Feeds

Twitter typosquatting site preys on gullible

Well, duh

Choosing a cloud hosting partner with confidence

Miscreants have launched an aggressive phishing attack that aims to dupe the unwary into handing over their login credentials for the microblogging service.

Dubious accounts are being used to seed the tvviter.com phishing campaign, which starts when followers of a targeted subscriber post a message in the form "check this guy out [followed by a tinyurl address]".

Twits who follow this link will find themselves at Twitter phishing site tvviter.com (registered last week), where they are invited to hand over their login credentials.

The name of the site has been carefully chosen so that at first glance it looks like the real Twitter.com site. The bogus site also copies the look and feel of the real site.

Another possible Twitter phishing site - www. tweet.ro - has also come online within recent days, Mikko Hypponen of F-secure adds. Users are also advised to avoid entering their username and password there.

A video of the Twitter phishing attack in action, created by Graham Cluley of Sophos, can be found here. More background on the attack can be found in a blog posting by Rik Ferguson of Trend Micro here, which explains that the scam is apparently aimed at making a fast buck through referrals to pornographic websites.

"If anyone is duped into handing over their account credentials, in addition to opening up their account to abuse, they will find that several new followers appear on their account," Ferguson writes. "On following links to these profiles, their immediate purpose appears to be to redirect to adult dating sites, making the scammers money in the process through a pay-per-click affiliate scheme." ®

Intelligent flash storage arrays

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Managing SSL certificates with ease
The lack of operational efficiencies and compliance pitfalls associated with poor SSL certificate management, and how the right SSL certificate management tool can help.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.