Bug exposes 6.8 million Facebook user photos

Security Matters: For more information about permission settings, read our “Guide to managing mobile app permissions.”

On Dec. 14, Facebook announced that third-party developers had gained access to users’ private photos through a bug in the permissions process. This bug was active between Sept. 13 and 25.

Facebook delayed this announcement until they had completed an investigation of the breach. The investigation revealed that 1,500 apps built by 876 developers may have had access to these photos. Facebook will notify all users who were impacted by the bug.

Upon installation, these Facebook apps typically requests permission to access timeline photos. An investigation revealed that the permissions bug exposed photos in scheduled posts and photos shared through Facebook Stories and Marketplace.

Learn more about staying safe online by visiting securitymatters.utoronto.ca.

Phishing schemes to beware of this holiday season

Along with the holiday season comes the imminent arrival of new cyber security scams. These annual scams are socially engineered to manipulate a generous spirit, festive cheer and the high-anxiety of holiday shopping into lucrative privacy leaks and data breaches.

The Better Business Bureau (BBB) reports that spoofed websites, fake shipping notifications, festive e-cards, travel scams and targeted cyber attacks against seniors are among the 12 most common privacy-compromising schemes of December 2018. Users must take additional precautions and pay special attention to emails that offer free gift cards, attachments from unfamiliar or unexpected recipients, sudden requests for money from family members and deals that seem too good to be true.

BBB warns that seniors remain vulnerable to cyber security attacks, and the ‘grandma scam’ is particularly common during the holiday season. If a senior receives a desperate request for money by someone claiming to be a relative, he or she should contact family members directly to verify the claims.

Other precautionary advice includes:

  • Shoppers double-check who they are purchasing from, as many holiday phishing attackers are expert at imitating authentic brands.
  • Before opening any email links, ensure that the ‘from’ address and link URLs are secure and consistent with the official domain of the stated company. Email users should hover their mouse over the displayed hyperlink or webpage link to verify the destination URL.
  • Remain wary of email attachments or links from alleged shipping companies or unverified e-card companies. Legitimate businesses would never request that you enter your personal information to view content. Treat all links and attachments as suspicious email content until proven otherwise.

For more resources on how to keep your information secure this holiday season, visit securitymatters.utoronto.ca.

[Phish] I advise you not to call the police.

NOTE SAMPLE ONLY. This malicious fraud attempt has been seen elsewhere, but has not been reported at the University – yet. Be aware and report if you see this or other phishes at https://securitymatters.utoronto.ca/report/.

Details:

From: [redacted]

Subject: I advise you not to call the police.

Text:

My man carried a bomb (Hexogen) into the building where your company is located. It is constructed under my direction. It can be hidden anywhere because of its small size, it is not able to damage the supporting building structure, but in the case of its detonation you will get many victims.

My mercenary keeps the building under the control. If he notices any unusual behavior or emergency he will blow up the bomb.

I can withdraw my mercenary if you pay. You pay me 20.000 $ in Bitcoin and the bomb will not explode, but don’t try to cheat -I warrant you that I will withdraw my mercenary only after 3 confirmations in blockchain network.

Here is my Bitcoin address : [redacted]

You have to solve problems with the transfer by the end of the workday. If you are late with the money explosive will explode.

This is just a business, if you don’t send me the money and the explosive device detonates, other commercial enterprises will transfer me more money, because this isnt a one-time action.

I wont visit this email. I check my Bitcoin wallet every 35 min and after seeing the money I will order my recruited person to get away.

If the explosive device explodes and the authorities notice this letter:
We are not terrorists and dont assume any responsibility for explosions in other buildings.

Dell resets customer passwords following attempted breach

Following a Nov. 9 cyber security incident, last week Dell announced it is resetting all customers’ passwords. The unauthorized activity detected by Dell involved an attempt to steal customer information, including names, email addresses and hashed passwords.

The initial investigation found no evidence that the hackers succeeded to extract any information. However, Dell decided to reset all customer account passwords as a countermeasure. Therefore, if one of your online accounts shares a password with a Dell account, it is wise to change that password as well.

Dell has not disclosed the number of accounts that were affected, but did confirm that payment information and social security numbers were not compromised.

Visit securitymatters.utoronto.ca to learn more about how to stay safe online and detect phishing emails.

[Phish] Amazon : activate your account ✔

Details:

From: no_repIy <contact@web2015.p2wt.com>

Subject: [Amazon] : Activate Your Account ✔

Text:

Dear Customer,

Some informations on your acount appears to be missing or incorrect, please update your account informations promptly so that you can continue to enjoy all the benefits of your Amazon account.

If you don’t update your informations within 72 hours we’ll limit what you can do with your Amazon account.

Simply click on the web address below :

Verify Now >

Thank you for your concern.

Sincerely,

Amazon Services Team

Amazon Services. Inc. is a subsidiary of Amazon.com. Inc. Amazon.com is a registered trademark of Amazon.com, Inc. This message was produced and distributed by Amazon Services Inc.. 410 Terry Ave. North. Seattle. WA 98109-5210

Phishing attacks targeting administration on the rise

On Nov. 16, University of Toronto (U of T) staff reported suspicious emails sent from accounts belonging to University administrators. The emails contained a request for recipients to purchase gift cards with their personal credit card with reimbursement promised in the near future.

