(770) 424-3393 Facebook logo Twitter logo Linkedin logo YouTube 001 gplus RSS feed

Carceron Blog

Carceron has been serving the Atlanta area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: New Mobile Malware Spreads via Twitter and Takes Over Your Phone

Alert: New Mobile Malware Spreads via Twitter and Takes Over Your Phone

There are countless threats out there that can mean danger for your business, but one of the most innovative to date utilizes a malicious Twitter account to administer commands to a botnet made up of infected Android devices. In fact, this is widely considered the first threat to actively use a social network in this manner, making it a wake-up call for security professionals and social media users alike.

The app, called Twitoor, is a Trojan that hides on the device and constantly receives commands from its Twitter account. This could include downloading and installing malicious applications, stealing data, or switching to an alternative command-and-control Twitter account. Additionally, you cannot find Twitoor on the Google Play store. If you’re going to download it, you would have to click on a malicious link.

Botnets are commonly used by cyber criminals to spread malware across multiple devices. The idea is to spread their influence as far as possible by creating “zombie-bots” which can be enslaved and commanded to perform roles which one computer could not. Yet, a normal botnet leaves signs that can be used to detect where it’s getting its commands from. Security professionals are often able to find the source of the botnet and shut down the server administering the commands, but with Twitoor, this isn’t so simple.

Due to the fact that the Twitoor-infected systems are receiving information from an ever-shifting Twitter account, it’s able to largely avoid detection. ZDNet explains: “Those behind the malware have also taken additional steps to safeguard Twitoor, including encrypting messages to further obfuscate their activities.” This combination of tactics makes it much more difficult to detect and destroy at its roots, even for security professionals.

Thanks to criminals changing their ways in order to innovate and discover new ways to take advantage of tried-and-true hacking practices, you always need to be wary of malware infections and other online threats. You can never be too careful. We recommend that you contact Carceron, especially if you feel that your organization’s network security--including mobile devices--isn’t quite up to snuff.

In particular, we have a mobile device management solution that can help you keep a handle on your organization’s mobile devices. You can secure your devices through whitelisting and blacklisting apps, limiting access to crucial data, and remotely wiping infected systems so that the data found on them cannot be used or sold by hackers. The idea is to take measures to prevent infections in the first place, and promptly respond to infections that do find their way onto the devices.

To learn more about our mobile device management solutions, reach out to us at (770) 424-3393.


No comments yet
Already Registered? Login Here
Thursday, 27 October 2016
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Technology Best Practices Privacy Tip of the Week Internet Microsoft Business Management Managed Service Provider Software Cloud Workplace Tips Backup Saving Money Hardware Data Small Business Productivity Gadgets Hackers Business Computing Mobile Office Business Email Google Malware Hosted Solutions IT Services Quick Tips Social Media IT Support Virtualization Mobile Devices Upgrade Business Continuity Users Smartphones Passwords Disaster Recovery Microsoft Office Network Windows WiFi Server VoIP Innovation Miscellaneous User Tips Mobile Device Management Computer Windows 10 Smartphone Efficiency Mobile Computing Vendor Management Communication BYOD Operating System Unified Threat Management Remote Computing The Internet of Things Marketing Apps Holiday History IT Consultant Ransomware Facebook Analytics Bring Your Own Device Android Health Going Green Wireless Technology Apple Alert Windows 8 Content Filtering Information Technology Saving Time Printer Hard Drives Big data Lithium-ion Battery Tech Support Office Network Security Outlook Firewall Spam Collaboration Hiring/Firing Data Management Save Money Phishing Employer-Employee Relationship Gmail Remote Monitoring Bandwidth Computer Repair Humor Best Practice Automation Proactive IT Smart Phones Computers Maintenance Tutorials Browser App Antivirus Search Save Time Internet of Things Black Market iPhone Money Avoiding Downtime Two-factor Authentication Wireless Document Management Router Running Cable Website Phone System Hacking Administration User Fax Server Excel Managed IT services PowerPoint Current Events Help Desk Mobile Device Sports Education Virus Intranet Hacker Business Intelligence User Error Budget communications Chrome Inbound Marketing Documents Telephone Systems Compliance Retail IBM Business Growth Comanaged IT Encryption Virtual Desktop Thin Client Statistics Networking Network Congestion Pain Points Managed IT Experience Streaming Media Printer Server Heating/Cooling Net Neutrality Gaming Console End of Support Artificial Intelligence Twitter Law Enforcement Office 365 Outsourced IT BDR Legal Data storage Safety Digital Payment Customer Relationship Management Company Culture Social Networking Bluetooth Social Cost Management Laptop Computer Accessories Comparison Flexibility Customer Service Downtime Government Augmented Reality USB Office Tips Recovery Computing Cybercrime Password Programming Text Messaging VPN Cortana Hosted Solution Presentation Risk Management Processors SaaS Wi-Fi Content Management Music Pirating Information Best Available Storage Upgrades IP Address Recycling Flash Human Resources Read Archive Keyboard Value Update Deep Learning Settings LiFi PDF Banking Shortcut Video Surveillance Adroid Troubleshooting Online currency Monitors Trending Language Point of Sale Visible Light Communication Business Metrics External Harddrive Google Wallet Debate Domains Business Owner Displays Advertising eWaste Co-Managed IT Chromebook Drones Lifestyle organize YouTube Specifications Leadership Work/Life Balance Webinar Environment Competition Entertainment Analytic Writing File Sharing Unified Communications Riske Management Digital Signature Download Touchscreen Application Staffing switches GPS Paperless Office Permissions Microchip Google Docs Microserver Disaster DDoS LinkedIn 3D Regulations Identity Theft Wearable Technology Solid State Drive Tablet Hacks Mouse Turn Key Securty Operating Systerm IT consulting Virtual Reality Society Word HIPAA Skype Notifications Micrsooft Public Speaking IT service Windows XP Electronic Payment Computing Infrastructure Display Entrepreneur Ebay Teamwork Adminstration CIO Harddrive Robot Memory Efeciency

Mobile? Grab this Article!


Recent Comments

Ryder Frith Milla Minchin Use Your Smartphone Incorrectly and Risk Going Temporarily Blind
24 October 2016
Wonderful post and you share excellent content in this post i am happy to comment on this Online Fa...

Blog Archive