The Koobface Botnet and the Rise of Social Malware
Thomas, Kurt
Loading…
Permalink
https://hdl.handle.net/2142/16598
Description
Title
The Koobface Botnet and the Rise of Social Malware
Author(s)
Thomas, Kurt
Contributor(s)
David, Nicol M.
Issue Date
2010-07-27
Keyword(s)
Koobface, Botnet, Social Malware, Spam
Abstract
As millions of users flock to online social networks, sites such as Facebook and Twitter are becoming increasingly attractive targets for spam, phishing, and malware. The Koobface botnet in particular has honed its efforts to ex- ploit social network users, leveraging zombies to gen- erate accounts, befriend victims, and to send malware propagation spam. In this paper, we explore Koobface’s zombie infrastructure and analyze one month of the bot- net’s activity within both Facebook and Twitter. Con- structing a zombie emulator, we are able to infiltrate the Koobface botnet to discover the identities of fraudulent and compromised social network accounts used to dis- tribute malicious links to over 213,000 social network users, generating over 157,000 clicks. Despite the use of domain blacklisting services by social network oper- ators to filter malicious links, current defenses recognize only 27% of threats and take on average 4 days to re- spond. During this period, 81% of vulnerable users click on Koobface spam, highlighting the ineffectiveness of blacklists.
This is the default collection for all research and scholarship developed by faculty, staff, or students at the University of Illinois at Urbana-Champaign
Use this login method if you
don't
have an
@illinois.edu
email address.
(Oops, I do have one)
IDEALS migrated to a new platform on June 23, 2022. If you created
your account prior to this date, you will have to reset your password
using the forgot-password link below.