Security News Twitter-controlled Android backdoor delivers banking malware

frogboy

In memoriam 1961-2018
Thread author
Verified
Top Poster
Well-known
Jun 9, 2013
6,720
A backdoor Trojan named Twitoor is the first instance of Android malware that receives its commands from a Twitter account
twitter-danger.jpg

Keeping their botnet out of law enforcement’s and other criminals’ hands is imperative for botmasters if they want to keep earning. C&C servers are the norm, but they can be tracked down, seized by the authorities and, ultimately, reveal crucial information about the botnet, allowing them to shut it down or cripple it.

Twitter or other social media accounts as C&C sources offer way more flexibility.

“It’s extremely easy for the crooks to re-direct communications to another freshly created account,” says ESET malware researcher Lukáš Štefanko. “In the future, we can expect that the bad guys will try to make use of Facebook statuses or deploy LinkedIn and other social networks.”

He believes that the Twitoor backdoor is spread via SMS or malicious URLs, as there are no traces of it on Android app stores. It is usually hidden inside what professes to be a porn player app or MMS application.

Once it infects the target device, it hides itself and contacts the C&C Twitter account every so often.


Full Article. Twitter-controlled Android backdoor delivers banking malware - Help Net Security
 

DardiM

Level 26
Verified
Honorary Member
Top Poster
Malware Hunter
Well-known
May 14, 2016
1,597
Thanks for the share :)

Twitter, Facebook & Cie : another reason to add with these that made me keep away from them. :rolleyes:
 
  • Like
Reactions: frogboy

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top