{"id":5906,"date":"2017-01-19T11:10:02","date_gmt":"2017-01-19T19:10:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/19\/news-88\/"},"modified":"2017-01-19T11:10:02","modified_gmt":"2017-01-19T19:10:02","slug":"news-88","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/19\/news-88\/","title":{"rendered":"Verified Twitter accounts compromised, get busy spamming"},"content":{"rendered":"<p>Verified Twitter accounts tend to be a little more secure than those belonging to non-verified users due to the amount of extra hoop jumping required to get one of those ticks in the first place. A number of security requirements, including providing a phone number and setting up 2FA, are all things a would-be verified Twitter user needs to do.<\/p>\n<p>In theory, it should be somewhat tricky to compromise those accounts &#8211; it wouldn&#8217;t really help Twitter if their theoretically appealing verified accounts were firing out Viagra spam all day long. Brand reputation and all that.<\/p>\n<p>And yet&#8230;in the space of a few hours last week, we had multiple verified users hitting the &#8220;I&#8217;ve been compromised&#8221; wall of doom and gloom.<\/p>\n<p>Denise Crosby of Star Trek: TNG fame (Tasha Yar, anyone?) found her account\u00a0pushing porno dating links:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/verifhack2.jpg\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-16008\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/verifhack2-300x243.jpg\" alt=\"Compromised account\" width=\"300\" height=\"243\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/verifhack2-300x243.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/verifhack2-600x486.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/verifhack2.jpg 674w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>The same fate befell\u00a0Jennifer Kaytin (creator of MTV show Sweet \/ Dangerous), sending eager clickers to a Tumblr redirect leading to dating spam:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/verifhack1.jpg\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-16010\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/verifhack1-300x129.jpg\" alt=\"Another compromised account\" width=\"300\" height=\"129\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/verifhack1-300x129.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/verifhack1-600x258.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/verifhack1-195x85.jpg 195w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/verifhack1.jpg 938w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Elsewhere, Alex Jones &#8211; a well known BBC presenter &#8211; found herself offering up discount Ray Ban sunglasses:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/verifhack3.jpg\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-16011\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/verifhack3-287x300.jpg\" alt=\"Yet another compromised account\" width=\"287\" height=\"300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/verifhack3-287x300.jpg 287w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/verifhack3-574x600.jpg 574w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/verifhack3.jpg 894w\" sizes=\"auto, (max-width: 287px) 100vw, 287px\" \/><\/a><\/p>\n<p>We&#8217;ve seen a fair bit of Ray Ban spam circulating on Twitter recently, primarily on non-verified accounts.<\/p>\n<p>These rogue tweets were, in theory,\u00a0being sent to a combined audience of around 200,000+ people which could have been disastrous\u00a0if the links had contained\u00a0malicious files. Thankfully, these links were\u00a0&#8220;just&#8221; porn spam and sunglasses, but the danger for something much worse is always present where a compromise is concerned. People trust the verified ticks in the same way they probably let their guard down around <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2016\/10\/promoted-tweet-leads-to-credit-card-phishing\/\" target=\"_blank\">sponsored tweets<\/a>, and in both cases a little trust can be a bad thing.<\/p>\n<p>As mentioned earlier, it <em>should<\/em> be very difficult to grab one of these accounts but the hits just keep coming regardless. I could be wrong on this, but once the two factor SMS is setup on a verified account, you can&#8217;t disable it without risking your verified status &#8211; so one would suspect a possible rogue app in the above cases as a potential hole in the digital armour.<\/p>\n<p>However the scammers are doing it, always pay attention when your favorites start firing out URLs. Links are meant to be clicked, but that doesn&#8217;t mean we have to leap before looking &#8211; Twitter works best with shortened URLs, but you can usually <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2015\/09\/obfuscated-urls-where-is-that-link-taking-you\/\" target=\"_blank\">see where they lead<\/a>.<\/p>\n<p>Whether you&#8217;re verified or not, keep your wits about you and have a hopefully stress free experience on that most popular of social networks.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Christopher Boyd<\/em><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/01\/verified-twitter-accounts-compromised-get-busy-spamming\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/01\/verified-twitter-accounts-compromised-get-busy-spamming\/' title='Verified Twitter accounts compromised, get busy spamming'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2015\/08\/photodune-8394819-three-friends-shocked-at-the-message-on-the-phone-s.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Verified Twitter accounts tend to be a little more secure than those belonging to non-verified users due to the amount of extra hoop jumping required to get one of those ticks in the first place. A number of security requirements, including providing a phone number and setting up 2FA, are all things a would-be verified Twitter user needs to do. Unfortunately, things can still go wrong&#8230;<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/social-engineering-cybercrime\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/social-media\/\" rel=\"tag\">social media<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spam\/\" rel=\"tag\">spam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/sponsored-tweets\/\" rel=\"tag\">sponsored tweets<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/twitter\/\" rel=\"tag\">twitter<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/verified\/\" rel=\"tag\">verified<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/verified-twitter\/\" rel=\"tag\">Verified Twitter<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/01\/verified-twitter-accounts-compromised-get-busy-spamming\/' title='Verified Twitter accounts compromised, get busy spamming'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[4503,10510,1932,10518,10590,454,10591,10592],"class_list":["post-5906","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cybercrime","tag-social-engineering","tag-social-media","tag-spam","tag-sponsored-tweets","tag-twitter","tag-verified","tag-verified-twitter"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/5906","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=5906"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/5906\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=5906"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=5906"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=5906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}