Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity
    • IT Management
    • Mobile

    Twitter Being Used by Malware Developers: Symantec

    Written by

    Jeff Burt
    Published March 12, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Symantec security researchers are seeing cyber-criminals increasingly using Twitter as a way of luring mobile device users to their malware.

      In a March 12 post on Symantec€™s blog, company employee Joji Hamada said that tweets are becoming a popular way for cyber-criminals to bring people to the Android.Opfake malware.

      €œUsers can potentially end up infecting their mobile devices with Android.Opfake by searching for tweets on subjects such as software, mobile devices, pornography or even dieting topics, to name a few,€ Hamada wrote. €œAndroid.Opfake is not hosted on the Android Market (Play Store) and these tweets lead to malicious Websites developed for the Opfake application.€

      These tweets, Hamada said, usually have short URLs, and are primarily written in Russian, with some English mixed in. In addition, once the users get to the site, they€™re prompted to install the malicious code. However, while those are common aspects of most cyber-criminals using Twitter, their individual tactics vary, making it difficult to determine which tweets are bad, short of actually clicking on the link.

      In the blog post, Hamada gives several examples of malicious tweets.

      He also outlines other characteristics of malicious tweets, though cautions that they can vary wildly. Some, Hamada said, can be more easily spotted because similar tweets are being sent out constantly and have no followers. That said, there are others that don€™t tweet as often and do have followers. Some have content in the profiles, while others don€™t. Some have strange account names, but other account names are pretty common.

      Again, Hamada in the blog post shows some of the more easily recognizable bad accounts.

      Symantec is finding that there are malware operations that are running continuously, with some being executed at the same time. Hamada pointed to a recent operation that ran for eight hours and included more than 130,000 tweets from about 100 accounts before it stopped. Another that occurred at the same time sent out more than 1,500 tweets from more than 50 accounts in about an hour.

      €œThere were other minor operations taking place as well,€ he said in the blog post. €œHowever, I was unable to confirm the number involved.€

      Hamada commended Twitter for being responsive to findings of malicious tweets from Symantec, which reports to Twitter when it sees particular patterns in malicious tweeting. Symantec suggests to Twitter officials that they shut down such accounts. Twitter also offers a place where users can report if they suspect an account is nothing more than spam.

      Hamada said those cyber-criminals running malicious tweeting operations are now following a similar €œcat-and-mouse game€ that occurs with traditional malware. That is, security vendors update detections for malware, and the malware developers then update their malware.

      €œCyber-criminals mix their game around, thereby making it difficult to recognize all bad tweets and most of all: they are persistent,€ he wrote.

      He noted that Twitter€™s Help Center also offers tip on keeping a Twitter account secure.

      €œSmartphones have allowed users to access the Internet anytime, anywhere and perform tasks that were only possible using computers,€ Hamada wrote. €œWhile the convenience provides so many great advantages, cyber-criminals are also taking this opportunity to accomplish their bad deeds. So be wary when using mobile devices. For tweets in particular, be selective when deciding which links in the tweets to click on. You may want to only trust tweets you are familiar with. Tweets are similar to email. You wouldn€™t open an email from an unknown sender and then click on the included link, would you? This usually means bad news and the same goes for tweets.€

      Hamada has been following the Android.Opfake malware. In a March 2 blog post, he noted that while the developers of the malware have targeted Android- and Symbian-based smartphones, they also are looking to target users of Apple€™s iPhone.

      €œWe have come across a couple of Opfake Websites that, while hosting malicious apps that Symantec detects as Android.Opfake, are also designed to perform social engineering attacks on iPhone users,€ Hamada wrote. €œThe iPhone is designed to prevent the installation of applications outside of the Apple App Store. This makes life difficult for bad guys attempting to fool users into installing malicious apps in a similar manner to Android and Symbian devices. To get around this, the Opfake gang has developed a social engineering trick that does not require apps to scam site visitors.€

      Jeff Burt
      Jeff Burt
      Jeffrey Burt has been with eWEEK since 2000, covering an array of areas that includes servers, networking, PCs, processors, converged infrastructure, unified communications and the Internet of things.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.