[Infowarrior] - A Practical Attack to De-Anonymize Social Network Users
Richard Forno
rforno at infowarrior.org
Mon Mar 8 13:31:52 UTC 2010
A Practical Attack to De-Anonymize Social Network Users
Abstract. Social networking sites such as Facebook, LinkedIn, and Xing
have been reporting exponential growth rates. These sites have
millions of registered users, and they are interesting from a security
and privacy point of view because they store large amounts of
sensitive personal user data.
In this paper, we introduce a novel de-anonymization attack that
exploits group membership information that is available on social
networking sites. More precisely, we show that information about the
group memberships of a user (i.e., the groups of a social network to
which a user belongs) is often sufficient to uniquely identify this
user, or, at least, to significantly reduce the set of possible
candidates. To determine the group membership of a user, we leverage
well-known web browser history stealing attacks. Thus, whenever a
social network user visits a malicious website, this website can
launch our de-anonymization attack and learn the identity of its
visitors.
The implications of our attack are manifold, since it requires a low
effort and has the potential to affect millions of social networking
users. We perform both a theoretical analysis and empirical
measurements to demonstrate the feasibility of our attack against
Xing, a medium-sized social network with more than eight million
members that is mainly used for business relationships. Our analysis
suggests that about 42% of the users that use groups can be uniquely
identified, while for 90%, we can reduce the candidate set to less
than 2,912 persons. Furthermore, we explored other, larger social
networks and performed experiments that suggest that users of Facebook
and LinkedIn are equally vulnerable (although attacks would require
more resources on the side of the attacker). An analysis of an
additional five social networks indicates that they are also prone to
our attack.
Paper @ http://www.iseclab.org/papers/sonda-TR.pdf
More information about the Infowarrior
mailing list