Beware malicious festive tweets
SECURITYBy BiztechAfrica - Dec. 7, 2010, 10:45 a.m.
Global IT vendor Panda Security warns that cyber-criminals are exploiting Twitter to spread malware in festive-themed messages.
Using methods akin to Black Hat SEO techniques, hackers are taking advantage of trending topics to position malware distribution campaigns.
Topics such as “
or even “
, are among the most popular subjects used by hackers to entice users.
Panda says thousands of tweets have been launched using festive-themed phrases, such as “ Nobody cares about Hanukkah” or “ Shocking video of the Grinch” , along with short URLs pointing to malicious websites.
Users who click the link will be taken to a page that infects systems with false codecs by exploiting a security hole in PDF files and tries to trick users into downloading a codec that is really a downloader Trojan, which in turn downloads more malware onto the compromised computer.
In addition to subjects related to Christmas, cyber-criminals are using other hot topics to spread their creations, including the Sundance festival, the AIDS campaign and the Carling Cup.
According to Jeremy Matthews, head of Panda’ s sub-Saharan operations, “ Social networks like Facebook and Twitter are becoming increasingly popular with hackers because of their ever-increasing number of users, and the ease at which they (the hackers) can post malicious links. That’ s why the number of clicks, and therefore infections, tends to be very high.”
Keep your computer safe this Christmas
With the increased risk over the Christmas period, Panda offers users a series of practical security tips for using social media:
1) Don't click suspicious links from non-trusted sources. This should apply to messages received through Twitter, through other social networks and even via email.
2) If you click on the links, check the target page. If you don't recognize it, close your browser.
3) Even if you don't see anything strange in the target page, but you are asked to download something, don't accept.
4) If you do download or install an executable file and the PC starts to launch messages or behaves strangely, there is probably malware on your computer. In this case, you should check your computer with a free online scanner such as ActiveScan, available at: www.activescan.com
5) As a general rule, make sure your computer is well protected to ensure that you are not exposed to the risk of infection from any malicious code. You can protect yourself with the new, free Panda Cloud Antivirus solution (www.cloudantivirus.com).
“ It is important to remember that hackers will take advantage of any big holiday or event, which is why it is important to remain extra vigilant during these times” , concludes Matthews.
For more information about Panda, visit http://www.pandasecurity.com/
MORE SECURITY NEWS
2014 Banking and ICT summits pegged for Uganda, Zambia and EthiopiaCyber Security Africa has announced that its 2014 Banking and ICT summits will be hosted in Uganda, Zambia and Ethiopia. Read More
Security in 2014: Money and MayhemIT security stands at the frontier of a fight for wealth and information, says Andrew Kirkland, Regional Director Africa, Trustwave. Read More
McAfee delivers on Intel vision of free mobile securityMcAfee has announced details of free protection for consumers on any Android and iOS mobile device. Read More
Botswana financial institutions exposed to cyber crimeBotswana’s financial institutions face a growing risk of cyber fraud, says BIC MD Dziki Nganunu. Read More
New Android threat risesThe AndroRAT is an example of how cyber criminals can manipulate apps for their own gain, says Intact Security. Read More
Arbor Networks partners with Networks Unlimited in SSAArbor Networks has announced a new partnership with Networks Unlimited to help organisations better mitigate and defend against the growing DDoS threat to their customers’ businesses. Read More
Trend Micro’s 2013 threat roundup highlights private data profitabilityAccording to Trend Micro Incorporated’s 2013 annual threat roundup report, “security breaches, cyber criminals, and organised attacks made it nearly impossible to keep personal and financial data private. Read More
Hardcore goons use mobiles to scare, extort KenyansHardcore criminals in prison are reported to be using mobile phones to extort money and scare Kenyan civilians. Read More
Phone scammers back in businessMicrosoft has warned of scam artists who defraud PC users by pretending to work for Microsoft. Read More
ADT, McAfee study finds parallels between physical, digital securityMcAfee has released the results of a survey that takes a look at the important parallels between personal and online security. Read More
FEATURED STORYMACRA demystifies spectrum management
Malawi's regulator explains the issues around spectrum allocation. Gregory Gondwe reports.
BEST READ NEWS
IN DEPTHYouthConnekt launches Mobile Apps for Human Development Challenge in Rwanda
Rwanda’s Ministry of Youth and ICT and the UNDP, in close collaboration with Motorola Solutions, will power a Mobile App Challenge that will be implemented by YouthConnekt.