Facebook system messages subverted by French pranksters

Schoolboy schooled me in schoolboy French...


Facebook's attempts to crowd-source translations of system messages have been abused by French pranksters.

The French language equivalent of Report/Block this person (Signaler/bloquer cette personne) offers a strange option for reasons why a surfer might want to have nothing to do with another Facebook member.

alt text

Zéroosiix The Younger already has a fan page (click to enlarge).

Instead of choices such as Fake profile or Inappropriate wall post the French site offers the option (in ungrammatical French) "En discution instantané, Le petit frère de Dylan Zéroosiix m’a insulter" (which translates as "the little brother of Dylan Zéroosiix insulted me in instant messenger").

Facebook sources translation of non-English pages from surfers, allowing a facility for these to be changed as grammar and spelling mistakes are detected. Users vote on these changes. Normally the process works smoothly but in this case pranksters have subverted the process for their own amusement, with regular surfers supporting the wheeze by voting in bogus changes.

No hack took places and the odd option (screenshots and additional commentary in a blog post by Sophos here) is thought to be harmless.

It's not the first time that crowd-sourced translations on Facebook have returned odd results. Much the same thing happened last year with Spanish and Turkish language versions of the social networking website.

Sophos security consultant Chet Wisniewski said that openness is all well and good but that changes to Facebook's site should involve some form of moderation. "It is scary that Facebook believes in openness so much that they will let the users control their website without any human oversight from Facebook," Wisnieski writes. "Hopefully this isn't a real vulnerability in their site that could allow someone to enter in arbitrary JavaScript or HTML code that could be malicious." ®


Other stories you might like

  • Meta agrees to tweak ad system after US govt brands it discriminatory
    And pay the tiniest of fines, too

    Facebook parent Meta has settled a complaint brought by the US government, which alleged the internet giant's machine-learning algorithms broke the law by blocking certain users from seeing online real-estate adverts based on their nationality, race, religion, sex, and marital status.

    Specifically, Meta violated America's Fair Housing Act, which protects people looking to buy or rent properties from discrimination, it was claimed; it is illegal for homeowners to refuse to sell or rent their houses or advertise homes to specific demographics, and to evict tenants based on their demographics.

    This week, prosecutors sued Meta in New York City, alleging the mega-corp's algorithms discriminated against users on Facebook by unfairly targeting people with housing ads based on their "race, color, religion, sex, disability, familial status, and national origin."

    Continue reading
  • Metaverse progress update: Some VR headset prototypes nowhere near shipping
    But when it does work, bet you'll fall over yourselves to blow ten large on designer clobber for your avy

    Facebook owner Meta's pivot to the metaverse is drawing significant amounts of resources: not just billions in case, but time. The tech giant has demonstrated some prototype virtual-reality headsets that aren't close to shipping and highlight some of the challenges that must be overcome.

    The metaverse is CEO Mark Zuckerberg's grand idea of connected virtual worlds in which people can interact, play, shop, and work. For instance, inhabitants will be able to create avatars to represent themselves, wearing clothes bought using actual money – with designer gear going for five figures.

    Apropos of nothing, Meta COO Sheryl Sandberg is leaving the biz.

    Continue reading
  • Facebook phishing campaign nets millions in IDs and cash
    Hundreds of millions of stolen credentials and a cool $59 million

    An ongoing phishing campaign targeting Facebook users may have already netted hundreds of millions of credentials and a claimed $59 million, and it's only getting bigger.

    Identified by security researchers at phishing prevention company Pixm in late 2021, the campaign has only been running since the final quarter of last year, but has already proven incredibly successful. Just one landing page - out of around 400 Pixm found - got 2.7 million visitors in 2021, and has already tricked 8.5 million viewers into visiting it in 2022. 

    The flow of this phishing campaign isn't unique: Like many others targeting users on social media, the attack comes as a link sent via DM from a compromised account. That link performs a series of redirects, often through malvertising pages to rack up views and clicks, ultimately landing on a fake Facebook login page. That page, in turn, takes the victim to advert landing pages that generate additional revenue for the campaign's organizers. 

    Continue reading

Biting the hand that feeds IT © 1998–2022