Twitter hit with phishing attacks
Users were directed to a 'funny blog' by faux friends
IDG News Service - Twitter users who thought friends were directing them to a "funny blog" Thursday ended up experiencing something completely different: a phishing scam.
Twitter was hit by two different rounds of phishing Thursday, as criminals tried to take control of user accounts and then use them as a springboard to attack others.
Both Twitter and Facebook have been hit with phishing attacks in recent days. "The social networking attacks are becoming increasingly common," said Jamie De Guerre, chief technology officer with antispam vendor Cloudmark. "Spammers are really moving to attack social networks because of the popularity of the social networks and also because they're not as well defended as most e-mail platforms."
Twitter was hit by another high-profile phishing attack in January. This latest attack had snagged several hundred victims by mid-day Thursday.
Here's how Thursday's attack worked: In the first Twitter phishing round, hackers created fake Twitter accounts and then started following legitimate Twitter users. Twitter notifies users when they have new followers, sending the user a link to the follower's Twitter profile page. In this case, the profile page contained a link to a phishing site. So the victim, while investigating his new follower, would end up on the fake site Tvviter(.)com (this page is not safe to visit) where he would be asked to enter his Twitter username and password.
Once the phishers obtained their victim's login credentials, they used them to launch the second round of attacks. In this round, they posted Twitter messages such as "hey check thiss out" or "Hey. there is this funny blog going around." These messages include a link to another phishing site.
Scammers are phishing social networks because they have a better chance of tricking their victims, said Rik Ferguson, a security researcher with Trend Micro who blogged about Thursday's phishing campaign. They "tend to be more successful, because they take advantage of the inherent trust that these systems are based on," he said.
Once criminals have access to these accounts they can make money by sending out spam messages via Twitter or Facebook, or they can re-use the username and password combinations to try to log into other services such as Web-based e-mail, Ferguson said.
On Thursday, security vendor AppRiver reported a new round of Facebook phishing attacks. These messages have the subject line "Hello" and read "Check areps(.)at." This scam, which tries to steal Facebook usernames and login credentials, also promotes the bests(.)at domain. (These domains are also unsafe to visit)
Another reason why Twitter spam is so effective is because Twitter users rarely know what Web sites they're going to visit. Because messages can't be more than 140 characters long, senders often use services like TinyURL or UR.LC to shorten their links, hiding the ultimate destination from Web surfers until they arrive at the site.
Victims are often phished without realizing it. Tim Pratt, a freelance writer based in San Francisco, didn't realize he'd been hacked until his Twitter account sent out one of the phishing messages and friends started contacting him.
After checking his browser history, he realized he'd visited one of the fake sites. "I couldn't believe I had that URL in my history," he said. "I'm usually the one who says, 'Don't click on some random link in Facebook.'"
He thinks he probably clicked on a link sent by a friend early Thursday morning and then logged into the fake site without even realizing it. Pratt quickly changed his password and regained control of his account. "I was more embarrassed than anything else," he said.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Government Agency Webifies Outdated COBOL Applications Let this CTO tell you how his agency converted 1980s-era green screens into an e-filing portal for the 100,000 cases handled each year...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the... All Applications White Papers | Webcasts