Feeds

Viagra spam shop live on Twitter for a month

Repeated complaints lead to no action

Reducing security risks from open source software

Canadian Pharmacy spammers have set up shop on Twitter, staying online for weeks despite complaints from a leading security firm that would normally prompt action.

The micro-blogging account @canadianshop features nothing beyond links to unlicensed sites selling Viagra and other prescription medicines - just the sort of thing that would normally bring down a ban-hammer in short order. Yet despite repeated complaints by IT security firm Sophos for more than a week nothing has been done.

The account has been live on Twitter for the last month. In contrast to the site's prolonged inaction, URL shortening service bit.ly has blocked most (though not all) of @canadianshop's custom links. "When bit.ly shuts one down, the bad guys can just create another one," a Sophos spokesman explained.

Many accounts on Twitter push out spamvertised links but @canadianshop is unusually obvious about it. "It has Canadian pharmacy wallpaper and explicit tweets saying what it's selling," the spokesman said.

"This isn't someone linking to something that pretends to be saucy content and then takes you to an online drugs store. Nor is it accounts that have been hacked and are spamming out pharma links. This is blatant promotion of pharmacy sites that are normally advertised via email spam, in order to sell Viagra et al." ®

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Microsoft: You NEED bad passwords and should re-use them a lot
Dirty QWERTY a perfect P@ssword1 for garbage websites
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.