The emails were “spoofed” – meaning the display name and domain URL were disguised to appear to originate from a senior executive at the University. This year, there has been a noticeable increase in these types of phishing attacks. To avoid falling victim to these types of cyber crimes, always follow up in person or by phone in regard to a request that is unexpected, urgent and/or atypical of your day-to-day interactions.

Examples of similar phishing attacks at the University include emails from:

  • A company named Xero asking for invoice payment.
  • Netflix warning that account information needs to be updated or service will be limited.
  • Someone you know asking you to quickly purchase iTunes gift cards.
  • Someone you don’t know making an Interac transfer to your bank account.

You can view a collection of reported phishes by visiting the Security Matter’s Phish Bowl.

To report a suspicious email or phishing attack, contact report.phishing@utoronto.ca.

For more tips on how to stay safe online at work visit our Security Matters blog and check out our tip sheets.

Connecting with the community at information security events

Over the past two years, Information Technology Services (ITS) and the information security and enterprise architecture (ISEA) team have held a variety of outreach events to educate the University of Toronto audience about information security. This opportunity to connect with the community one-on-one and in-person is key and often results in event attendees sharing their own information security-related experiences and questions.

While hosting pop-up booths we heard from many students who were victims of social media fraud. One student told us her face was photoshopped to another woman’s body and used as a profile picture on an active Twitter account. Even though the account was taken down after she reported the incident, the student was left wondering who had done this and why they would want to steal her image in this way. In instances like this, do not hesitate to report the incident or user to the social media platform — you have a right to your image and identity. To learn more about safe social media practices, visit our resources page.

In one of our recent panel discussions, a senior systems administrator shared how he fell victim to a phishing scam. He described to the group that normally he would check the sender’s email address before replying to or engaging with any unusual emails. Unfortunately, in this case, he was using an unfamiliar iteration of Outlook (the Android app) and he wasn’t able to easily check the sender’s address. Without thinking, he clicked a link in an email and entered his credentials on the corresponding landing page. He quickly realized his error and acted fast to change his UTORid password.

After hearing so many stories of fraud, phishing attempts, compromised credit cards and more, it’s clear that a listening ear is still the best way to get people to open up about their experiences with information security.

We’d like to hear from you, if you have an information security story you would like to share please contact us at its.eda@utoronto.ca.

Guide to managing mobile app permissions

It’s important to pay attention to what you’re installing on your mobile device and the kind of permissions you enable, especially when granting access to your microphone or camera.

This is an image of Amazon requesting access permission to access the camera feature on a mobile phone

You should audit your phone regularly to verify that your apps only have access to the parts of your phone they need in order to function. You may even want to consider deleting some apps since studies show that out of 160,000 free Android apps more than 55 per cent of trackers tried to extract user location, while 30 per cent accessed the device’s contact list. A 2015 analysis of 110 free iOS mobile apps revealed that 47 per cent shared geo-coordinates and personally identifiable information with third parties.

After installing an app, you’re typically asked for permission to access specific hardware and software on your phone in order to function. Many apps ask for permission to access private channels, such as your camera, contacts, microphone, text messages and external storage.

To check and modify your Android phone’s app permission settings, go to “settings” then “apps” and then use the top-right dropdown menu button to select “app permissions.”

This is a screenshot of an android phone's settings where the access to mobile app permissions is located

For iPhone users, simply navigate to “settings” then “privacy.” From here, you can view a list of your phone’s apps. Tap on any app to bring up a list of its permissions. Click the toggle next to each permission to enable or disable access.

This is a screenshot of an iPhone settings where access to mobile app permissions is located

Learn more about how to stay safe online and other related information security news.

To help you distinguish between typical vs. potentially risky access permissions, view the list below.

This is an image of dangerous and normal types of mobile app permissions

Normal permissions refer to typical mobile phone functionality, while dangerous permissions can intrude into your day-to-day interactions. For example, a game may request access to your calendar or contact list, despite their irrelevance towards functionality, so it’s important to deny these requests.

[Phish] Facture disponible

Details:

From: [redacted]

Subject: Facture disponible

Text:

Cher client,

La commande de service 8017123 est terminée et la facture UL405890-61 est prêt pour le paiement!

Un DOC de la facture est joint à cet email.

Je vous prie de croire, en mes sentiment les meilleurs.

Bonne journée,

[redacted]

Bureau: +1 119496-014-793

Fax: +1 119 496-014-997

[redacted]

[Phish] Amazon cards

Details:

  • From: [Redacted]
  • Subject: Amazon Cards

Text:

Are you there? I need you to go on a quick task for me.

I need you to get some gift cards which are to be sent out in about  35mins to our clients.

Kindly get me 4 copies of Amazon gift cards, each worth 100$. that’s 400$ worth of Amazon gift cards.
should scratch-off the back codes and email a clear picture of the codes & receipt so i can forward directly to our clients

I will reimburse you back as soon as am done here.

PS: I’m busy at the moment and can’t talk but will lookout for your reply

Thanks
T[Redacted]