Short Bytes:The security researchers at PhishLabs have uncovered a new type of Facebook phishing attack that uses the URL Padding technique. The tactic targets the mobile users and fools them by making the deceptive links look authentic. As a result, casual users end up visiting the web page and leaking their login credentials.

By exploiting the inattentiveness of the users, a new kind of phishing attack is expanding its web to target Facebook users. So, let’s tell you about this attack in detail.

FACEBOOK PHISHING URL PADDING

Also Read:8 Best Anti Ransomware Tools You Must Be Using In 2017

What is URL Padding phishing?

The notorious hackers have found a new way to fool the users by creating fake and believable URLs. Focused on mobile devices, which have narrow URL bars, the hackers are using real domains within a larger URL. They are padding the larger URL with hyphens to hide the real destination in the address bar.

Let me show you how it’s being done (Courtsey:Phishlabs). For example, take a look at the following URL:

Fake Facebook login page (Image: Phishlabs)

hxxp://m.facebook.com—————-validate—-step9.rickytaylk[dot]com/sign_in.html

You’ll note that while this URL starts with m.facebook.com, which is the legitimate address of your favorite website, the actual domain is rickytaylk(dot)com. Taking this dirty game even a step ahead, the hackers are also using words like login, secure, account, validate, etc. just after the series of hyphens.

Now, if we put this whole URL in a mobile browser’s address bar and add a Facebook logo as rickytaylk(dot)com’s favicon, it’ll look pretty convincing. All that remains is fake Facebook login page to capture username and password.

The hackers are also using similar type of genuine-looking URLs and login pages for iCloud, which reminds me ofFappening leaks, Comcast, Craigslist, etc.

How to save yourself from URL Padding Facebook phishing attack?

As pointed out by the researchers, Facebook accounts are becoming the biggest targets. Also, as compared to desktop, users treat mobile phones differently.

Phishlabs has mentioned the possibility of the propagation of this attack using SMS phishing or social messenger. As people assume that SMS and social media posts are a legitimate source of communication.

The researchers have urged the users to stop for a moment before clicking a link or following instructions. Facebook or any other service won’t send you login links via SMS or other sources. Also, don’t click on links sent to you via unknown people.

You can read more about the URL Padding Facebook phishing attack in thisblog post.

Also Read:What Is Social Engineering? What Are Different Types Of Social Engineering Attacks?