When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Twitter used as a hacking tool

Mysterious accounts seem to be appearing all over the popular Twitter micro-blogging website. The suspicious accounts appear to be posting complete gibberish, when in reality are posting executable commands that are downloading malware to victims computers.

Hackers have always longed to find new ways to hide their tracks and make attacks harder to see coming, but now hackers have turned to Twitter to become the host of a series of attacks against users. Hackers have managed to form a botnet using Twitter as a way to control compromised PCs.

The compromised computers could potentially launch DoS (denial of service) attacks – something Twitter has been hit by multiple times over the last few months – or spread spam to other users, turning the victim into a botnet as well.

Twitter is now reviewing the suspected accounts and suspending suspicious activity from happening, but since the shutdowns, more command-line accounts are being registered, popping up all over the website. These accounts could possibly be the very same ones that turn computers into slaves, attacking the very site that affected them.

Report a problem with article
Next Article

Sins of a Solar Empire: Diplomacy Micro-Expansion Announced

Previous Article

Apple store Genius finds child pornography on a Power Mac G5

Join the conversation!

Login or Sign Up to read and post a comment.

36 Comments - Add comment