Saturday, April 20, 2024

Meta issues a warning about the continued use of spyware targeting users of social media

Facebook’s owner claims that businesses are adjusting and modifying their strategies in response to attempts to halt operations.

Because surveillance-for-hire businesses continue to adapt and shift strategies in the face of attempts to shut down their capabilities, Meta has cautioned that the use of spyware to indiscriminately target people – including journalists and activists – is a continuing threat.

According to a report by Facebook’s parent company, the social media group made an effort to ban a number of companies, including two with ties to Russia, one with roots in Israel, and one in China. According to Meta, these companies were all used to “scrape” Facebook and Instagram for users’ private information in an effort to compromise users’ accounts.

In one instance, Meta claimed to have deleted more than 100 Facebook and Instagram profiles connected to a Russian corporation named Avalanche, which it claimed sold access to a platform that permits online espionage. According to Meta, a wide range of people and organisations, including politicians, journalists, NGOs operating in the US, and environmental activists, were targeted by the Russian network. Other businesses that were eliminated from Meta platforms included the Israeli-based Cyberglobes and the New York-based Social Links, which had its roots in Russia.

At the same time, Meta acknowledged that other companies it sought to ban last year from its platforms after accusations that the groups’ software had been used to target thousands of users with malicious activity have tried to circumvent blocks on Meta’s platforms and updated their software to try to evade detection.

Nathaniel Gleicher, the head of security policy at Meta, said the company had sought to share information about threats with governments and other technology companies to mitigate the threat against users. But Gleicher also acknowledged that one big player in the social media industry – Twitter – no longer appeared to be available to accept information about such threats.

Recommended:  Critical Unpatched VMware Flaw Affects Multiple Corporates Products

“Our key goal is to do everything we can to protect people. So we share our insights with our industry peers. Twitter is going through a transition right now and most of the people we’ve dealt with have moved on. As a result, we have to wait and see what they announce in these threat areas,” Gleicher told reporters on a call about the Meta report.

Forbes reported in November that Twitter’s security, privacy and compliance leaders all left the company less than two weeks after its acquisition by the billionaire Elon Musk.

Gleicher emphasised that no single company could tackle a “society-wide” challenge such as spyware. “They [spyware companies] are very ready to keep trying to come back, to re-establish their businesses,” Gleicher said.

Twitter was not available for comment.

Meta said some vendors of spyware used to target its users sometimes claim their software is intended to focus on criminals and terrorists, but Meta said its own threat research found that the software was used “regularly” to target “journalists, political opposition and human rights activists around the world”.

“These companies are part of a sprawling industry that provides intrusive software tools and surveillance services indiscriminately to any customer – regardless of who they target or the human rights abuses they might enable,” Meta said in its report. “In a sense, this industry ‘democratises’ these threats, making them available to government and non-government groups that otherwise wouldn’t have these capabilities to cause harm.”

In one case, Meta said it shut down a network of 900 fake Instagram and Facebook accounts operating from China, which appeared to focus on people in Myanmar, India, Taiwan, the US and China, including military personnel, pro-democracy activists, government employees, politicians and journalists.

Recommended:  Threat Actors Are Actively Exploiting CVE-2022-1388 RCE in F5 BIG-IP

Avalanche could not be reached for comment. Social Links and Cyberglobes did not immediately return requests for comment.

Suggest an edit to this article

Check out our new Discord Cyber Awareness Server. Stay informed with CVE Alerts, Cybersecurity News & More!

Cybersecurity Knowledge Base

Homepage

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
ClosePlease login
Share the word, let's increase Cybersecurity Awareness as we know it
- Sponsored -

Sponsored Offer

Unleash the Power of the Cloud: Grab $200 Credit for 60 Days on DigitalOcean!

Digital ocean free 200

Discover more infosec

User Avatar
Steven Black (n0tst3)
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK. I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated... I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK. I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!

more infosec reads

Subscribe for weekly updates

explore

more

security