Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
The ever-evolving Ramnit worm is back, and has harvested more than 45,000 Facebook login credentials primarily from users in the UK and France.
Seculert Research Lab discovered a command-and-control (C&C) server holding the pilfered data in an open directory called "Facebook," with a text file called "Facebook accounts".
Seculert CTO Aviv Ruff said the file contained more than 45,000 unique Facebook usernames and passwords.
"We suspect that the attackers behind Ramnit are using the stolen credentials to expand the malware's reach," Seculert said.
The threat was first discovered in April 2010. Prior variants have infected Windows executable and HTML files, and stole stored data, including usernames, passwords, login credentials and browser cookies.
Previous strains also have functioned as a backdoor, enabling a cyber thief to gain control of an infected computer.
Last July, Symantec reported that Ramnit was the most-blocked malware, accounting for 17 percent of incidents.
A variant spread a month later that incorporated source code from the notorious Zeus trojan, rendering it a hybrid capable of stealing financial assets.
Seculert said it was able to "bypass two-factor authentication and transaction signing systems, gain remote access to financial institutions, compromise online banking sessions and penetrate several corporate networks."
Computers are infected through drive-by download attacks, which occur when users simply visit a malicious website and become infected without taking any action.
Machines also can be impacted if users click on rogue email links.
In the case of Facebook, once the attackers steal a user's login and password to the social networking site, they can access the victim's account to direct others to Ramnit.
Users should never click on suspicious links, even if posted by one of their friends on Facebook, Raff said. Also they should not share passwords across online accounts.
Seculert provided Facebook with all of the stolen credentials it detected on the Ramnit C&C servers.
This article originally appeared at scmagazineus.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.