{"id":8354,"date":"2017-07-16T07:19:00","date_gmt":"2017-07-16T15:19:00","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/07\/16\/news-2128\/"},"modified":"2017-07-16T07:19:00","modified_gmt":"2017-07-16T15:19:00","slug":"news-2128","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/07\/16\/news-2128\/","title":{"rendered":"Porn Spam Botnet Has Evil Twitter Twin"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Sun, 16 Jul 2017 12:11:35 +0000<\/strong><\/p>\n<p>Last month KrebsOnSecurity published research into a large distributed network of apparently compromised systems being used to relay huge blasts of junk email promoting &#8220;online dating&#8221; programs &#8212; affiliate-driven schemes traditionally overrun with automated accounts posing as women. New research suggests that another bot-promoting botnet of more than 80,000 automated female Twitter accounts has been pimping the same dating scheme and ginning up millions of clicks from <strong>Twitter<\/strong> users in the process.<\/p>\n<div id=\"attachment_39931\" style=\"width: 297px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-39931\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/07\/jillvaughn.png\" alt=\"One of the 80,000+ Twitter bots ZeroFOX found that were enticing male Twitter users into viewing their profile pages.\" width=\"267\" height=\"425\" \/><\/p>\n<p class=\"wp-caption-text\">One of the 80,000+ Twitter bots ZeroFOX found that were enticing male Twitter users into viewing their profile pages.<\/p>\n<\/div>\n<p>Not long after I published <a href=\"https:\/\/krebsonsecurity.com\/2017\/06\/inside-a-porn-pimping-spam-botnet\/\" target=\"_blank\">Inside a Porn-Pimping Spam Botnet<\/a>, I heard from researchers at <strong>ZeroFOX<\/strong>, a\u00a0security firm that helps companies block attacks coming through social media.<\/p>\n<p><strong>Zack Allen<\/strong>, manager of threat operations at ZeroFOX, said he had a look at some of the spammy, adult-themed domains being promoted by the botnet in my research and found they were all being promoted through a botnet of bogus Twitter accounts.<\/p>\n<p>Those phony Twitter accounts all featured images of attractive or scantily-clad women, and all were being promoted via suggestive tweets, Allen said.<\/p>\n<p>Anyone who replied was ultimately referred to subscription-based online dating sites run by <strong>Deniro Marketing<\/strong>, a company based in California. This was the same company that was found to be the beneficiary of spam from <a href=\"https:\/\/krebsonsecurity.com\/2017\/06\/inside-a-porn-pimping-spam-botnet\/\" target=\"_blank\">the porn botnet I&#8217;d written about in June<\/a>. Deniro did not respond to requests for comment.<\/p>\n<p>&#8220;We&#8217;ve been tracking this thing since February 2017, and\u00a0we concluded that the social botnet controllers are probably not part of Deniro Marketing, but most likely are\u00a0affiliates,&#8221; Allen said.<\/p>\n<p>ZeroFOX found more than 86,262 Twitter accounts were responsible for more than 8.6 million posts on Twitter promoting porn-based sites, many of them promoting domains in a swath of Internet address space owned by Deniro Marketing (<a href=\"https:\/\/bgpview.io\/asn\/19884#prefixes-v4\" target=\"_blank\">ASN19984<\/a>).<\/p>\n<p>Allen said 97.4% of bot display names had the pattern \u201cFirstname Surname\u201d with the first letters of each name capitalized, and each name separated by a single whitespace character that corresponded to common female names.<\/p>\n<div id=\"attachment_39934\" style=\"width: 590px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-39934\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/07\/botnames-580x466.png\" alt=\"An analysis of the Twitter bot names used in the scheme. Graphic: ZeroFOX.\" width=\"580\" height=\"466\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/07\/botnames-580x466.png 580w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/07\/botnames.png 765w\" sizes=\"auto, (max-width: 580px) 100vw, 580px\" \/><\/p>\n<p class=\"wp-caption-text\">An analysis of the Twitter bot names used in the scheme. Graphic: ZeroFOX.<\/p>\n<\/div>\n<p>The accounts advertise adult content by routinely injecting links from their twitter profiles to a popular hashtag, or by @-mentioning a popular user or influencer on Twitter. Those profile links are shortened with Google&#8217;s <strong>goo.gl<\/strong> link shortening service, which then redirects to a free hosting domain in the <strong>dot-tk (.tk)<\/strong> domain space (.tk is the country code for Tokelau &#8212; a group of atolls in the South Pacific).<\/p>\n<p>From there the system is smart enough to redirect users back to Twitter if they appear to be part of any automated attempt to crawl the links (e.g. by using site download and mirroring tools like <a href=\"https:\/\/en.wikipedia.org\/wiki\/CURL\" target=\"_blank\">cURL<\/a>), the researchers found. They said this was likely a precaution on the part of the spammers to avoid detection by automated scanners looking for bot activity on Twitter. Requests from visitors who look like real users responding to tweets are redirected to the porn spam sites.<\/p>\n<p>Because the links promoted by those spammy Twitter accounts all abused short link services from Twitter and Google, the researchers were\u00a0able to\u00a0see that this entire botnet has generated more than 30 million unique clicks from February to June 2017.