{"id":14125,"date":"2018-12-20T15:30:38","date_gmt":"2018-12-20T23:30:38","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/12\/20\/news-7892\/"},"modified":"2018-12-20T15:30:38","modified_gmt":"2018-12-20T23:30:38","slug":"news-7892","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/12\/20\/news-7892\/","title":{"rendered":"Flaw in Twitter form may have been abused by nation states"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Wed, 19 Dec 2018 16:00:00 +0000<\/strong><\/p>\n<p>Twitter\u00a0<a href=\"https:\/\/help.twitter.com\/en\/support-form\" target=\"_blank\" rel=\"noopener\">announced in a blog post<\/a>\u00a0on Monday that they discovered and addressed a security flaw on one of their support forms. The discovery was made on November 15 \u2014 more than a month ago \u2014 and was promptly fixed the next day. From the Twitter blog on this issue:<\/p>\n<blockquote>\n<p><em>We have become aware of an issue related to one of our support forms, which is used by account holders to contact Twitter about issues with their account. This could be used to discover the country code of people\u2019s phone numbers if they had one associated with their Twitter account, as well as whether or not their account had been locked by Twitter.<\/em><\/p>\n<\/blockquote>\n<p>They go on to add:<\/p>\n<blockquote>\n<p><em>Importantly, this issue did not expose full phone numbers or any other personal data. We have directly informed the people we identified as being affected. We are providing this broader notice as it is possible that other account holders we cannot identify were potentially impacted.<\/em><\/p>\n<\/blockquote>\n<h3>Country codes, take me home<\/h3>\n<p>While a country code isn\u2019t treated or considered by many as sensitive information, <a href=\"https:\/\/techcrunch.com\/2018\/12\/18\/twitter-warned-country-code-form-leak-bug-security-researcher\/\" target=\"_blank\" rel=\"noopener\">some warn<\/a>\u00a0that it is enough to clue in attackers on whether a registered mobile number (with country code) is associated with a Twitter account. This means that cybercriminals could find the true country locations of Twitter users. This could be dangerous for those in countries with freedom of speech\u2013related privacy concerns.<\/p>\n<p>Twitter is currently investigating the possibility that the flaw may have been abused by potential nation-state actors, <a href=\"https:\/\/help.twitter.com\/en\/support-form\" target=\"_blank\" rel=\"noopener\">particularly<\/a>\u00a0from IP addresses associated with Saudi Arabia and China.<\/p>\n<p>As if this weren&#8217;t enough of a headache for the social media giant, Peerzada Fawaz Ahmad Qureshi, an independent security researcher who goes by <a href=\"https:\/\/twitter.com\/zk34911\" target=\"_blank\" rel=\"noopener\">@Fawaz<\/a> on Twitter, <a href=\"https:\/\/twitter.com\/zk34911\/status\/1074968478690566145\" target=\"_blank\" rel=\"noopener\">has stepped forward<\/a>\u00a0to disclose that he had reported the flaw to Twitter via HackerOne, a <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/bug-bounty\/\" target=\"_blank\" rel=\"noopener\">bug bounty<\/a>\u00a0platform, more than two years ago. Twitter took no action, however, deeming the bug as non-critical before marking the report an \u201cinformative\u201d one.<\/p>\n<h3>Wait! That&#8217;s not all<\/h3>\n<p>This announcement comes hot on the heels of <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/cybercriminals-use-malicious-memes-that-communicate-with-malware\/\" target=\"_blank\" rel=\"noopener\">a Trend Micro report<\/a>\u00a0about malicious Twitter users abusing the social media platform to stealthily communicate with malware using\u00a0<a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/steganography\" target=\"_blank\" rel=\"noopener\">stenography<\/a>, the method of hiding messages in images. In this case, the malicious actors have hidden commands in memes found in every nook and cranny of Twitter\u2014hiding-in-plain-sight at its finest.<\/p>\n<p>This isn&#8217;t the first time Twitter has been used as a comms hub for malware. Back in 2009, a <a href=\"https:\/\/www.theregister.co.uk\/2010\/05\/13\/diy_twitter_botnets\/\" target=\"_blank\" rel=\"noopener\">DIY botnet kit<\/a> was discovered that brought social media\u2013controlled infection hijinks to the masses, allowing malware authors with rudimentary skills to use Twitter to send commands.<\/p>\n<h3>Stock, drop, and roll<\/h3>\n<p>Outside of bot action, the news of Twitter\u2019s investigation triggered <a href=\"https:\/\/www.scmagazineuk.com\/twitter-shares-plummet-potential-security-breach-notification\/article\/1521469\" target=\"_blank\" rel=\"noopener\">a dramatic drop<\/a>\u00a0in the company&#8217;s stock share prices. It promises to be a rollercoaster-ride ending to 2018 for those trying to keep both Twitter and its users safe from harm.<\/p>\n<p>If you use the social media platform and are worried about potential breach, Twitter&#8217;s advice is simply: do nothing. While these mishaps may have been close calls instead of direct hits, one hopes that in 2019, we&#8217;ll all be a little more proactive\u2014and a lot more reassured\u2014about using our favorite portals and communication channels safely.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/12\/flaw-in-twitter-form-may-have-been-abused-by-nation-states\/\">Flaw in Twitter form may have been abused by nation states<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/12\/flaw-in-twitter-form-may-have-been-abused-by-nation-states\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Wed, 19 Dec 2018 16:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/12\/flaw-in-twitter-form-may-have-been-abused-by-nation-states\/' title='Flaw in Twitter form may have been abused by nation states'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/shutterstock_456716245.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Twitter announced in a blog post\u00a0Monday that they discovered and addressed a security flaw in one of their support forms. The discovery was made on November 15\u2014more than a month ago\u2014and promptly fixed the next day. So why are we only hearing about it now?<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/privacy\/\" rel=\"category tag\">Privacy<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/botnet\/\" rel=\"tag\">botnet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/bug-bounty\/\" rel=\"tag\">bug bounty<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/china\/\" rel=\"tag\">china<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/diy\/\" rel=\"tag\">DIY<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/diy-botnet-kit\/\" rel=\"tag\">DIY botnet kit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/saudi-arabia\/\" rel=\"tag\">saudi arabia<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/stenography\/\" rel=\"tag\">stenography<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/support\/\" rel=\"tag\">support<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/twitter\/\" rel=\"tag\">twitter<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/twitter-form\/\" rel=\"tag\">Twitter form<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/12\/flaw-in-twitter-form-may-have-been-abused-by-nation-states\/' title='Flaw in Twitter form may have been abused by nation states'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/12\/flaw-in-twitter-form-may-have-been-abused-by-nation-states\/\">Flaw in Twitter form may have been abused by nation states<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10410,11512,402,4503,2162,20496,5897,11726,20497,10433,454,20498],"class_list":["post-14125","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-botnet","tag-bug-bounty","tag-china","tag-cybercrime","tag-diy","tag-diy-botnet-kit","tag-privacy","tag-saudi-arabia","tag-stenography","tag-support","tag-twitter","tag-twitter-form"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14125"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14125\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14125"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}