Twitter hit with phishing attacks

Several hundred victims fell for a scam circulating on the microblogging network

Twitter users who thought friends were directing them to a "funny blog" Thursday ended up experiencing something completely different: a phishing scam.

Twitter was hit by two different rounds of phishing Thursday, as criminals tried to take control of user accounts and then use them as a springboard to attack others.

Both Twitter and Facebook have been hit with phishing attacks in recent days. "The social networking attacks are becoming increasingly common," said Jamie De Guerre, chief technology officer with antispam vendor Cloudmark. "Spammers are really moving to attack social networks because of the popularity of the social networks and also because they're not as well defended as most e-mail platforms."

Twitter was hit by another high-profile phishing attack in January. This latest attack had snagged several hundred victims by mid-day Thursday.

Here's how Thursday's attack worked: In the first Twitter phishing round, hackers created fake Twitter accounts and then started following legitimate Twitter users. Twitter notifies users when they have new followers, sending the user a link to the follower's Twitter profile page. In this case, the profile page contained a link to a phishing site. So the victim, while investigating his new follower, would end up on the fake site Tvviter(.)com (this page is not safe to visit) where he would be asked to enter his Twitter username and password.

Once the phishers obtained their victim's login credentials, they used them to launch the second round of attacks. In this round, they posted Twitter messages such as "hey check thiss out" or "Hey. there is this funny blog going around." These messages include a link to another phishing site.

Scammers are phishing social networks because they have a better chance of tricking their victims, said Rik Ferguson, a security researcher with Trend Micro who blogged about Thursday's phishing campaign. They "tend to be more successful, because they take advantage of the inherent trust that these systems are based on," he said.

Once criminals have access to these accounts they can make money by sending out spam messages via Twitter or Facebook, or they can re-use the username and password combinations to try to log into other services such as Web-based e-mail, Ferguson said.

On Thursday, security vendor AppRiver reported a new round of Facebook phishing attacks. These messages have the subject line "Hello" and read "Check areps(.)at." This scam, which tries to steal Facebook usernames and login credentials, also promotes the bests(.)at domain. (These domains are also unsafe to visit)

Another reason why Twitter spam is so effective is because Twitter users rarely know what Web sites they're going to visit. Because messages can't be more than 140 characters long, senders often use services like TinyURL or UR.LC to shorten their links, hiding the ultimate destination from Web surfers until they arrive at the site.

Victims are often phished without realizing it. Tim Pratt, a freelance writer based in San Francisco, didn't realize he'd been hacked until his Twitter account sent out one of the phishing messages and friends started contacting him.

After checking his browser history, he realized he'd visited one of the fake sites. "I couldn't believe I had that URL in my history," he said. "I'm usually the one who says, 'Don't click on some random link in Facebook.'"

He thinks he probably clicked on a link sent by a friend early Thursday morning and then logged into the fake site without even realizing it. Pratt quickly changed his password and regained control of his account. "I was more embarrassed than anything else," he said.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags securitysocial networkingtwitter

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Robert McMillan

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?