{"id":13456,"date":"2023-05-03T13:34:27","date_gmt":"2023-05-03T13:34:27","guid":{"rendered":"http:\/\/scannn.com\/metas-q1-2023-security-reports-protecting-people-and-businesses\/"},"modified":"2023-05-03T13:34:27","modified_gmt":"2023-05-03T13:34:27","slug":"metas-q1-2023-security-reports-protecting-people-and-businesses","status":"publish","type":"post","link":"https:\/\/scannn.com\/lv\/metas-q1-2023-security-reports-protecting-people-and-businesses\/","title":{"rendered":"Meta's Q1 2023 Security Reports: Protecting People and Businesses"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><span style=\"font-weight: 400\">We know that safety and security are top of mind for people using our apps, including businesses and advertisers. Today, as part of our<\/span> <a href=\"https:\/\/transparency.fb.com\"><span style=\"font-weight: 400\">quarterly integrity reporting<\/span><\/a><span style=\"font-weight: 400\">, we\u2019re sharing updates on our work to combat a range of threats, including covert <a href=\"https:\/\/about.fb.com\/news\/2023\/05\/metas-adversarial-threat-report-first-quarter-2023\/\">influence operations, cyber espionage<\/a><\/span><span style=\"font-weight: 400\"> and <a href=\"https:\/\/about.fb.com\/news\/2023\/05\/how-meta-protects-businesses-from-malware\/\">malware campaigns<\/a><\/span><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In my first year as Meta\u2019s chief information security officer, my focus has been bringing together teams working on integrity, security, support, and operations so that we can work together in the most effective way possible. Each of these efforts has been ongoing for many years, and a key focus for us has been sharing progress, bringing in outside experts and working with other companies to tackle industry-wide threats. It\u2019s been more than 10 years since our bug bounty program began working with the security research community, 10 years since we first <\/span><span style=\"font-weight: 400\">published<\/span><span style=\"font-weight: 400\"> <a href=\"https:\/\/about.fb.com\/news\/2013\/08\/global-government-requests-report\/\">transparency reports on government data requests<\/a>, over five years since we started sharing takedowns of covert influence operations and five years since we <\/span><span style=\"font-weight: 400\">published<\/span><span style=\"font-weight: 400\"> <a href=\"https:\/\/about.fb.com\/news\/2018\/05\/enforcement-numbers\/\">our first community standards enforcement report<\/a>.<\/span><\/p>\n<p><span style=\"font-weight: 400\">We\u2019ve learned a lot through this work, including the importance of sharing both qualitative and quantitative insights into our integrity work. And it\u2019s been encouraging to see our peers join us in expanding their trust and safety reporting. We\u2019re committed to continuing these efforts, and today\u2019s updates are good examples of this work.<\/span><\/p>\n<h2>Countering Malware Campaigns Across the Internet<\/h2>\n<p><span style=\"font-weight: 400\">My teams track and take action against hundreds of threat actors around the world, including malware campaigns. Here are a few things that stood out from our latest malware work.<\/span><\/p>\n<p><i><span style=\"font-weight: 400\">First, <\/span><\/i><span style=\"font-weight: 400\">our threat research has shown time and again that malware operators, just like spammers, are very attuned to what\u2019s trendy at any given moment. They latch onto hot-button issues and popular topics to get people\u2019s attention. The latest wave of malware campaigns have taken notice of generative AI technology that\u2019s captured people\u2019s imagination and excitement.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Since March alone, our security analysts have found around 10 malware families posing as ChatGPT and similar tools to compromise accounts across the internet. For example, we\u2019ve seen threat actors create malicious browser extensions available in official web stores that claim to offer ChatGPT-related tools. In fact, some of these malicious extensions did include working ChatGPT functionality alongside the malware. This was likely to avoid suspicion from the stores and from users. We\u2019ve detected and blocked over 1,000 of these unique malicious URLs from being shared on our apps, and reported them to our industry peers at file-sharing services where malware was hosted so they, too, can take appropriate action.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This is not unique to the generative AI space. As an industry, we\u2019ve seen this across other topics popular in their time, such as crypto scams fueled by the interest in digital currency. The generative AI space is rapidly evolving and bad actors know it, so we should all be vigilant.<\/span><\/p>\n<p><i><span style=\"font-weight: 400\">Second, <\/span><\/i><span style=\"font-weight: 400\">we\u2019ve seen that our and industry\u2019s efforts are forcing threat actors to rapidly evolve their tactics in attempts to evade detection and enable persistence. One way they do this is by spreading across as many platforms as they can to protect against enforcement by any one service. For example, we\u2019ve seen malware families leveraging services like ours and LinkedIn, browsers like Chrome, Edge, Brave and Firefox, link shorteners, file-hosting services like Dropbox and Mega, and more. When they get caught, they mix in more services including smaller ones that help them disguise the ultimate destination of links. Another example is when some malware families masquerading as ChatGPT apps switched their lures to other popular themes like Google\u2019s Bard or TikTok marketing support, in response to detection.