Rogue Twitter application steals passwords

Posted by   Virus Bulletin on   Jul 19, 2011

'See who stalks my Twitter' used to lure users.

A malicious Twitter application is currently spreading on the microblogging network, luring users to hand over their passwords, supposedly so they can see who is 'stalking' them on the site.

At first glance, the page where the application (dubbed 'StalkTrak') asks to be authorized may look legitimate. One giveaway, however, is that it asks users to input their Twitter login credentials. Twitter applications do not have - or need - access to these; rather, they use a technology called 'OAuth' which uses the user's current Twitter session to authenticate them.

The biggest giveaway, however, is the domain used for authentication: itiwitter dot com. The domain was registered by a Shanghai-based company four days ago and, obviously, has no association with Twitter.

Users should be wary of malicious applications for Twitter and other social networking sites - it is advisable to always double-check the URL and keep in mind that these applications do not need passwords. Users who do not exercise such caution may find themselves among the growing list of people whose accounts are hacked and used to spread spam and scams.



Posted on 19 July 2011 by Virus Bulletin
twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.