We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

Facebook scammers redirect victims through Amazon's cloud

Facebook scammers use links to Amazon's S3 service in their campaigns to trick URL filters

Facebook scammers have started redirecting victims through Amazon's cloud in order to bypass malicious URL filters, according to security researchers from antivirus vendor F-Secure.

One Facebook survey scam recently analyzed by F-Secure uses malicious browser extensions to hijack Facebook accounts and post spam messages on their walls.

The messages contain Bit.ly shortened links that appear to lead to interesting videos. However, in reality they point to redirect scripts hosted on Amazon's S3 service that send victims to a fake Facebook page.

The rogue page displays a video player image, which when clicked, prompts a window asking users to participate in a survey. Scammers earn money through affiliate marketing schemes for every user who agrees to participate.

The scam is distributed through fake extensions for Google Chrome and Firefox that are passed to victims as YouTube player updates. Users are asked to download and install these in order to watch the videos they clicked on.

According to F-Secure's chief research officer, Mikko Hypponen, scammers prefer to redirect users through links on Amazon's cloud because its domain name and corresponding IP addresses have a high trust rating. This increases their chances of tricking malicious URL filters like those used by Bit.ly or Facebook.

While the use of Amazon S3 links in Facebook scams is a relatively new technique, the hosting of malware on the popular cloud service is not a new practice. The Amazon S3 hosting service is not very expensive and a lot of cybercriminals are probably able to afford it.

However, some of them prefer to steal login credentials from existing Amazon customers and abuse their accounts, Hypponen said. "Some of the malcreants exclusively use accounts belonging to other people. Others create new accounts with stolen credit cards. Some create valid accounts and pay for them."


IDG UK Sites

Best January sales 2015 UK tech deals LIVE: Best New Year bargains and savings on phones, tablets,...

IDG UK Sites

Chromebooks: ready for the prime time (but not for everybody)

IDG UK Sites

2015 visual trends: 20 leading designers & artists reveal what should be inspiring us in 2015

IDG UK Sites

Mac tips tricks & hacks: 10 things you didn't know your Mac could do