Browse Definitions :
Definition

likejacking

Contributor(s): Ivy Wigmore

Likejacking is a variation on clickjacking in which malicious coding is associated with a Facebook Like button. The most common purposes of likejacking include identity theft and the dissemination of viruses, social spam and hoaxes.

A "Like" is an endorsement of a post, product, business or some other page content, registered by clicking the button associated with that item. There are two basic types of likejacking. Both involve a post that is likely to attract the user, such as an offer for a free gift card or a compelling video, and both spread through ill-advised or automatically generated shares and likes. The initial post may be enabled through a hacked account or the acceptance of a request to add a friend, who turns out to be a scammer.

In one variation, clicking on the post itself brings up a splash page that is coded so that if the user clicks anywhere on the page, it registers as a "Like" and shares the original post to the user's Facebook wall. The purpose of this type of exploit may be spreading a hoax or fraudulent promotion of a business or product.

In the other version, the developers responsible for the post add coding to the Like button that leads users through a series of pages designed to gather their personal information, such as surveys and membership applications. The scammer may receive payment for each completed survey. Applications for membership may require credit card information for "fee payment."

Here are a few common examples of likejacking:

  • An image of a sick or injured child with text claiming that Facebook will donate $1 toward the child's care for every like.
  • A false offer for a free voucher or gift card. These have included offers of $50, $100 and $250 give-aways from Starbuck's, Costco and Walmart.
  • A bogus offer for a free iPad, iPhone or other popular electronic device.
  • An image of an attractive young woman along with a compelling message such as "The Prom Dress That Got This Girl Suspended From School."

To protect yourself from likejacking, security experts recommend that you use caution in clicking, liking or sharing posts and be extremely skeptical about any free offers.

This was last updated in October 2012

Continue Reading About likejacking

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

  • fee-for-service (FFS)

    Fee-for-service (FFS) is a payment model in which doctors, hospitals, and medical practices charge separately for each service ...

  • biomedical informatics

    Biomedical informatics is the branch of health informatics that uses data to help clinicians, researchers and scientists improve ...

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

  • natural disaster recovery

    Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.

SearchStorage

  • RAID 5

    RAID 5 is a redundant array of independent disks configuration that uses disk striping with parity.

  • non-volatile storage (NVS)

    Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to ...

  • petabyte

    A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.

Close