Beware malicious festive tweets
SECURITY| Dec. 7, 2010, 10:45 a.m.
Global IT vendor Panda Security warns that cyber-criminals are exploiting Twitter to spread malware in festive-themed messages.
Using methods akin to Black Hat SEO techniques, hackers are taking advantage of trending topics to position malware distribution campaigns.
Topics such as “
or even “
, are among the most popular subjects used by hackers to entice users.
Panda says thousands of tweets have been launched using festive-themed phrases, such as “ Nobody cares about Hanukkah” or “ Shocking video of the Grinch” , along with short URLs pointing to malicious websites.
Users who click the link will be taken to a page that infects systems with false codecs by exploiting a security hole in PDF files and tries to trick users into downloading a codec that is really a downloader Trojan, which in turn downloads more malware onto the compromised computer.
In addition to subjects related to Christmas, cyber-criminals are using other hot topics to spread their creations, including the Sundance festival, the AIDS campaign and the Carling Cup.
According to Jeremy Matthews, head of Panda’ s sub-Saharan operations, “ Social networks like Facebook and Twitter are becoming increasingly popular with hackers because of their ever-increasing number of users, and the ease at which they (the hackers) can post malicious links. That’ s why the number of clicks, and therefore infections, tends to be very high.”
Keep your computer safe this Christmas
With the increased risk over the Christmas period, Panda offers users a series of practical security tips for using social media:
1) Don't click suspicious links from non-trusted sources. This should apply to messages received through Twitter, through other social networks and even via email.
2) If you click on the links, check the target page. If you don't recognize it, close your browser.
3) Even if you don't see anything strange in the target page, but you are asked to download something, don't accept.
4) If you do download or install an executable file and the PC starts to launch messages or behaves strangely, there is probably malware on your computer. In this case, you should check your computer with a free online scanner such as ActiveScan, available at: www.activescan.com
5) As a general rule, make sure your computer is well protected to ensure that you are not exposed to the risk of infection from any malicious code. You can protect yourself with the new, free Panda Cloud Antivirus solution (www.cloudantivirus.com).
“ It is important to remember that hackers will take advantage of any big holiday or event, which is why it is important to remain extra vigilant during these times” , concludes Matthews.
For more information about Panda, visit http://www.pandasecurity.com/
MORE SECURITY NEWS
The sum of details at hand equals the quality of a cyber threat investigationJust like any detective investigating a crime scene, security analysts need to be able to access all the information pertaining to any threat incident they are investigating. Read More
ATM/card-related frauds rise 11.95%Fraud cases perpetrated through the use of automated teller machine (ATM) and other card payment system has risen 11.95% over last year’s cases, according to the Nigeria Deposit Insurance Corporation (NDIC) annual report. Read More
Identity thieves target used hard drivesCompanies need to take measures to wipe the hard drives of obsolete technology before selling or donating it, warns Xperien. Read More
Cybercrime in South Africa: The battlefield has shiftedAlthough the majority of South African businesses are investing in their security infrastructure, many are doing so in the wrong places. Read More
RSA acknowledged by Frost & Sullivan for excellence and innovation in its network security forensicsRSA, The Security Division of EMC, has been determined by Frost & Sullivan as winner of the 2016 Global Frost & Sullivan Enabling Technology Leadership Award in Network Forensics for RSA Security Analytics. Read More
Top targets for cyber attacks in East AfricaGovernments are East Africa’s top target sector for cyber attacks, followed by telecoms and financial services, says a report by Control Risks. Read More
Connecting the dots: respond-to-alerts based security posture will not protectAccording to an Arbor paper, “Connecting the Dots in Enterprise Security”, advanced threats target a specific company, are designed to bypass traditional controls, and comprise a planned and orchestrated set of attack activities. Read More
DNS attacks on the increase, concern for SA firmsSouth African organisations will likely see an increase in the volume and severity of network attacks over the coming years, says Arbor Networks. Read More
RSA: 75 percent of organisations at significant risk of cyber incidentsRSA, The Security Division of EMC, has released data demonstrating that organisations that invest in detection and response technologies, rather than perimeter-based solutions, are better poised to defend against cyber incidents. Read More
FEATURED STORYGovernment should encourage youths in ICT early
Youths should be given more encouragement to develop their ICT skills, an 11-year-old app developer told Kokumo Goodie.
BEST READ NEWS
IN DEPTHIBM Opens First Cloud Data Centre in South Africa
IBM is opening a new IBM Cloud Data Centre in Johannesburg, South Africa. The new cloud center is the result of a close collaboration with Gijima and Vodacom and is designed to support cloud adoption and customer demand across the continent.
COMPANY NEWSTigo, JI and GES equip teachers on child online protection initiative
Tigo, in partnership with J Initiative (JI), a youth focused non-governmental organisation in Ghana, have committed to protecting children online through policy advocacy, awareness creation, public education ...