Home Malware Distracting Beach Babes Facebook Malware Attack

Distracting Beach Babes Facebook Malware Attack

by Brett M. Christensen

Facebook has been hit by a malware attack disguised as a video supposedly showing “Distracting Beach Babes”. The malware messages have been appearing on the Walls of many Facebook users. 

The messages, which look like they have been posted by friends of the Facebook user, feature a thumbnail of a woman’s bottom in a revealing bikini and a link labelled “Distracting Beach Babes HQ”. The post also includes the message:

[Name of Facebook user], this is hilarious LOL 😛 😛 :P”

 
Those who click the link in the mistaken belief that they are about to view a “beach babe” video will actually open a rogue Facebook application. If the user gives permission for the rogue app to run, he or she will then be prompted to follow another link to update their Flash video player.

However, clicking this “update” actually downloads and installs adware on the user’s computer.

Meanwhile, the rogue Facebook app will have automatically posted the same malware message to the Walls of the user’s Facebook friends. To make the message seem more legitimate, the rogue app adds the name of each Facebook friend to the bogus Wall posts.

In a blog post about this attack Graham Cluley of Security firm Sophos suggests:

If you have been hit, you should delete the offending message from your page, scan your computer with an up-to-date anti-virus, change your passwords, review your Facebook application settings (to ensure you have blocked the rogue application).

Also, learn an important lesson: don’t be so quick to click on unsolicited links and approve unknown applications in the future.

Perhaps most importantly, tell your friends to also do the same.

According to Sophos, this attack is a new incarnation of the earlier “Candid Camera Prank” malware attack, which used very similar tactics.



Importance Notice

After considerable thought and with an ache in my heart, I have decided that the time has come to close down the Hoax-Slayer website.

These days, the site does not generate enough revenue to cover expenses, and I do not have the financial resources to sustain it going forward.

Moreover, I now work long hours in a full-time and physically taxing job, so maintaining and managing the website and publishing new material has become difficult for me.

And finally, after 18 years of writing about scams and hoaxes, I feel that it is time for me to take my fingers off the keyboard and focus on other projects and pastimes.

When I first started Hoax-Slayer, I never dreamed that I would still be working on the project all these years later or that it would become such an important part of my life. It's been a fantastic and engaging experience and one that I will always treasure.

I hope that my work over the years has helped to make the Internet a little safer and thwarted the activities of at least a few scammers and malicious pranksters.

A Big Thank You

I would also like to thank all of those wonderful people who have supported the project by sharing information from the site, contributing examples of scams and hoaxes, offering suggestions, donating funds, or helping behind the scenes.

I would especially like to thank David White for his tireless contribution to the Hoax-Slayer Facebook Page over many years. David's support has been invaluable, and I can not thank him enough.

Closing Date

Hoax-Slayer will still be around for a few weeks while I wind things down. The site will go offline on May 31, 2021. While I will not be publishing any new posts, you can still access existing material on the site until the date of closure.

Thank you, one and all!

Brett Christensen,
Hoax-Slayer