CIO Today

CIO Today Network Sites:   Top Tech News  |   CIO Today   |   Mobile Tech Today   |   Data Storage Today
Daily Briefing for Technology's Top Decision-Makers
Thursday, April 24th 
Next Generation Data Center Is Here!
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Trending Topics:   Security Heartbleed Big Data Cloud Computing Windows XP Data Centers OS X Mavericks
Home
Enterprise Software
Enterprise Hardware
Big Data
Network Security
Cloud Computing
CRM Systems
Data Storage
Operating Systems
Communications
CIO Issues
Mobile Tech
Chips & Processors
World Wide Web
Business Briefing
After Hours
Press Releases
 
Free Newsletters
Top CIO News
 
Mobile Tech Today
 

Network Security

Some Twitter Direct Messages Link to Malware

Some Twitter Direct Messages Link to Malware
September 25, 2012 2:25PM

Bookmark and Share
"Quite how users' Twitter accounts became compromised to send the malicious DMs in the first place isn't clear, but the attack underlines the importance of not automatically clicking on a link just because it appeared to be sent to you by a trusted friend," said security researcher Graham Cluley. A supposed Flash update is really a backdoor Trojan.

Neustar, Inc. (NYSE: NSR) is a trusted, neutral provider of real-time information and analysis to the Internet, telecommunications, information services, financial services, retail, media and advertising sectors. Neustar applies its advanced, secure technologies in location, identification, and evaluation to help its customers promote and protect their businesses. More information is available at www.neustar.biz.

Be careful when you open that Twitter Direct Message suggesting you've been caught in a Facebook video. It could contain links to a nasty surprise in the form of malware.

Specifically, one of the messages says, "your in this" and has a link to a Facebook video. Another message that works to accomplish the same goal says, "you even see him taping you...that's awful" with a link to the video.

"Users who click on the link are greeted with what appears to be a video player and a warning message that 'An update to Youtube player is needed.' The Web page continues to claim that it will install an update to Flash Player 10.1 onto your computer," said Graham Cluley, a senior security analyst at Sophos.

Where's the Compromise?

Cluley said potential victims are invited to download a program called FlashPlayerV10.1.57.108.exe. He described it as a backdoor Trojan that can also copy itself to accessible drives and network shares.

"Quite how users' Twitter accounts became compromised to send the malicious DMs in the first place isn't clear, but the attack underlines the importance of not automatically clicking on a link just because it appeared to be sent to you by a trusted friend," Cluley said.

"If you do find that it was your Twitter account sending out the messages, the sensible course of action is to assume the worst, change your password -- make sure it is something unique, hard-to-guess and hard-to-crack -- and revoke permissions of any suspicious applications that have access to your account."

Trust Issues

Rob Enderle, principal analyst at the Enderle Group, said the issue boils down to trust.

"What happens is you get a note from somebody that you trust and you believe the note is from them. Often since you are using Twitter and you are multitasking, you click on it before you fully realize that it is likely malware. The damage, of course, is already done," Enderle told us.

Even though he knows better, Enderle admits that he sometimes clicks links he shouldn't. His security programs tend to catch the malware and rid his computer of it. His advice: If you get a message from a company that should know you and it opens with a formal greeting without your name, don't read it because chances are it's malware.

"The malware writers are social engineering," he said. "They recognize that we are all pressed with many things and we are conditioned to trust certain people. If we see something questionable from somebody we trust, we are still likely to trust it, particularly if we are multitasking."

Tell Us What You Think
Comment:

Name:



 Network Security
1. Fund Seeks To Head Off Heartbleeds
2. Lessons from Verizon's Threat Report
3. Verizon Report Exposes Cyberthreats
4. How Are Web Sites Post-Heartbleed?
5. White House Updating Privacy Policy




 Most Popular Articles
1. BlackBerry Drops T-Mobile After Nasty Spat
2. Cisco, IBM Launch Internet of Things Consortium
3. Salesforce CRM Gets Industry Specific for Internet of Customers
4. Intel Bets on Cloudera for Big Data Analytics
5. SAP HANA Data Warehouse App Gets Faster Analytics

Have an informed opinion on this story?
Send a Letter to the Editor.
We want to know what you think.
Send us your Feedback.

 Related Topics  Latest News & Special Reports

  IBM Targets Big Data with Power8 Line
  Opera Coast Offers Safari Alternative
  FCC Defends Internet Traffic Proposal
  Fund Seeks To Head Off Heartbleeds
  Salesforce Developing App SOS Button

 Technology Marketplace
Business Intelligence
Get real-time, cloud-based information services with Neustar.
 
Cloud Computing
Next Generation Data Center Is Here! Vblock™ Systems from VCE
 
Contact Centers
HP delivers the future of the contact center with HP Qfiniti 10.
 
Data Storage
Next Generation Data Center Is Here! Vblock™ Systems from VCE
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Enterprise Hardware
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Hardware
Protect your network with APC Smart-UPS battery backup
 
Network Security
Protect your network with APC Smart-UPS battery backup
 

Network Security Spotlight
Tech Giants Fund Initiative To Prevent Future Heartbleeds
Can more funding prevent Heartbleed vulnerabilities in future open-source software? A new Core Infrastructure Initiative at the Linux Foundation is attempting to find out.
 
What Verizon's Data Breach Report Can Teach Enterprises
It’s probably not a jaw-dropper, but cyberespionage is officially on the rise. And the use of stolen or misused credentials is still the leading way the bad guys gain access to corporate information.
 
Top Cyberthreats Exposed by Verizon Report
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 
Navigation
CIO Today
Home/Top News | Enterprise Software | Enterprise Hardware | Big Data | Network Security | Cloud Computing | CRM Systems
Data Storage | Operating Systems | Communications | CIO Issues | Mobile Tech | Chips & Processors | World Wide Web
Business Briefing | After Hours | Press Releases
Also visit these Enterprise Technology Sites
Top Tech News | CIO Today | Mobile Tech Today | Data Storage Today

Services:
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About CIO Today Network | How To Contact Us | Article Reprints | Services for PR Pros (In partnership with NewsFactor) | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 CIO Today. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.