Twitter Phishing Scam with Blogspot – Post Mortem
What are our lessons learned so far from this little Twitter Phishing Scam?
First of all, this involved infecting a single or single groups of people.
Distribution consisted of Infect a person by sending them to a site to capture their credentials. Once those usernames and passwords were collected, they would then use those compromised credentials to send this same message (via DM) to their followers, and continue the spread.
If Joe has 10 followers and DM’s it to those 10, and those 10 have 10 followers and DM it to the next 10, shortly you’d have thousands who are redistributing this – So long as they’ve visited the site and entered their credentials to be captured.
I see a lot of anger “I’m going to get person ‘x’ who sent me this message!”
It’s not the fault of the sender, not entirely. They were compromised by a phishing scam, it happens, you should work towards educating them instead of castrating them. So next time it will be part of their sense to not transmit their username/password to an untrusted site.
How could this terrible thing have happened? Now I hate (BlogSpot, Twitter, Followers)
Don’t hate the player, just be glad that it WAS done this way (a semi-safe site with only a small portion of cookies which get added to your browser) Here is what could have happened if it were introduced in an effective ‘distribution manner’.
You visit the site, you are prompted for credentials. Perhaps you’re prompted for credentials, though the better payload would be in the form of Malware, Spyware, Phishing-ware, Password capturers, and a number of other infection mechanisms.
Once this would be done, you’d be able to compromised on a number of fronts and able to distribute this to millions instead of just the few followers you have – Infecting Facebook, your banking account, etc so on and so forth.
What can I do about this in the future?
The universal rule of communication, especially unsolicited is ask yourself a few questions. Would you visit this link if you were having a conversation with the person? Having established rapport with them while talking? Yes likely.
However the tip here is – Random “auto-dm’s” does not guarantee a reason to visit their link. Yes a lot of people DO send out auto-DM’s, to the bane of all of us (SocialToo/ChrisBrogan– Thanks for helping limit that exposure!) However, don’t bane all communication in the future. If you think someone seriously DID write a funny blogpost about you because the person knows you, definitely do check it out! But in all seriousness, if you’ve not had some kind of established communication with this person to justify it, and let alone it brings you to not a funny blogpost, but to a fake twitter login page – Be sure to question it and use your common sense here.
Oh, and be wary of ever entering your credentials – again unless you explicitly trust the source.
Hopefully this Post-Mortem helps you deal with this situation, I’m still waiting for my self-infected account to start tweeting out to me (Controlled infection) For every problem there will be people looking to exploit it, and others trying to solve and contain it. I’ll be there trying to find new solutions and rid the world of future exposure as well :)
Good luck, and feel free to follow me if you like :) @cxi
New version of Twitter Phishing Scam with access-logins | Christopher Kusek, Technology Evangelist
[…] Twitter Phishing Scam with Blogspot – Post Mortem […]