ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: New Mobile Malware Spreads via Twitter and Takes Over Your Phone

Alert: New Mobile Malware Spreads via Twitter and Takes Over Your Phone

There are countless threats out there that can mean danger for your business, but one of the most innovative to date utilizes a malicious Twitter account to administer commands to a botnet made up of infected Android devices. In fact, this is widely considered the first threat to actively use a social network in this manner, making it a wake-up call for security professionals and social media users alike.

The app, called Twitoor, is a Trojan that hides on the device and constantly receives commands from its Twitter account. This could include downloading and installing malicious applications, stealing data, or switching to an alternative command-and-control Twitter account. Additionally, you cannot find Twitoor on the Google Play store. If you’re going to download it, you would have to click on a malicious link.

Botnets are commonly used by cyber criminals to spread malware across multiple devices. The idea is to spread their influence as far as possible by creating “zombie-bots” which can be enslaved and commanded to perform roles which one computer could not. Yet, a normal botnet leaves signs that can be used to detect where it’s getting its commands from. Security professionals are often able to find the source of the botnet and shut down the server administering the commands, but with Twitoor, this isn’t so simple.

Due to the fact that the Twitoor-infected systems are receiving information from an ever-shifting Twitter account, it’s able to largely avoid detection. ZDNet explains: “Those behind the malware have also taken additional steps to safeguard Twitoor, including encrypting messages to further obfuscate their activities.” This combination of tactics makes it much more difficult to detect and destroy at its roots, even for security professionals.

Thanks to criminals changing their ways in order to innovate and discover new ways to take advantage of tried-and-true hacking practices, you always need to be wary of malware infections and other online threats. You can never be too careful. We recommend that you contact ClearView IT, especially if you feel that your organization’s network security--including mobile devices--isn’t quite up to snuff.

In particular, we have a mobile device management solution that can help you keep a handle on your organization’s mobile devices. You can secure your devices through whitelisting and blacklisting apps, limiting access to crucial data, and remotely wiping infected systems so that the data found on them cannot be used or sold by hackers. The idea is to take measures to prevent infections in the first place, and promptly respond to infections that do find their way onto the devices.

