Hints that user naivety might have played part Facebook has blamed a browser vulnerability and naive user behaviour for the explicit spam campaign that hit the service earlier this week.At the weekend it emerged that tens of thousands of Facebook users had been confronted in their news feeds with a fake pornographic image of singer Justin Bieber, and another of a dead dog.Who was behind the attack and what motivation remained unclear, but the biggest question was how the spam was spreading.The company said it had now tracked down the root cause as being a “self-XSS” flaw in which users were socially engineered into cutting and pasting malicious Javascript into the URL bar, executing the attack. Facebook hasn’t mentioned which browsers it thinks are vulnerable – it could in theory be any running Java – nor why user behaviour would constitute a browser flaw in the first place. Adding the moniker “self” to XSS (cross-site scripting) hints that the company sees the issue as being to some extent self-inflicted by unwary users.“We’ve built enforcement mechanisms to quickly shut down the malicious Pages and accounts that attempt to exploit it,” Facebook said. The company was also “putting those affected through educational checkpoints so they know how to protect themselves,” it said without explaining what defensive measures it would recommend to users currently unaffected by the issue.“We’ve put in place backend measures to reduce the rate of these attacks and will continue to iterate on our defenses to find new ways to protect people.”Security commentators now see the motivation the for the attack as being designed to disrupt the service rather than, as is usually the case, derive profit.“This seems to be a purely malicious act,” said Chester Wisniewski of security company Sophos. “The flaw being exploited could likely be used against other sites as well if users can be tricked into pasting malicious JavaScript into the browser.” Related content news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software news SpecterOps to use in-house approximation to test for global attack variations The new offering uses atomic tests and in-house approximation in purple team assessment to test all known techniques of an attack. By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe