Monday, August 29, 2016

Botnet Android / Twitoor uses Twitter to extort … – wirtualnemedia.pl

The new threat on your mobile devices with Android detected engineers from the company Eset dealing with solutions in the field of network security.

According to their findings malicious application marked as Android / Twitoor probably spread via SMS. in which there is a link to an infected website.

After entering the contaminated site takes to download an application designed ostensibly to watch porn or send MMS. These applications do not have, however, promised functionality.

When you start one of these malicious program checks the predefined account on Twitter, where it tries to download instructions, written in the form of tweets. On their basis can download additional malicious applications designed to steal login data in mobile banking and credit card numbers. The command in the form of tweetu can also change the account management botnet.

Kamil Sadkowski, an analyst with Eset highlights in a statement that Android / Twitoor this is the first use of Twitter by the botnet in the case of Android ecosystem.

– Using the Twitter server instead of the C & amp; C in order to manage the botnet is a new idea in the event of threats for Android – emphasizes Kamil Sadkowski. – Communication is a critical point of every botnet, cutting off because management server can result in deactivation of all the infected network devices. In this case, the creator of the botnet were trying to hedge against that eventuality, using the social networking site and encrypting messages – describes.

Analysts Eset recall that Twitter has already been used in 2009 to control the botnet, but then it was a network composed of computers running Windows.

Botnets composed of Android devices also have been controlled by unconventional means, eg. instant messages Google. The use, however, for this purpose, Twitter is a novelty. As experts stress it is possible that in the future, cyber criminals will try to use for this purpose also account other social networks, eg. Facebook or LinkedIn.

Author: ps

Learn more: botnet, Android, Twitter, cyber criminals, hackers

LikeTweet

No comments:

Post a Comment