Online social networks (OSNs) are ubiquitous attracting millions of users all over the world. Being a popular communication media OSNs are exploited in a variety of cyber-attacks. In this article, we discuss the chameleon attack technique, a new type of OSN-based trickery where malicious posts and profiles change the way they are displayed to OSN users to conceal themselves before the attack or avoid detection. Using this technique, adversaries can, for example, avoid censorship by concealing true content when it is about to be inspected; acquire social capital to promote new content while piggybacking a trending one; cause embarrassment and serious reputation damage by tricking a victim to like, retweet, or comment a message that he wouldn't normally do without any indication for the trickery within the OSN. An experiment performed with closed Facebook groups of sports fans shows that (1) chameleon pages can pass by the moderation filters by changing the way their posts are displayed and (2) moderators do not distinguish between regular and chameleon pages. We list the OSN weaknesses that facilitate the chameleon attack and propose a set of mitigation guidelines.
CITATION STYLE
Elyashar, A., Uziel, S., Paradise, A., & Puzis, R. (2020). The Chameleon Attack: Manipulating Content Display in Online Social Media. In The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020 (pp. 848–859). Association for Computing Machinery, Inc. https://doi.org/10.1145/3366423.3380165
Mendeley helps you to discover research relevant for your work.