|15 May 2010||#1|
| || |
DIY Twitter-Controlled Botnet Kit Spotted in the Wild
Security researchers from antivirus vendor ESET have uncovered a simple tool automating the creation of botnets that can be controlled from Twitter. The botnet clients can be commanded to launch Distributed Denial of Service (DDoS) attacks or install additional malware on the compromised computers.
The do-it-yourself botnet kit, which ESET detects as MSIL/Agent.NBW, has been discovered by the company's malware investigation laboratory in Latin America, suggesting that it might have originated in the area. "In the last few hours we have found an application that is currently in-the-wild. This application has been developed to automate the creation of botnets where communication between the botmaster and the zombie systems under his control is performed through Twitter," Jorge Mieres and Sebastián Bortnik, both security analysts at ESET, announced in a blog post [in Spanish].
DIY Twitter-Controlled Botnet Kit Spotted in the Wild - Commands relayed from Twitter accounts - Softpedia
|My System Specs|
|15 May 2010||#2|
| || |
Phishing Scams Lure Twitter Users
The newest phishing scam on Twitter has snared thousands of users hoping to increase their number of followers. Instead, users are sent off to a phishing page where cybercriminals steal their Twitter logins using them to generate more spam.
Thousands of spam messages are floating around on Twitter with links to increase the users’ follower count:
FREE MORE TWITTER FOLLOWERS!
CHECK out this site, im a member of it, gets you more followers
If you trying to get more followers check out
WANT MORE TWITTER FOLLOWERS?
Get more followers for free!
Threat Center Live Blog: Phishing Scams Lure Twitter Users
|My System Specs|
|Similar help and support threads for2: DIY Twitter-Controlled Botnet Kit Spotted in the Wild|
|Windows 8.1 Start button SPOTTED in the wild||News|
|Software controlled RAID 1 taking very long to resync||General Discussion|
|Configuring Win7 Pro as Remotely Controlled Download PC||Network & Sharing|
|How can I determine if my laptop is controlled via remote||System Security|
|Mobile Scareware Spotted in the Wild||Security News|
|Time-controlled cpu-throttling||Performance & Maintenance|
|Twitter-controlled botnets come to the unwashed masses||Security News|
|Our Sites ||Site Links ||About Us ||Find Us |
© Designer Media Ltd
All times are GMT -5. The time now is 08:04 AM.