Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: New Mobile Malware Spreads via Twitter and Takes Over Your Phone

Alert: New Mobile Malware Spreads via Twitter and Takes Over Your Phone

There are countless threats out there that can mean danger for your business, but one of the most innovative to date utilizes a malicious Twitter account to administer commands to a botnet made up of infected Android devices. In fact, this is widely considered the first threat to actively use a social network in this manner, making it a wake-up call for security professionals and social media users alike.

The app, called Twitoor, is a Trojan that hides on the device and constantly receives commands from its Twitter account. This could include downloading and installing malicious applications, stealing data, or switching to an alternative command-and-control Twitter account. Additionally, you cannot find Twitoor on the Google Play store. If you’re going to download it, you would have to click on a malicious link.

Botnets are commonly used by cyber criminals to spread malware across multiple devices. The idea is to spread their influence as far as possible by creating “zombie-bots” which can be enslaved and commanded to perform roles which one computer could not. Yet, a normal botnet leaves signs that can be used to detect where it’s getting its commands from. Security professionals are often able to find the source of the botnet and shut down the server administering the commands, but with Twitoor, this isn’t so simple.

Due to the fact that the Twitoor-infected systems are receiving information from an ever-shifting Twitter account, it’s able to largely avoid detection. ZDNet explains: “Those behind the malware have also taken additional steps to safeguard Twitoor, including encrypting messages to further obfuscate their activities.” This combination of tactics makes it much more difficult to detect and destroy at its roots, even for security professionals.

Thanks to criminals changing their ways in order to innovate and discover new ways to take advantage of tried-and-true hacking practices, you always need to be wary of malware infections and other online threats. You can never be too careful. We recommend that you contact Evolve IT, especially if you feel that your organization’s network security--including mobile devices--isn’t quite up to snuff.

In particular, we have a mobile device management solution that can help you keep a handle on your organization’s mobile devices. You can secure your devices through whitelisting and blacklisting apps, limiting access to crucial data, and remotely wiping infected systems so that the data found on them cannot be used or sold by hackers. The idea is to take measures to prevent infections in the first place, and promptly respond to infections that do find their way onto the devices.

To learn more about our mobile device management solutions, reach out to us at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 01 April 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Business Computing Software User Tips Workplace Tips Google Hosted Solutions Microsoft Computer Upgrade Efficiency IT Support Mobile Devices Innovation Smartphone Windows 10 Gmail Network Security Ransomware Hardware Microsoft Office Office Backup Apps Business Continuity Disaster Recovery Communication Operating System Hacking WiFi The Internet of Things Facebook Social Media Bandwidth Mobile Device Management Firewall Money Network Smartphones Content Filtering Cybercrime Managed Service Provider Outlook Website Wireless Technology Android Employer-Employee Relationship Apple History Two-factor Authentication Small Business Phishing Best Practice App Alert Mobile Computing Networking Data storage Big Data communications Safety Data Windows Unified Threat Management Experience Quick Tips Search BYOD User Downtime Passwords Hard Drives Streaming Media Help Desk Writing Shortcut Disaster Micrsooft Remote Computing Visible Light Communication DDoS Business Growth Heating/Cooling Data Management Word Recovery Robot Advertising Society Sports Google Wallet Spam Business Management Retail Running Cable Information Technology Windows 8 Competition Internet of Things Hosted Solution Presentation Windows XP Entrepreneur IT Services Managed IT services Documents Domains Artificial Intelligence Tech Support Compliance Drones Hacker Bluetooth Social Printer Application Browser Automation Customer Service Virtual Desktop Wireless Memory Securty Unified Communications Document Management Encryption Deep Learning Law Enforcement SaaS Router VoIP BDR Office 365 Proactive IT Cortana Vendor Management Saving Money Network Congestion Analytics Save Money intranet Lithium-ion battery Music Monitors Cryptocurrency Laptop Social Networking Public Speaking IBM Displays Google Docs IP Address Education Virtualization Cleaning Holiday Black Market YouTube Government Processors End of Support Staffing Office Tips Augmented Reality LiFi Keyboard
QR-Code