Home > Our Products > How a Twitter Malware Scam Is Carried Out

How a Twitter Malware Scam Is Carried Out

There were days when you could implant a malicious code in simple software. While the software was installed, the malicious code would also get installed. But today, anti-virus programs are more efficient and effective in detecting malicious code. So, miscreants are becoming more creative in devising ways to plant malicious software on the victim computers. Some use disguised links while others send emails which lure the victims to install the code on their computers, ignoring the warnings of their anti-virus programs. Then, there are the social networking sites.

Anonymous social media accounts are created solely for this purpose. Facebook and Twitter are the top picks and miscreants use these accounts in a variety of ways to ensure that they plant their malicious software on other unsuspecting users. Before the victims realize that something is not right, the damage would have been done. As they say, knowledge is power. You can guard yourself against this scam when you know how it is carried out. Here is a note on one of the ways in which Twitter can be used to carry out a Malware scam.

The Lure to Attract You to the Dangerous Link

Tweets are something similar to your Facebook status updates. The more people you follow more will be the number of tweets in your twitter feed. So, the chance of you clicking on the lure link is very less. Something more specific and targeted is needed. That is where the direct message comes in. Most hackers use direct twitter messages to distribute the links. Privacy options are much lesser in Twitter compared to Facebook. So, it is easier to send direct messages.

The message will be something like ‘you have never seen this before’ or ‘can you believe it’ or ‘your eyes will pop out seeing this’, etc. The point is that your curiosity should be stoked enough so that you will click on that link ignoring the basic instinct which says that you should not. The luring is one of the techniques in a field called social engineering where you learn to play with human psychology and draw them to the dangerous links.

The Redirected Link

Once you click on the link, you will be redirected to another page that looks like a Facebook login page or the login page of any other popular social networking site, but mostly it will be Facebook. But when you look at the address bar, the URL will be something random or something that is completely out of context. The login page is a facade for you to enter your login credentials. When you do so, you will be redirected to a link that shows a video or a picture. Also, your login details will be relayed to the hacker, thus granting him/her access to your account.

Planting The Software

The video or the picture of interest, the one which was used to lure you to the page, will not be displayed. Instead, an error message is displayed which says that a plug-in is out of date or you have to download a specific player to view the picture or video. In case you choose to download that software, it will have malware, spyware or any other type of malicious software embedded in it. Some might even include a warning that says virus protection programs won’t allow the installation due to some encoding standard. This is just a way to bypass your anti-virus program. Once the software is installed, you are at the mercy of the miscreant who coded that program. The hackers can do anything they want including steal money from your online bank accounts.

Categories: Our Products
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: