Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
Neustar, Inc.
Protect your website & network
using real-time information & analysis

www.neustar.biz
Viruses & Malware
Tame your scariest paperwork. Find Out How
Average Rating:
Rate this article:  
Some Twitter Direct Messages Link to Malware
Some Twitter Direct Messages Link to Malware

By Jennifer LeClaire
September 25, 2012 2:25PM

Bookmark and Share
"Quite how users' Twitter accounts became compromised to send the malicious DMs in the first place isn't clear, but the attack underlines the importance of not automatically clicking on a link just because it appeared to be sent to you by a trusted friend," said security researcher Graham Cluley. A supposed Flash update is really a backdoor Trojan.
 


Be careful when you open that Twitter Direct Message suggesting you've been caught in a Facebook video. It could contain links to a nasty surprise in the form of malware.

Specifically, one of the messages says, "your in this" and has a link to a Facebook video. Another message that works to accomplish the same goal says, "you even see him taping you...that's awful" with a link to the video.

"Users who click on the link are greeted with what appears to be a video player and a warning message that 'An update to Youtube player is needed.' The Web page continues to claim that it will install an update to Flash Player 10.1 onto your computer," said Graham Cluley, a senior security analyst at Sophos.

Where's the Compromise?

Cluley said potential victims are invited to download a program called FlashPlayerV10.1.57.108.exe. He described it as a backdoor Trojan that can also copy itself to accessible drives and network shares.

"Quite how users' Twitter accounts became compromised to send the malicious DMs in the first place isn't clear, but the attack underlines the importance of not automatically clicking on a link just because it appeared to be sent to you by a trusted friend," Cluley said.

"If you do find that it was your Twitter account sending out the messages, the sensible course of action is to assume the worst, change your password -- make sure it is something unique, hard-to-guess and hard-to-crack -- and revoke permissions of any suspicious applications that have access to your account."

Trust Issues

Rob Enderle, principal analyst at the Enderle Group, said the issue boils down to trust.

"What happens is you get a note from somebody that you trust and you believe the note is from them. Often since you are using Twitter and you are multitasking, you click on it before you fully realize that it is likely malware. The damage, of course, is already done," Enderle told us.

Even though he knows better, Enderle admits that he sometimes clicks links he shouldn't. His security programs tend to catch the malware and rid his computer of it. His advice: If you get a message from a company that should know you and it opens with a formal greeting without your name, don't read it because chances are it's malware.

"The malware writers are social engineering," he said. "They recognize that we are all pressed with many things and we are conditioned to trust certain people. If we see something questionable from somebody we trust, we are still likely to trust it, particularly if we are multitasking."
 

Tell Us What You Think
Comment:

Name:



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Viruses & Malware
1.   Big DDoS Attacks Hit Record in 2014
2.   Google Hacker Team to Hunt Bugs
3.   Russian Hacker's Charges Revealed
4.   Hackers Target Western Energy Firms
5.   Android SMS Worm on the Loose


advertisement
Android SMS Worm on the Loose
Malware lets bad actors cash in.
Average Rating:
Big DDoS Attacks Hit Record in 2014
Attackers often use NTP reflection.
Average Rating:
Hackers Target Western Energy Firms
Appears to be state-sponsored group.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
34 European Banks Hit by Android-Skirting Malware
Criminals have been finding gaping holes in Android-based two-factor authentication systems that banks around the world are using. The result: 34 banks in four European countries have been hit.
 
New Web Tracking Technologies Defeat Privacy Protections
Recently developed Web tracking tools are able to circumvent even the best privacy defenses, according to a new study by researchers at Princeton and the University of Leuven in Belgium.
 
Juniper DDoS Solution Aims at High-IQ Networks
In the face of more complex attacks, Juniper Networks is boosting its DDoS Secure solution to help companies mitigate the threats with more effective security intelligence throughout the network fabric.
 

Enterprise Hardware Spotlight
Contrary to Report, Lenovo's Staying in Small Windows Tablets
Device maker Lenovo has clarified a report that indicated it is getting out of the small Windows tablet business -- as in the ThinkPad 8 and the 8-inch Miix 2. But the firm said it is not exiting that market.
 
Seagate Unveils Networked Drives for Small Businesses
Seagate is out with five new networked attached storage products aimed at small businesses. The drives are for companies with up to 50 workers, and range in capacity from two to 20 terabytes.
 
Another Day, Another Internet of Things Consortium Is Born
In the emerging Internet of Things, zillions of devices will be talking to each other. Samsung, Intel and Dell just formed a consortium to ensure each thing can understand what others are saying.
 

Mobile Technology Spotlight
Apple Patent for Smart Watch Comes to Light
Does a new smart watch patent issued to Apple provide a preview of the expected wearable from the tech giant? Some Apple-watchers are parsing the patent for signs of the coming product.
 
Will iPhone 6 Cannibalize Apple's Tablet Sales?
Could Apple’s iPhone 6 -- it’s so-called super-size phone due to hit store shelves this fall -- come back to haunt the smartphone maker? Some observers say yes; others say preposterous.
 
Axed Nokia X Phones Suffered from Lack of Identity
So long, Nokia X, we hardly knew you. The Nokia X phones Microsoft discontinued blend two rival operating systems, but leave out the best of each. As a result, the devices didn't become a runaway hit.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.