Facebook Facelift: Ice IX Malware Injects Fake Page to Commit Credit Card Fraud

April 3, 2012
| |
3 min read

Our researchers have discovered a new configuration of the Ice IX malware. It attacks Facebook users after they have logged in to their account and steals credit card and other personal information. We even discovered a “marketing” video used by the creators of the malware to demonstrate how the Web injection works.

How Ice IX Malware Works

The global reach and scale of the Facebook service makes it a favorite target of fraudsters. Recently, we wrote about criminals stealing e-cash vouchers from Facebook users and selling bulk Facebook log-in credentials. This latest attack uses a web injection to present a fake web page in the victim’s browser. The form requests that the user provide their name, credit or debit card number, expiration date, card ID and billing address. The attackers claim the information is needed to verify the victim’s identity and provide additional security for their Facebook account.

For anyone who believes the cyber crime economy lacks the sophistication of the legitimate economy, the following marketing video provides conclusive evidence that it does not. We discovered this video circulating in underground forums. It demonstrates in step-by-step fashion how to perform a Web inject cycle to attack Facebook users.

The video begins at the Facebook log on page with the criminal logging in to a Facebook account.

Next, the video demonstrates the pop-up created by the Web inject. This pop-up presents virtually the same message used in the Ice IX configuration our researchers discovered and analyzed. The only difference is the version in the video requests a social security number and date of birth in addition to the information mentioned earlier. In the video, the criminal fills out the fields.

Finally, the video shows the Ice IX malware delivering the information entered in the pop-up to the fraudster’s messenger application.

What It Means for Users

This video illustrates the seamless sophistication of pre-built Web injects that are readily available for purchase on the Internet. It also demonstrates how accomplished cyber criminals are at marketing their malware products. Most of all, this attack highlights how fraudsters are branching out from their bread-and-butter online banking schemes into lateral applications with much larger user populations.

By attacking Facebook and other ubiquitous social networks, fraudsters can tap a massive pool of victims. They can also use the information harvested from social network users to perpetuate fraud on multiple fronts, including online banking or retail, and even to penetrate enterprise and government networks.

Facebook’s Response

We contacted Facebook to advise them that they would be mentioned in this blog. Facebook requested that we pass on some information about their site’s security measures. Here’s a summary of their response:

  1. Facebook actively detects known malware on users’ devices to provide Facebook users with a self-remediation procedure, including the Scan-and-Repair malware scan. To self-enroll in this check point, please visit on.fb.me/AVCheckpoint.
  2. Report to Facebook any spam found on the Facebook site, and remember Facebook will never ask for your credit card, social security or any other sensitive information other than your username and password while logging in.

View on-demand webinar: Cybercriminals Never Sleep

Amit Klein
CTO, Trusteer, an IBM company

As Trusteer’s CTO, Amit Klein is responsible for researching and introducing game changing technologies into Trusteer’s products, with particular focus o...
read more