project. http://www.spamhaus.org/, 2008.Google ScholarGoogle Scholar
  13. Xing -- Global Networking for Professionals. http://www.xing.com, 2008.Google ScholarGoogle Scholar
  14. S. D. Berkowitz. An Introduction to Structural Analysis: The Network Approach to Social Research. Butterworth, Toronto, ISBN 0409813621, 1982.Google ScholarGoogle Scholar
  15. S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah. Gossip algorithms: Design, analysis and applications. In IEEE INFOCOM, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  16. Carnegie Mellon University. The CAPTCHA Project. http://www.captcha.net.Google ScholarGoogle Scholar
  17. J. R. Douceur. The Sybil Attack. In Electronic Proceedings for the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), March 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. D. Flaxman. Expansion and lack thereof in randomly perturbed graphs. Manuscript under submission, 2006.Google ScholarGoogle Scholar
  19. ImageMagick. Introduction to ImageMagick. http://www.imagemagick.org/script/index.php.Google ScholarGoogle Scholar
  20. T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer. Social phishing. Commun. ACM, 50(10):94--100, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. C. Karlberger, G. Bayler, C. Kruegel, and E. Kirda. Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters. In First USENIX Workshop on Oýensive Technologies (WOOT '07), Boston, MA, August 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. kloover.com. Breaking the ASP Security Image Generator. http://www.kloover.com/2008/02/28/breaking-the-asp-security-image-generator/.Google ScholarGoogle Scholar
  23. V. Levenshtein. Binary codes capable of correcting deletions, insertions, and reversals. Doklady Physics, 10(8):707--710, 1966.Google ScholarGoogle Scholar
  24. S. Mori, C. Y. Suen, and K. Yamamoto. Historical review of OCR research and development. Document image analysis, pages 244--273, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. S. Moyer and N. Hamiel. Satan is on My Friends List: Attacking Social Networks. http://www.blackhat.com/html/bh-usa-08/bh-usa-08-archive.html, 2008.Google ScholarGoogle Scholar
  26. PWNtcha. PWNtcha -- captcha decoder. http://sam.zoy.org/pwntcha/.Google ScholarGoogle Scholar
  27. Tesseract. Tesseract OCR. http://sourceforge.net/projects/tesseract-ocr.Google ScholarGoogle Scholar
  28. L. von Ahn, B. Maurer, C. McMillen, D. Abraham, and M. Blum. reCAPTCHA: Human-Based Character Recognition via Web Security Measures. Science, September 2008.Google ScholarGoogle Scholar
  29. H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. SybilGuard: Defending Against Sybil Attacks via Social Networks. 2006.Google ScholarGoogle Scholar
  30. H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks. In IEEE Symposium on Security and Privacy, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. All your contacts are belong to us: automated identity theft attacks on social networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WWW '09: Proceedings of the 18th international conference on World wide web
        April 2009
        1280 pages
        ISBN:9781605584874
        DOI:10.1145/1526709

        Copyright © 2009 IW3C2 org

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 April 2009

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate1,899of8,196submissions,23%

        Upcoming Conference

        WWW '24
        The ACM Web Conference 2024
        May 13 - 17, 2024
        Singapore , Singapore

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader