Beware malicious festive tweets

SECURITY

|
Image: By BizTechAfrica
Beware malicious festive tweets

Global IT vendor Panda Security warns that cyber-criminals are exploiting Twitter to spread malware in festive-themed messages.

Using methods akin to Black Hat SEO techniques, hackers are taking advantage of trending topics to position malware distribution campaigns.

Topics such as “ Advent calendar” , “ Hanukkah” or even “ Grinch” , are among the most popular subjects used by hackers to entice users.

Panda says thousands of tweets have been launched using festive-themed phrases, such as “ Nobody cares about Hanukkah” or “ Shocking video of the Grinch” , along with short URLs pointing to malicious websites.

Users who click the link will be taken to a page that infects systems with false codecs by exploiting a security hole in PDF files and tries to trick users into downloading a codec that is really a downloader Trojan, which in turn downloads more malware onto the compromised computer.

In addition to subjects related to Christmas, cyber-criminals are using other hot topics to spread their creations, including the Sundance festival, the AIDS campaign and the Carling Cup.

According to Jeremy Matthews, head of Panda’ s sub-Saharan operations, “ Social networks like Facebook and Twitter are becoming increasingly popular with hackers because of their ever-increasing number of users, and the ease at which they (the hackers) can post malicious links. That’ s why the number of clicks, and therefore infections, tends to be very high.”

Keep your computer safe this Christmas

With the increased risk over the Christmas period, Panda offers users a series of practical security tips for using social media:

1) Don't click suspicious links from non-trusted sources. This should apply to messages received through Twitter, through other social networks and even via email.

2) If you click on the links, check the target page. If you don't recognize it, close your browser.

3) Even if you don't see anything strange in the target page, but you are asked to download something, don't accept.

4) If you do download or install an executable file and the PC starts to launch messages or behaves strangely, there is probably malware on your computer. In this case, you should check your computer with a free online scanner such as ActiveScan, available at: www.activescan.com

5) As a general rule, make sure your computer is well protected to ensure that you are not exposed to the risk of infection from any malicious code. You can protect yourself with the new, free Panda Cloud Antivirus solution (www.cloudantivirus.com).

“ It is important to remember that hackers will take advantage of any big holiday or event, which is why it is important to remain extra vigilant during these times” , concludes Matthews.

For more information about Panda, visit http://www.pandasecurity.com/



Share the News

Get Daily Newsletter

Search News

comments powered by Disqus

MORE SECURITY NEWS

Separating the attack that matters from the noise

It has almost become the norm for a business to be compromised by a security attack. The emphasis today is thus more on how a business responds to the attack, that is how have they prepared for the breach and how do they communicate it?  Read More

Enhancing your security posture to fight new ransomware threats

Petya ransomware is proving to be one of the top cybersecurity stories of 2016.  Read More

Arbor stops malware in its tracks

There is always a substantial amount of banking trojan activity taking place, however, recent developments have intensified the threat landscape.  Read More

Networks Unlimited certifies Fortinet partners in East Africa

Value-added distributor, Networks Unlimited is intensifying its footprint in East Africa, training its partners and customers in the region to become certified. Read More

Understanding the risk and cost of a DDoS attack

Thw Arbor Networks white paper, The business value of DDoS protections, says a continuing and growing threat to service availability is distributed denial of service (DDoS) attacks.  Read More

Addressing the threat of cyber-crime in the digital era

Globally-connected cyber-attacks require globally connected and seamlessly integrated cyber defences. Read More

DDoS attacks: An operational risk that should be included in enterprise risk assessments

Today’s enterprises are increasingly motivated to formalise their IT security and place it firmly within the context of their enterprise risk management and business continuity planning.  Read More

Arbor Networks report finds relentless threat environment

Arbor Networks Inc., the security division of NETSCOUT (NASDAQ: NTCT), has released its 11th Annual Worldwide Infrastructure Security Report (WISR) offering direct insights from the global operational security community on a comprehensive range of issues. Read More

No More Excuses – Time to Get a Grip on Your Cloud Security

Newfound optimism for the cloud inevitably means more critical and sensitive data is put into cloud services. And that means security is going to become a massive issue, says Intel.  Read More

RSA research reveals blind spots in threat detection

RSA, The Security Division of EMC, has released the results of a new Threat Detection Effectiveness Survey. Read More

PRESS OFFICES

Sage EnterpriseSAP AfricaTrust PayVMWareSamsung ElectronicsMitsumi DistributionPhoenix DistributionMTN BusinessSchneider ElectricMultichoiceMicrosoft 4AfrikaNetworks UnlimitedArbor Networks

FEATURED STORY

Government should encourage youths in ICT earlyGovernment should encourage youths in ICT early

Youths should be given more encouragement to develop their ICT skills, an 11-year-old app developer told Kokumo Goodie.

IN DEPTH

IBM Opens First Cloud Data Centre in South AfricaIBM Opens First Cloud Data Centre in South Africa

IBM is opening a new IBM Cloud Data Centre in Johannesburg, South Africa. The new cloud center is the result of a close collaboration with Gijima and Vodacom and is designed to support cloud adoption and customer demand across the continent.  

COMPANY NEWS

Resolving the data centre disconnect

The disconnect between virtualised applications and physical storage is costing businesses time and money.   

Separating the attack that matters from the noise

It has almost become the norm for a business to be compromised by a security attack. The emphasis today is thus more on how a business responds ...

MTN Business partners SMEasy to give entrepreneurs access to easy accounting solutions

MTN Business, in partnership with online accounting tool SMEasy, today announced the launch of an agile, fit for purpose business management and easy accounting solution for small ...