![facebook hacking tools facebook hacking tools](https://i.ytimg.com/vi/K2ZRwg4-AQQ/hqdefault.jpg)
cybersecurity firm FireEye, and Marc-Étienne Léveillé, a researcher at Slovakian software security group ESET, said the hacking activity uncovered by Facebook matched operations attributed to OceanLotus. "The actors in this space use some very defined techniques and if we are too public about how we observe those, it really does harm our ability to catch more of this," Gleicher said.Īlthough OceanLotus has not gained the level of notoriety in the West as some suspected Chinese and Russian state-backed hacking operations, it has been prolific in Southeast Asia.īen Read, a senior manager at U.S. But he said it included online infrastructure, malicious code, and other hacking tools and techniques. He declined to detail the exact evidence, saying to do so would make the group more difficult to track in the future. Nathaniel Gleicher, Facebook's head of cybersecurity policy, said his team had found technical evidence that linked CyberOne's Facebook page to accounts used in the hacking campaign, as well as to other OceanLotus attacks. The ministry has previously denied connections to OceanLotus attacks.įacebook said the hackers had used its platforms to carry out a range of cyberattacks, some of which employed fake accounts to trick targets by posing as activists, businesses and possible love interests. The adoption of cloud security solution could also help to mitigate the risk of attacks.Vietnam's foreign ministry, which handles enquiries from international media, did not immediately respond to a request for comment. It is important to educate employees in a correct and safe use of social media even in the workspace.Īnother important aspect to consider is the incident response, one such kind of attacks against an employee is discovered. In order to prevent such kind of attacks, it is essential to adopt a proper security posture promoting awareness inside the companies. “Cybercriminals can abuse this information and other tools, and sell that access to users.” “We are living in a world where these social networks have become part and parcel of our lives,” Sood explained. Let’s think for example of the possibility to steal login credentials of an employee that works as system administrators or that manage sensitive financial data of the company.Ī growing number of companies are passing to cloud services, for this reason, it is essential to carefully evaluate the risks of exposure to such kind of attack linked to the use of social media.
![facebook hacking tools facebook hacking tools](https://outbound.net/wp-content/uploads/2018/08/blueprint_facebook.jpg)
Attackers can target business users stealing their credentials and launch more sophisticated attacks in the future.
![facebook hacking tools facebook hacking tools](https://i.pinimg.com/originals/23/07/d6/2307d6af2880857484abba89f94e979d.jpg)
Such kind of attacks is particularly insidious for enterprise, the credentials of their employees could be exposed allowing attackers to access company resources. Stolen credentials could be offered for sale in the underground market or used for a wide range of illegal activities. Once the wannabe hacker has provided his credentials they are sent back to the operator behind the scam.
![facebook hacking tools facebook hacking tools](https://1.bp.blogspot.com/-7BEQYCmkP1c/Xbe6eQZfVoI/AAAAAAAABGw/JspU0wav2p8GySQ89JZJIDcmzo5RYPSvwCLcBGAsYHQ/s1600/Screenshot%2Bfrom%2B2019-10-29%2B09-34-39.png)
Of course, the wannabe hacker that intends to hack his friend’s account needs to provide his Facebook login credentials. One of the tools used by the crooks allows an attacker to send to the wannabe hacker a Google Drive link that takes them to a “Facebook Friend’s Account Hacker” document. Hackers abuse the web publishing functionality included in cloud services like Google Drive. “We haven’t checked on other cloud services or standard domains.” added Sood. “It’s hard to list the numbers, but we have discovered multiple instances on Google Drive at the moment,” Sood said. Links to several Facebook Hacker tools were being actively distributed and shared on Google Drive. Experts at BCECTL discovered similar attacks by analyzing the files hosted on Google Drive.