Chester Wisniewski has an interesting article about direct messageTwitter attacks at the Sophos blog. He explains how a follower he trusts sent him a tweet inviting Chester to join him in making $500/day online. Knowing the sender, Wisniewski knew immediately this was a phishing tweet, and his article explains what he found as he continued his investigation.
What is surprising about Wisniewski's article is not that attackers are tweeting for phish, but how similar Twitter phish specifically and social network spam in general are to email phish. Phishing today varies little from the scam formula adopted more than a decade ago. For example,
- Wisniewski's tweet phish originated from a newly registered domain. Thousands of malicous domains are registered every month. This figure has remained relatively constant over the past two years.
- Wisniewski's tweet phish came from a trusted follower, or more precisely, from the compromised account of a trusted follower. Wisniewski explains that this phishing attack was very likely preceded by a phish attack against Twitter or against a social network that allows you to share posts from Twitter. Wisniewski recommends, and I concur, that "using sites that request your username and password for social media is never a good idea."
- The domain was registered using a private domain registration. Such registrations gives criminals who have populated Whois with false registration information in the past an additional level of obfuscation, so this behavior is not a change but a refinement.
- Wisniewski's tweet referred him to a domain. Whether email or tweet, a recipient who bites on the lure and visits the phish site lands on a "known dirty domain", a domain registration that persists for any of several reasons: the domain is fast fluxed, resolved at an orphaned name server, or "sticky" because the takedown process employed by some registrars remains cumbersome, inefficient and overly vulnerable to abuse.
- The scam web site accepts credit card information and uses a certified secure SSL certificate, which Internet users commonly and incorrectly assume protects their transaction from identity theft. To be clear, "certified secured" in this phishing scam means that no other criminals can see your credit card information while it's communicated from your PC to the phisher's scam web site.
What is less surprising is that the best practices to avoid phishing and malware on Twitter and social networks are almost exactly the same as best practices written for email years ago. Summarizing from a recent article by Sarah Perez, they are:
- Be wary of any URL (hyperlink) in a tweet or email. Phishers use HTML to embed malicious links in seemingly familiar, "safe" links. Don't click on a hyperlink; instead, type the link in manually.
- Be aware that criminals will "hijack" popular topics to prey on your enthusiasm. The strategy is simple: find someone who is so caught up in a topic he forgets rule #1 above.
- Be aware that criminals compromise email, Twitter, and social network accounts so they can deceive you more effectively. Wisniewski's tweet is an excellent example of this tactic. Don't let your guard down simply because the sender is someone you trust: remember, senders can be spoofed.
- Install antivirus and antimalware software, and keep these and other software up to date. The more current you remain with security patches for your operating system, browser, and Adobe applications (reader and flash), the safer you'll be from malware that's often lying in wait for you at phishing sites. To keep current, download and use Secunia Personal Software Inspector.
Sarah Perez concludes her article by saying that it's not just a matter of common sense anymore. This doesn't mean common sense plays no role; in fact, all the protective measures you may take will prove worthless if you don't use some common sense, so please think before you click.
Comments