<span id=\"more-39919\"><\/span><\/p>\n<p>[SIDE NOTE: Anyone seeking more context about what&#8217;s being promoted here can\u00a0check out the Web site datinggold[dot]com [Caution: Not-Safe-for-Work], which suggests it&#8217;s an affiliate program that rewards marketers who drive new signups to its array of &#8220;online dating&#8221; offerings &#8212; mostly &#8220;cheating,&#8221; &#8220;hookup&#8221; and &#8220;affair-themed&#8221; sites like &#8220;AdsforSex,&#8221; &#8220;Affair Hookups,&#8221; and &#8220;LocalCheaters.&#8221; Note that this program is only interested in male signups.]<\/p>\n<div id=\"attachment_39930\" style=\"width: 590px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-39930\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/07\/dg-580x326.png\" alt=\"The datinggold affiliate site which pays spammers to bring male signups to &quot;online dating&quot; services.\" width=\"580\" height=\"326\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/07\/dg-580x326.png 580w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/07\/dg-768x432.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/07\/dg-940x529.png 940w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/07\/dg.png 1089w\" sizes=\"auto, (max-width: 580px) 100vw, 580px\" \/><\/p>\n<p class=\"wp-caption-text\">The datinggold affiliate site which pays spammers to bring male signups to &#8220;online dating&#8221; services.<\/p>\n<\/div>\n<p>Allen said the Twitter botnet relies heavily on accounts that have been &#8220;aged&#8221; for a period of time as another method to evade anti-spam techniques used by Twitter, which may treat tweets from new accounts with more prejudice than those from established accounts. ZeroFOX said about 20 percent of the Twitter accounts identified as part of the botnet were aged at least one year before sending their first tweet, and that the botnet overall demonstrates that these affiliate programs have remained lucrative by evolving to harness social media.<\/p>\n<p>&#8220;The final redirect sites encourage the user to sign up for subscription pornography, webcam sites, or fake dating,&#8221; ZeroFOX wrote in a report being issued this week. &#8220;These types of sites, although legal, are known to be scams.&#8221;<\/p>\n<p>Perhaps the most well-known example of the subscription-based dating\/cheating service that turned out to be mostly phony was <strong>AshleyMadison<\/strong>. After AshleyMadison&#8217;s user\u00a0<a href=\"https:\/\/krebsonsecurity.com\/2015\/07\/online-cheating-site-ashleymadison-hacked\/\" target=\"_blank\">databases were plundered and published online<\/a>, the <a href=\"https:\/\/arstechnica.com\/tech-policy\/2016\/07\/ashley-madison-admits-using-fembots-to-lure-men-into-spending-money\/\" target=\"_blank\">company admitted that its service used at least 70,000 female chatbots<\/a> that were programmed to message\u00a0new users and try to entice them into replying &#8212; which required a paid account.<\/p>\n<p>&#8220;Many of the sites&#8217; policies claim that the site owners operate most of the profiles,&#8221; ZeroFOX charged. &#8220;They also have overbearing policies that can use personally information of their customers to send to other affiliate programs, yielding more spam to the victim. Much like the infamous \u2018<a href=\"https:\/\/krebsonsecurity.com\/2010\/11\/pursuing-koobface-and-partnerka\/\" target=\"_blank\">partnerka\u2019<\/a> networks from the <a href=\"https:\/\/krebsonsecurity.com\/?s=russian+business+network&amp;x=0&amp;y=0\" target=\"_blank\">Russian Business Network<\/a>, money is paid out via clicks and signups on affiliate programs&#8221; [links added].<\/p>\n<p>Although the Twitter botnet discovered by ZeroFOX has since been dismantled, it not hard to see how this same approach could be very effective at spreading malware. Keep your wits about you while using or cruising social media sites, and be wary of any posts or profiles that match the descriptions and behavior of the bot accounts described here.<\/p>\n<p>For more on this research, see ZeroFOX&#8217;s blog post <a href=\"http:\/\/www.zerofox.com\/blog\/inside-massive-siren-social-network-spam-botnet\" target=\"_blank\">Inside a Massive Siren Social Network Spam Botnet<\/a>.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2017\/07\/porn-spam-botnet-has-evil-twitter-twin\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/07\/jillvaughn.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Sun, 16 Jul 2017 12:11:35 +0000<\/strong><\/p>\n<p>Last month KrebsOnSecurity published research into a large distributed network of apparently compromised systems being used to relay huge blasts of junk email promoting &#8220;online dating&#8221; programs &#8212; affiliate-driven schemes traditionally overrun with automated accounts posing as women. New research suggests that another bot-promoting botnet of more than 80,000 automated female Twitter accounts has been pimping the same dating scheme and ginning up millions of clicks from Twitter users in the process.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[13037,13038,13039,12648,1670,10644,13040,13041,13042,454,13043,13044],"class_list":["post-8354","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-tk","tag-ashleymadison","tag-asn19984","tag-deniro-marketing","tag-google","tag-other","tag-partnerka","tag-russian-business-network","tag-tokelau","tag-twitter","tag-twitter-botnet","tag-zerofox"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8354","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8354"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8354\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8354"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8354"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}