New Malware Hijacks Twitter Accounts for Financial Fraud

Twitter-hijackers

Cyber criminals are always looking for new ways to avoid detection, escape cyber sleuths, and carry out their cyber crimes. So it shouldn't be surprising that malicious hackers are now taking advantage of social media. A newly discovered malware, designed to gain access to users' banking credentials, uses Twitter to spread itself and reach more victims.

According to a blog post published by online security firm Trusteer on Monday, the malware basically uses Twitter like traditional malware uses emails — to carry out spear-phishing campaigns and spread itself to other ususpecting victims. Call it "twishing."

"This attack is particularly difficult to defend against because it uses a new sophisticated approach to spear-phishing," writes Trusteer's Dana Tamir in the blog post. "Twitter users follow accounts that they trust. Because the malware creates malicious tweets and sends them through a compromised account of a trusted person or organization being followed, the tweets seem to be genuine."

Twitter phishing — or twishing — is nothing new, although usually it's spread via direct messages or emails purporting to notify users of DMs. Seeing malware spread through regular tweets is more rare, though.

In 2010, Mashable reported on another similar Twitter security flaw that tried to infect users through regular tweets. And, more recently, the cyberespionage malware MiniDuke has even used fake Twitter accounts. But this might be the first time real Twitter accounts are hijacked to carry out phishing attacks.

"We haven't seen other Twitter attacks," Yishay Yoven, Trusteer vice president of marketing, told Mashable. Although he notes that they have seen multiple attacks using Facebook, as Mashable has reported multiple times in the past.

Yoven underlines the dangers of this kind of attack, noting that users aren't used to distrusting shortened links contained in tweets coming from people they follow. "You're trained to suspect emails; it's probably easier to use something like Twitter when it looks like it came from you," he said.

The researchers discovered this version of the TorRAT malware, a trojan virus traditionally used to target banks and financial institutions two weeks ago. Once the virus infects a computer — this initial infection can be made via traditional email phishing or through legitimate websites that have been injected with malware — it carries out a so-called man-in-the-browser attack, monitoring a user's activity on its browser. Once the victim logs into Twitter, the malware injects Javascript code into the victim's account page and steals the user's authentication token, which it then uses to call Twitter API's and post tweets on his or her behalf.

The malware targets Dutch victims, so the tweets make references to the Dutch Queen and her heir, the CEO of a Dutch bank, to make them seem more real. One tweet also mentions Beyonce.
Trusteer published three examples of malicious tweets: "Beyonce falls during the Super Bowl concert, very funny!!!!;" "Our new King William will earn even more than Beatrix. Check his salary;" and "CEO of [Dutch Bank] is off with our millions!! The minister is inspecting again... see." (The name of the actual bank was redacted by Trusteer.) Every tweet includes a shortened link that allegedly infects whoever clicks on it.

Trusteer reported that they've found these tweets being spread around by multiple accounts, proving that the campaign has successfully tricked numerous users into clicking on the malicious links. The company also published a few examples of malicious links, reporting that they seem to be inactive now.

Yoven told Mashable that they notified Twitter of the malware, but there's little the company can do to prevent this kind of attack. Yoven confessed that he doesn't know whether Twitter checks every link posted in every tweet but "even if they did, unless some third party provider told them that website is malicious, I doubt that they can actually do it themselves. It's very, very difficult to do it."
Yoven noted that the only way to avoid this malware is to be careful what you click on and to have anti-malware protection installed.

Mashable reached out to Twitter for comment but we have yet to receive an answer to our inquiries.
Who is behind this new type of malware? Trusteer doesn't know. That the malware's targets are for now limited to the Netherlands might indicate that the criminals behind this type of TorRAT are Dutch. But there's nothing that prevents malware like this to be used elsewhere. In fact, in her blog post, Tamir notes that this type of attack "can be used to target any market and any industry."
Mashable composite, Image via iStockphoto, alengo
New Malware Hijacks Twitter Accounts for Financial Fraud

Category

10 Resources for Designers and Developers 11 Big Tech Trends You'll See in 2013 12/12/12 56 Mashable Stories 60 second Video how to keep laptop work well 70th Golden Globes ads adsense Adsense Tips Advertising AdWords Amazon Android AngryBird Apple Apple's 2012 Year in Review Apps Apps to Spice Up Your Sex Life article Barack Obama Benefits of a Job Search Community Bill Clinton Bing Bitcoins Blackberry blogging blogging secret blogging tools book Book Review; Content Marketing for Dummies Building an Email List Business News Business tips Campaign Websites Celebrities Charlie the Unicorn Chrome Content Spoiler With Simple Animation Creative Ways to Use Your Favorite Running App CSS Design Competition for Kids Digital Media Resources dnt do not track download drive traffic Dropbox Tools e-commerce ebay Effects Social Networks email enterprenour blog Entertainment Expired Domain Business Facebook facebook hacker File Management Film Firefox for Andoid Friends Sex App Gadget Games Geeks george bush george w. bush gmail golden globes Google Google + (plus) Google API Google Capture Google Trends Google Wallet Google XPhone Guest Blog Post Guest Posting Guide to Super Bowl 2013 Betting Guide To: WordPress Development With Microsoft WebMatrix gyroscopes for optical image stabilization history Hopper DVR Horde Hot Advertising Trends of 2012 How to Backup Your Skype Chat & Audio Conversations Online With Simkl html Html 5 HTML Tool hulu Hurricane Sandy instagram's new policy internet Internet Marketing Internet users iOs 6 iPad iPhone Kim Dotcom Laptop LES link building Linkedin Malware Marketing predictions 2013 marketing tips Microsoft Microsoft Surface Pro Mobile App Websites Mobile phone Mobile web Mobile web design monetizing blog money online Motorola Music NBA Negative Target Fixation New year's resolution News nostalgia Notebook Obama Online Education Online Payment Online Stores Palestinian Statehood parental apps PC Jobs Photoshop for Retina Displays Pics Pinterest Plugin porn in vine President Obama's Speech at Vigil for Newtown Victims Promoting Yourself Via Print Publisher Radio Station Review Romsey RoundCube. mail. cpanel Russian Plane Crash Video Search engine security seff identity security SEO SEO 2013 Shop For Geeky Gifts Smartphone-Enabled Website social media Social Networks Social Sites for Families Softaculous software Spam SquirrelMail superbowl 2013 Tablet Teaching Tool Tech Technology Television The Most Reputable Company in U.S. Things I Learned About Tech in 2012 tips Tools twitter latest U.S. UN Vote Universe Unlocked iPhone 5 in the U.S. upgrade script US election US president vote us presidents video Video Conferencing App for Mac Video Marketing Videos Watercooler Ways to Stay Creative While Working From Home Waze web Web design trend 2013 web traffic webtools Wedding What Is Pinterest? White House Why You Should Say No To Multitasking Wi-Fi Smart Scale windows 7 Windows 8 Windows 8 Review Windows RT Review Wirelessly Monitors Your Driving with Dash WomenWeb Wordpress Wordpress Plugin Working From Home writing web Xbox Yahoo YouTube Favorite YouTube Updates