Malware hijacks Twitter accounts to send dangerous links

Trusteer has found malicious software that leverages Twitter to infect more computers

Twitter users in the Netherlands are being targeted by a piece of malware that hijacks their accounts, according to security vendor Trusteer.

The software vulnerability lies on the client computers of people using Twitter and not Twitter itself. Once a computer is infected, the malware injects JavaScript into the victim's browser when they're on their Twitter account page. The malware steals the user's authentication token, which allows it to make calls to Twitter's API (application programming interface) and post tweets.

Dana Tamir, Trusteer's director of product marketing, wrote that the malware had been used in the past to steal user credentials for financial accounts but has been modified for Twitter.

The malware tweets messages in Dutch such as "Our new King William will earn even more than Beatrix. Check his salary" and "Beyonce falls during the Super Bowl concert, very funny!!!!" along with links.

Although Trusteer said it did not follow the links, it is suspected the links are malicious and aimed at infecting new users. The links are shortened URLs, making it impossible to tell where the links lead.

Hackers will send malicious links to potential victims that, if followed, will land them on a website that tries to attack the person's web browser, looking for vulnerabilities in which to exploit and deliver malware.

"This attack is particularly difficult to defend against because it uses a new sophisticated approach to spear-phishing," Tamir wrote. "Twitter users follow accounts that they trust. Because the malware creates malicious tweets and sends them through a compromised account of a trusted person or organization being followed, the tweets seem to be genuine."

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags Internet-based applications and servicesintrusionsecuritysocial networkingtwitterExploits / vulnerabilitiesinternetmalwareTrusteer

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?