Thursday, March 28, 2024

Facebook’s New Tool to Detect and Alert Website Owners About Phishing Attacks

Phishing is one of the most common problems for Internet Users, hackers find a new innovative method to create believable URL’s to trick users.

Attackers launch innovative phishing attacks to trick the users and to steal sensitive data such as their passwords, credit card numbers, or other sensitive information. It is hard to detect as they use a number of techniques to resemble it like a legitimate domain.

Facebook phishing detection tool developed two years ago and now they expanded the capabilities of the tool to alert users when new certificate issued for phishing domains.

When a new certificate appears in the public Certificate Transparency Log the Facebook phishing detection tool analyzes the domains for possible phishing attempts.

Facebook phishing detection tool

If the tool suspects it is a phishing domain then it notifies the subscribers of the legitimate domain by sending email, push, or on-site notifications based on the subscriber preference.

To enable and domain monitoring service and manage your subscriptions visit facebook developers, Developers need to specify the domain name and the alerts they need to specify.

Certificate alerts: Alerts when the new certificate enrolled for the subscribed domain name.

Phishing Alerts: Notifies when the enrolled new certificate seems to be impersonating the
subscribed domain name.

Certificate Transparency aims to remedy these certificate-based threats by making the issuance and existence of SSL certificates open to scrutiny by domain owners, CA, and domain users. The ultimate goal of CT is to defend mis-issuance of certificates.

Facebook phishing detection tool

Open source tools like Phishing catcher also helps in detection of misissued certificates, malicious certificates, and rogue CAs.

We are also extending our Webhook API to help developers easily integrate this new phishing detection feature into their external systems.” reads facebook statement.

If a domain owner receives a notification that a CA issued a certificate for their domain without an explicit request, they will likely want to contact the CA, check that their identity isn’t compromised and take into account revoking the certificate.

Website

Latest articles

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...

CISA Warns of Hackers Exploiting Microsoft SharePoint Server Vulnerability

Cybersecurity and Infrastructure Security Agency (CISA) has warned about a critical vulnerability in Microsoft...

Microsoft Expands Edge Bounty Program to Include WebView2!

Microsoft announced that Microsoft Edge WebView2 eligibility and specific out-of-scope information are now included...

Beware of Free Android VPN Apps that Turn Your Device into Proxies

Cybersecurity experts have uncovered a cluster of Android VPN applications that covertly transform user...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles