IDG News Service - Scammers are trying to take advantage of the fact that many users will soon have to update their version of the TweetDeck Twitter software.
On Monday, TweetDeck warned that some Twitter messages were advising people to upload an untrustworthy executable file, called tweetdeck-08302010-update.exe.
"These tweets are from hacked accounts and this file does not come from us. Do not download it," TweetDeck said in a post on its support page.
The software is a generic Trojan horse program that is not detected by most antivirus products, said Paul Ferguson, a researcher with Trend Micro. This type of software is used to download a variety of different malicious programs such as password-stealing keyloggers.
Users of the older versions of TweetDeck really will have to update their software Tuesday, as Twitter is expected to pull support for a programming interface used by TweetDeck releases prior to version 0.33.
Scammers apparently see this as an opportunity. On Monday, numerous posts were viewable on Twitter, telling users to update TweetDeck. "Sorry for offtopic, but it is a critical TweetDeck update. It won't work tomorrow!" reads one post.
The scammers have also included popular Twitter search terms such as "emmys" in the messages, presumably so they will turn up in search results and trick people.
The fake updates are hosted on the Alturl.com website. The only place that real TweetDeck updates can be found is: http://www.tweetdeck.com/desktop/
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Surescripts Case Study- Securing Keys and Certificates Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its...
- Ponemon 2014 SSH Security Vulnerability Report According to research by the Ponemon Institute, 3 out of 4 enterprises have no security controls in place for SSH which leaves organizations...
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!