Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.
Trend Micro study reveals criminal abuses of Twitter
Posted on 2-Aug-2019 16:51 | Filed under: News


Trend Micro study reveals criminal abuses of Twitter

Trend Micro Incorporated has announced a new study revealing how cybercriminals are abusing Twitter via tech support scams, command-and-control (C&C) operations and data exfiltration.

 

Trend Micro researchers analysed a large volume of Twitter data to identify relationships between various entities to spot anomalies and uncover key insights.

 

“Social media is an inescapable part of modern life, and our new research shines an important light on how it’s being used positively by the security community, and abused by criminals,” said Tim Falinski, Managing Director, Consumer, APAC, Trend Micro. “This research shows businesses how the misuse of social networks can damage their brand, and it informs consumers how they might be tricked into a scam from what is believed to be a trusted source. We hope by making these abuses known, both businesses and consumers can be vigilant to not become victims of such attacks.”

 

Criminals were found using fake Twitter accounts to spoof those of legitimate vendors for credible tech support scams. Users call the fake phone number provided, believing they are speaking with the intended company’s help desk, which results in the caller either sharing credit card information or installing malicious content on their computer.

 

This is often part of a multi-platform strategy along with YouTube, Facebook, Telegram and other channels to improve SEO for fake tech support websites linked to the Twitter accounts, boosting their search rankings.

 

While criminals are using the social network for bad, threat researchers can leverage the power of social media for good. Most notably, Twitter is used for monitoring vulnerability disclosures to inform patch prioritisation, and scanning for indicators of compromise, threat detection rules, and other contextual information to boost threat intelligence.

 

Trend Micro recommends users confirm the validity of a Twitter account by checking the company’s website directly, rather than through the account. It is also important for security teams to validate Twitter data when leveraging it for investigations or threat intelligence.

 

 

 

Stock photo bigtunaonline/Bigstockphoto

 



More information: https://www.trendmicro.com/vinfo/nz/security/...







Twitter and LinkedIn »



Follow us to receive Twitter updates when new discussions are posted in our forums:



Follow us to receive Twitter updates when news items and blogs are posted in our frontpage:



Follow us to receive Twitter updates when tech item prices are listed in our price comparison site:



Trending now »

Hot discussions in our forums right now:

Access Points in 2019.. Whats the best?
Created by startupgeek, last reply by richms on 15-Aug-2019 21:23 (32 replies)
Pages... 2 3


Using RugbyPass? Guess who owns it now.....SkyTV
Created by davidcole, last reply by mrbbi on 17-Aug-2019 20:40 (29 replies)
Pages... 2


Is this acceptable panel beating workmanship?
Created by starcub, last reply by lNomNoml on 17-Aug-2019 19:28 (11 replies)

Advice/Help - where should we bring fibre into the house
Created by duckDecoy, last reply by Scotdownunder on 15-Aug-2019 19:31 (23 replies)
Pages... 2


I want one!
Created by Mark, last reply by Geektastic on 15-Aug-2019 21:31 (21 replies)
Pages... 2


Experienced Phone Tech Service Person Needed to clarify Flip Homeline Caller ID issue
Created by Tomahawk66, last reply by coffeebaron on 18-Aug-2019 15:28 (9 replies)

Moderation of IRD allowing crypto payment thread
Created by Cybnate, last reply by XJ9 on 18-Aug-2019 09:33 (38 replies)
Pages... 2 3


Traveller declares biosecurity products to customs, shows them honey and gets a fine
Created by Batman, last reply by Fred99 on 18-Aug-2019 08:42 (38 replies)
Pages... 2 3