(770) 424-3393 Facebook logo Twitter logo Linkedin logo YouTube 001 gplus RSS feed

Carceron Blog

Carceron has been serving the Atlanta area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: New Mobile Malware Spreads via Twitter and Takes Over Your Phone

Alert: New Mobile Malware Spreads via Twitter and Takes Over Your Phone

There are countless threats out there that can mean danger for your business, but one of the most innovative to date utilizes a malicious Twitter account to administer commands to a botnet made up of infected Android devices. In fact, this is widely considered the first threat to actively use a social network in this manner, making it a wake-up call for security professionals and social media users alike.

The app, called Twitoor, is a Trojan that hides on the device and constantly receives commands from its Twitter account. This could include downloading and installing malicious applications, stealing data, or switching to an alternative command-and-control Twitter account. Additionally, you cannot find Twitoor on the Google Play store. If you’re going to download it, you would have to click on a malicious link.

Botnets are commonly used by cyber criminals to spread malware across multiple devices. The idea is to spread their influence as far as possible by creating “zombie-bots” which can be enslaved and commanded to perform roles which one computer could not. Yet, a normal botnet leaves signs that can be used to detect where it’s getting its commands from. Security professionals are often able to find the source of the botnet and shut down the server administering the commands, but with Twitoor, this isn’t so simple.

Due to the fact that the Twitoor-infected systems are receiving information from an ever-shifting Twitter account, it’s able to largely avoid detection. ZDNet explains: “Those behind the malware have also taken additional steps to safeguard Twitoor, including encrypting messages to further obfuscate their activities.” This combination of tactics makes it much more difficult to detect and destroy at its roots, even for security professionals.

Thanks to criminals changing their ways in order to innovate and discover new ways to take advantage of tried-and-true hacking practices, you always need to be wary of malware infections and other online threats. You can never be too careful. We recommend that you contact Carceron, especially if you feel that your organization’s network security--including mobile devices--isn’t quite up to snuff.

In particular, we have a mobile device management solution that can help you keep a handle on your organization’s mobile devices. You can secure your devices through whitelisting and blacklisting apps, limiting access to crucial data, and remotely wiping infected systems so that the data found on them cannot be used or sold by hackers. The idea is to take measures to prevent infections in the first place, and promptly respond to infections that do find their way onto the devices.

To learn more about our mobile device management solutions, reach out to us at (770) 424-3393.


No comments yet
Already Registered? Login Here
Monday, 26 September 2016
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Technology Best Practices Privacy Internet Microsoft Tip of the Week Business Management Managed Service Provider Software Cloud Workplace Tips Backup Saving Money Small Business Data Hardware Productivity Gadgets Hackers Mobile Office Business Computing Business Email Hosted Solutions Malware Google IT Services Quick Tips Social Media IT Support Virtualization Upgrade Mobile Devices Business Continuity Users Passwords Smartphones Microsoft Office Network Windows Disaster Recovery WiFi Server Miscellaneous Innovation VoIP Computer User Tips Mobile Device Management Windows 10 Vendor Management Efficiency Mobile Computing Communication Smartphone Unified Threat Management Operating System Marketing BYOD Apps The Internet of Things Holiday Remote Computing IT Consultant Android Facebook Analytics History Health Alert Going Green Ransomware Wireless Technology Apple Windows 8 Bring Your Own Device Office Network Security Content Filtering Printer Information Technology Saving Time Tech Support Hard Drives Big data Lithium-ion Battery Outlook Gmail Firewall Collaboration Remote Monitoring Spam Data Management Save Money Phishing Employer-Employee Relationship Browser Search Antivirus Humor Save Time Bandwidth Smart Phones Computer Repair Hiring/Firing Maintenance Best Practice Automation Proactive IT Tutorials Computers Help Desk User Error Sports Avoiding Downtime Education Intranet Business Intelligence Router Internet of Things Budget iPhone Administration Two-factor Authentication Money Document Management Wireless Running Cable Excel Phone System App Current Events Fax Server Hacking User Mobile Device Managed IT services PowerPoint Comparison Flexibility Social Cost Management Augmented Reality Office Tips Customer Service Downtime Computing Government USB Inbound Marketing Text Messaging Recovery Cybercrime Password Programming VPN Hosted Solution Virus Cortana Comanaged IT SaaS Presentation Risk Management Chrome Pain Points communications Printer Server Black Market Compliance Documents Gaming Console IBM Business Growth Retail Encryption Thin Client Website Statistics Networking Streaming Media Virtual Desktop Network Congestion End of Support Experience Net Neutrality Artificial Intelligence Heating/Cooling Legal Data storage Digital Payment Customer Relationship Management Social Networking Bluetooth Safety Company Culture Laptop Computer Accessories Harddrive Regulations Adminstration LinkedIn Wearable Technology Identity Theft Solid State Drive DDoS Securty Mouse Operating Systerm IT consulting Tablet Virtual Reality Society Micrsooft IT service Windows XP Word HIPAA Skype Display Ebay Computing Infrastructure Public Speaking Robot CIO Electronic Payment Efeciency Memory Entrepreneur Teamwork Content Management Pirating Information Wi-Fi Music Hacker External Harddrive Upgrades Processors Recycling Flash Best Available Storage Archive Telephone Systems IP Address Deep Learning Human Resources organize Read Update Settings LiFi Keyboard Value Video Surveillance Banking Webinar Trending Monitors PDF Online currency Adroid Point of Sale Language Visible Light Communication Shortcut Google Wallet Troubleshooting Debate Business Metrics Displays GPS Managed IT Advertising Drones Domains Business Owner Lifestyle Chromebook Leadership Microserver YouTube eWaste Co-Managed IT 3D Work/Life Balance Law Enforcement Specifications Twitter Writing Turn Key Outsourced IT Environment BDR File Sharing Unified Communications Competition Office 365 Staffing Entertainment Analytic Touchscreen Download switches Riske Management Digital Signature Paperless Office Permissions Application Google Docs Disaster

Mobile? Grab this Article!


Recent Comments

No comments yet.

Blog Archive