ITBusiness.ca

Phishing attack cons Twitter users into divulging confidential details

Twitter users have been tricked into divulging their login and password details to a Web site that then spammed their contacts. Earlier this month hundreds duped by another series of Twitter phishing attacks.

The microblogging site has become very popular it the business community and among those seeking an alternative social networking outlet.

The culprit is a Web site called TwitterCut. Some Twitter users began getting a message that appeared to be from one of their friends and included a link to the TwitterCut Web site. The message implied they could gain more Twitter contacts by following the link.

At one time TwitterCut looked quite similar to the real Twitter login page, said Mikko Hypponen, chief research offer for the security vendor F-Secure.

If a person entered their login details, TwitterCut would then send the same message via Twitter to all of the victim’s contacts, a kind of phishing attack with worm-like characteristics. No malicious software is installed on a user’s machine, Hypponen said.

Although TwitterCut probably holds the login details for many accounts, it doesn’t appear those accounts have been used to spam out links to more dangerous Web sites.

TwitterCut’s Web site has been reported to services that blacklist potentially harmful Web sites, although it is still active. In a warning message now on TwitterCut, the site’s operators said they didn’t mean to phish people.

Instead, they say they were trying to create a so-called Twitter Train, which are sites that purport to quickly give Twitter users lots of followers. They said they bought the login script on their site for $50.

“We were not phishing Twitter accounts whatsoever,” the message said. “We’re shutting down this site.”

In an interview later Wednesday, one of TwitterCut’s operators said the site had been live for less than three days and hadn’t been decked out with all of its features. But TwitterCut was indexed by Google’s search engine, which brought a flood of Twitter users, said Jordan Embry, who lives in Owensboro, Kentucky.

TwitterCut’s site informed users that it would send a message to all of their friends, which meant it would not qualify as spam, Embry said.

Embry has since e-mailed Twitter to say that he meant no harm. He plans to scuttle the TwitterCut domain since it appears to have been blacklisted. TwitterCut did not retain the login details of the users, Embry said.

However, Embry said he’s still interested in creating another service that lets Twitter users gain a larger following since it could make money from ads. TwitterCut got 9,000 unique hits just on Tuesday, he said.

Hypponen said Twitter should be on the lookout for signs of spam, such as when an identical message appears hundreds and hundreds of times across users’ profiles that isn’t a “retweet,” or the intentional reposting of other content.

Twitter could also screen URLs (Uniform Resource Locators) to make sure they’re not already blacklisted for security issues, Hypponen said. Many Web browsers as well as search engines will either warn about or block suspicious Web sites.

Most URLs posted in Twitter have been shortened using services such as TinyURL in order to fit in the 140-character message length that Twitter imposes, obscuring the real destination and making users dependent on the trustworthiness of their friends when clicking links. The service was hit by other worms earlier in the year.

Twitter acknowledged the phishing problem late Tuesday night.

“We are currently pushing a password reset on accounts we believe may have been caught in a phishing scam,” the company said. “Please exercise your best judgment when thinking about releasing your username and password to third parties.”

Source: Macworld

Exit mobile version