To learn more about our mobile device management solutions, reach out to us at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Ransomware Data Backup Smartphone communications Smartphones Small Business Upgrade Microsoft Office Network Mobile Devices Managed IT Services Data Recovery Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Business Continuity Facebook Windows 10 Covid-19 Passwords Holiday Disaster Recovery Apps Windows 10 IT Support Browser Managed Service Cloud Computing Outsourced IT Miscellaneous Internet of Things Remote Work Managed Service Provider Data Management Government Saving Money Operating System Networking Workplace Strategy Windows Artificial Intelligence Gadgets Managed IT services Bandwidth Encryption Mobile Device Management Information Remote WiFi Business Technology App Virtualization Spam Server Blockchain Budget Gmail Employee/Employer Relationship Apple Office Information Technology Two-factor Authentication Office 365 History Wi-Fi Health Cybercrime Conferencing BDR Analytics Big Data Access Control Data Security Compliance Remote Monitoring Remote Computing Cost Management IT Management Help Desk Vendor Hacking Training Document Management Voice over Internet Protocol Hacker Save Money Patch Management Employer-Employee Relationship Firewall Retail Data loss Alert Augmented Reality Project Management BYOD Word Hiring/Firing Outlook IBM Computing Website Vendor Management Password Hard Drive Applications Vulnerabilities Legal Data storage Mobile Office Search... Money Best Practice Managed Services Customer Service Unified Threat Management Antivirus Black Market How To Cleaning Maintenance iPhone Robot Education Cortana User Content Filtering Websites Meetings Data Breach Mobility Router Chrome Twitter Google Maps The Internet of Things YouTube Scam Windows 11 Law Enforcement End of Support Printer Monitoring Mobile Computing Laptop VPN Healthcare Marketing Update Remote Workers Running Cable Windows 7 Free Resource Travel Virtual Reality Storage Sports Social Engineering Social Cryptocurrency Paperless Office SaaS DDoS Excel Solutions Physical Security Disaster Integration Politics Images 101 HIPAA Display Machine Learning Settings Virtual Assistant Lithium-ion battery Start Menu Computer Care Solid State Drive Downloads Employees Avoiding Downtime Vulnerability Processors Chromebook Software as a Service Drones Holidays Data Protection Processor Automobile Cooperation Video Conferencing PowerPoint How To Microchip Administration Virtual Machines Computer Repair Flexibility Presentation Multi-factor Authentication Wireless Technology Professional Services eWaste Specifications Tech Terms IT Consultant Identity Theft Hack Downtime Notifications Managed IT Saving Time Unified Communications Customer Relationship Management Safety Digital Managed Services Provider Co-Managed IT Bitcoin Google Docs Entertainment Computers Taxes Virtual Private Network Virtual Desktop Bluetooth Telephone Experience Distributed Denial of Service Office Tips Current Events Private Cloud Memory File Sharing Social Network FinTech Staffing Botnet IP Address Rental Service Redundancy Micrsooft Data Analysis CES Shortcuts Screen Reader IT Assessment Trends Supply Chain Management Mobile Technology Value Flash Cache Security Cameras Telephone Systems Unified Threat Management Business Growth Workers Customer Resource management Organization Troubleshooting Devices Cyber security Tip of the week Fileless Malware Be Proactive Smart Devices CCTV Gamification Remote Working Company Culture Printing Competition Banking Touchscreen Google Wallet Telephone System AI Regulations Trend Micro Recovery Backup and Disaster Recovery Electronic Health Records Transportation Messenger Emergency Deep Learning Directions Digital Security Cameras Workplace Strategies Computer Malfunction Content LiFi Desktop Wasting Time Entrepreneur Vendor Mangement Modem Application Business Metrics Hosted Solution Samsung Electronic Medical Records Business Owner Accountants eCommerce Documents Database Surveillance Books Business Intelligence Uninterrupted Power Supply Videos Webcam Society Managing Costs Language Business Mangement SSID Tablets Health IT Equifax Securty Tactics Development Hard Drive Disposal Employer/Employee Relationships Domains Reading Monitors Media Smart Technology Visible Light Communication Windows 8 Supercomputer Username Virtual Machine Google Calendar Freedom of Information Virus Reviews Inbound Marketing Startup Optimization Advertising Motion Sickness Addiction email scam Teamwork Relocation Displays Navigation 2FA Work/Life Balance Google Drive Tech Support Data Storage Mobile Security Hypervisor Comparison News Medical IT Public Speaking User Tip Shopping Legislation Supply Chain Network Management Streaming Media SQL Server Knowledge Corporate Profile Evernote Paperless Electronic Payment Telephony Employer Employee Relationship PCI DSS Licensing In Internet of Things Television Keyboard Fake News Hard Drives Hacks Network Congestion Cabling Proxy Server Gig Economy Emails Humor Workplace G Suite Service Level Agreement Internet Service Provider Phone System Computing Infrastructure Azure Reliable Computing intranet Writing Tablet Business Communications Shortcut VoIP Tracking Management Regulations Compliance Device security Managed IT Service Wireless Mouse Microsoft Excel Heating/Cooling Environment Wireless Headphones Memes Scams Web Server Going Green Net Neutrality Windows XP Business Cards Scalability Social Networking Tech Human Resources Text Messaging Proactive IT Digital Payment Error Financial Data Administrator SharePoint Bring Your Own Device Worker Bookmark Risk Management IT Computer Accessories Cables Download Piracy Access Term Google Apps Time Management Music Public Cloud Telework HTML Microsoft 365 Browsers Smartwatch Nanotechnology Communitications Point of Sale Upload Procurement Software License Audit Spyware Google Play

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?