Feeds

Twitter phish pwned profiles push penis pills

As Facebook 'goldmembers' hoodwinked into costly SMS scam

Securing Web Applications Made Simple and Scalable

Twitter users were hit by potent phishing attacks over the weekend that have already led to spam runs from compromised accounts.

Miscreants posted messages disguised as humorous updates on the Twitter micro-blogging service as part of an ongoing attack that started on Saturday. The messages - which featured phrases such as "Lol. this is me??", "lol , this is funny." and "Lol. this you??" - included links to a counterfeit Twitter login page hosted in China, located under the domain BZPharma.net.

The micro-blogging site warned of the attack on Sunday. It advised anyone that had fallen for the ruse to change their passwords quickly, before hackers had a chance to alter login credentials to hijack compromised accounts.

The BZPharma.net domain prospective marks are directed towards is actually designed to harvest Twitter login details for later misuse in spam and identity theft-based attacks. Initially, the phishing lures appeared as direct messages on Twitter, but later dangerous links were posted in public feeds often via a service called GroupTweet, net security firm Sophos reports. GroupTweet coallows direct messages to be sent to multiple and, optionally, distributed more widely.

The miscreants behind the attacks have already begun spamvertising herbal Viagra from the compromised accounts, Sophos warns, adding that the BZPharma.net domain associated with the Twitter phish has previously been used against Bebo users.

Fools' gold

In other social networking insecurity developments, many Facebook users are getting hoodwinked into joining a bogus group in order to enjoy supposed benefits of a non-existent Gold account. The scam started as a prank on the notorious 4chan image board back in 2007, but has now taken on a life of its own. Scammers are using the supposed benefits of the fictitious group to hoodwink users into taking part in a survey that involves subscribing to text messaging services in order to get the results.

Scammers likely receive a cut of the profit as affiliates of these services. A blog posting by Rik Ferguson of Trend Micro explains: "The survey I tested linked (via a couple of affiliate marketing services) to a 'Werewolf vs Vampire' quiz which promised to tell me which I am, (surely I should know that already?) At the end of the ten questions I am invited to enter my mobile phone number to receive my results. If I do that I am agreeing to pay a £9.00 joining fee followed by £9.00 every week until I cancel my membership via SMS."

Ferguson, who told El Reg that the scam is targeted at UK mobile users, has passed on his findings to PhonePayPlus, the UK regulator of premium rate phone services. ®

Mobile application security vulnerability report

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.