• Home
  • News
    • Features
    • Latest/Upcoming Tech
    • Product Review
    • Tech Events
  • Technology
    • Computing
      • Hardware
      • Software
    • Mobile
      • Devices
    • Apps
      • Messaging App
  • Innovation
    • Startups
    • Smart Gadgets
    • Augmented Reality
    • Cloud Computing
  • Business
    • Internet Commerce
    • Tech Market
  • Tips & Tricks
  • Miscellaneous
    • Jobs / Career
    • Social Media
TheTechNews
  • Home
  • News
    • Features
    • Latest/Upcoming Tech
    • Product Review
    • Tech Events
  • Technology
    • Computing
      • Hardware
      • Software
    • Mobile
      • Devices
    • Apps
      • Messaging App
  • Innovation
    • Startups
    • Smart Gadgets
    • Augmented Reality
    • Cloud Computing
  • Business
    • Internet Commerce
    • Tech Market
  • Tips & Tricks
  • Miscellaneous
    • Jobs / Career
    • Social Media
Security

Your Android device might be controlled by a rogue Twitter account

by Selene Kyle
-- August 29, 2016
Your Android device might be controlled by a rogue Twitter account
  • 1 Share

If you think only humans are checking their twitter accounts for updates, you are wrong. Now Android malware is also checking for the updates. A recent blog post from ESET states about a new kind of malware that is using Twitter to communicate with Android-device based botnet. Named Twitoor, the malware is first of its kind that uses social media account to control over infected devices instead of using a command-and-control server.

Twitoor has been active for about a month. It apparently hides on Android devices, awaiting commands from a malevolent Twitter account. Based on received commands, it can either download or install other malicious applications or switch to another command-and-control (C&C) Twitter account. While it can’t be found on Google Play Store, the devices are thought to be infected either via text messages or malicious URLs.

“Using Twitter instead of command-and-control (C&C) servers is pretty innovative for an Android botnet,” says Lukáš Štefanko, the ESET malware researcher who first detected the malicious app.

Štefanko has found the use of social media networks in the botnet’s communication quite innovative. “These communication channels are hard to discover and even harder to block entirely,” he said. “In the future, we can expect that the bad guys will try to make use of Facebook statuses or deploy LinkedIn and other social networks.”

So, friends, if you’re using Twitter in Android, do proceed with great caution. Who knows, your device may be controlled by an ill Twitter account.

ringid
Related ItemsAndroidandroid deviceBotnetFeaturedtwitoortwittertwitter account
Click to add a comment
Security
August 29, 2016
Selene Kyle

Related ItemsAndroidandroid deviceBotnetFeaturedtwitoortwittertwitter account

More in Security

microsoft-new-processor-old-windows

How to Reset Windows 10 Login or Admin Password?

Emily ForbesJuly 13, 2018
Read More
wireless transmitter

Wireless transmitter could put hackers into trouble

Selene KyleJune 13, 2018
Read More

Microsoft and Google revealed another scary chip flaw similar to Spectre and Meltdown

Selene KyleMay 22, 2018
Read More
master key

Master key hack puts millions of hotel room doors at risk

Selene KyleApril 26, 2018
Read More
identity theft

Facebook is the best place for identity theft

Selene KyleApril 25, 2018
Read More
Gmail users

Gmail users got shocked upon receiving spam from their own accounts

Selene KyleApril 23, 2018
Read More
malware

Newly discovered malware targets routers

Selene KyleMarch 12, 2018
Read More
cryptocurrency

Hackers steal cryptocurrency by altering the wallet address in Windows clipboard

Anika SalamMarch 7, 2018
Read More
cryptocurrency

Hackers are now using YouTube to mine cryptocurrency

Anika SalamJanuary 29, 2018
Read More
Scroll for more
Tap

Join Our Newsletter

Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

Thank you for subscribing.

Something went wrong.

we respect your privacy and take protecting it seriously

Top News

  • These Will Be the Most Popular New Games in 2019!
    EntertainmentFebruary 20, 2019
  • Things To Consider When Searching For Good OnlinePDF Services
    BusinessFebruary 19, 2019
  • Things About Offshore Planning You May Not Have Known!
    BusinessFebruary 18, 2019
  • 5 Best Data Recovery Software for Mac!
    ComputingFebruary 17, 2019
  • A Step-By-Step Guide to Migrate Outlook Data to Office 365
    Tips & TricksFebruary 12, 2019
  • Understanding the Power of Video Animation: Some Essential Facts to Know
    BusinessFebruary 11, 2019
  • 8 Prominent Features of Samsung Galaxy J7 Max You Must Know!
    EntertainmentFebruary 10, 2019
TheTechNews

A technology media that aims at the latest tech news, events, gadgets, tools, innovations, startups and many more.

    NEWS

  • Features
  • Latest/Upcoming Tech
  • Product Review
  • Tech Events
  • Technology
  • Innovation
  • Business

    Hardware & Software

  • Computing
  • Hardware
  • Software
  • Mobile
  • Devices
  • Messaging App
  • Tips & Tricks

    Others

  • Startups
  • Cloud Computing
  • Social Media
  • Internet Commerce

Copyright © 2016 www.thetechnews.com | Pages: ABOUT US | PRIVACY POLICY | TERMS OF USE | CONTACT US

This is how NSA snooped on Cisco firewalls for years
Sri Lanka’s President fell victim to a website hack