<\/span><\/p>\n<p><span style=\"font-weight: 400\">These changes are likely an attempt by threat actors to ensure that any one service has only limited visibility into the entire operation. When bad actors count on us to work in silos while they target people far and wide across the internet, we need to work together as an industry to protect people. That\u2019s why we designed our threat research to help us scale our security work in a number of ways \u2014 it disrupts malicious operations on our platform and helps inform our industry\u2019s defenses against threats<\/span> <span style=\"font-weight: 400\">that rarely target one platform. The insights we gain from this research help drive our continuous product development to protect people and businesses.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In the months and years ahead, we\u2019ll continue to highlight how these malicious campaigns operate, share threat indicators with our industry peers and roll out new protections to address new tactics. For instance, we\u2019re launching a new support flow for businesses impacted by malware. <\/span><span style=\"font-weight: 400\">Read<\/span> <span style=\"font-weight: 400\">more about <a href=\"https:\/\/about.fb.com\/news\/2023\/05\/how-meta-protects-businesses-from-malware\/\">our work to help businesses stay safe on our apps<\/a>.<\/span><\/p>\n<h2>Disrupting Cyber Espionage and Covert Influence Operations<\/h2>\n<p><span style=\"font-weight: 400\">In today\u2019s Q1 Adversarial Threat report<\/span><span style=\"font-weight: 400\">, we shared findings about nine adversarial networks we took action against for various security violations.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Six of these networks engaged in coordinated inauthentic behavior<\/span> <span style=\"font-weight: 400\">(CIB) that originated in the US, Venezuela, Iran, China, Georgia, Burkina Faso and Togo, and primarily targeted people outside of their countries. We removed the majority of these networks before they were able to build authentic audiences.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Nearly all of them ran fictitious entities \u2014 news media organizations, hacktivist groups and NGOs \u2014 across the internet, including on Facebook, Twitter, Telegram, YouTube, Medium, TikTok, Blogspot, Reddit, WordPress, Freelancer[.]com, hacking forums and their own websites. Half of these operations were linked to private entities including an IT company in China, a US marketing firm and a political marketing consultancy in the Central African Republic.<\/span><\/p>\n<p><span style=\"font-weight: 400\">We also disrupted three cyber espionage operations in South Asia, including an advanced persistent threat (APT) group we attributed to state-linked actors in Pakistan, a threat actor in India known in the security industry as Patchwork APT, and the threat group known as Bahamut APT in South Asia.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Each of these APTs relied heavily on social engineering to trick people into clicking on malicious links, downloading malware or sharing personal information across the internet. This investment in social engineering meant that these threat actors did not have to invest as much on the malware side. In fact, for at least two of these operations, we saw a reduction in the malicious capabilities in their apps, likely to ensure they can be published in official app stores. In response to the security community continuing to disrupt these malicious efforts, we\u2019ve seen these APTs to be forced to set up new infrastructure, change tactics and invest more in hiding and diversifying their operations, which likely degraded their operations. Read more about <\/span><span style=\"font-weight: 400\">this threat research in our <a href=\"https:\/\/about.fb.com\/wp-content\/uploads\/2023\/05\/Meta-Quarterly-Adversarial-Threat-Report-Q1-2023.pdf\">Q1 Adversarial Threat Report<\/a><\/span><span style=\"font-weight: 400\">.<\/span><\/p>\n<\/p><\/div>\n<p><script async defer crossorigin=\"anonymous\" src=\"https:\/\/connect.facebook.net\/en_US\/sdk.js#xfbml=1&#038;version=v5.0\"><\/script><br \/>\n<br \/><br \/>\n<br \/><a href=\"https:\/\/about.fb.com\/news\/2023\/05\/metas-q1-2023-security-reports\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We know that safety and security are top of mind for people using our apps, including businesses and advertisers. Today, as part of our quarterly integrity reporting, we\u2019re sharing updates on our work to combat a range of threats, including covert influence operations, cyber espionage and malware campaigns. In my first year as Meta\u2019s chief [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":13457,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[123],"tags":[],"class_list":["post-13456","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-facebook"],"_links":{"self":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/posts\/13456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/comments?post=13456"}],"version-history":[{"count":0,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/posts\/13456\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/media\/13457"}],"wp:attachment":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/media?parent=13456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/categories?post=13456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/tags?post=13456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}