Twitter Malware Through Time
- April 2007. A vulnerability in SMS authentication allows updating of someone else's status via text message. Twitter introduced a PIN code option to resolve the vulnerability.
- August 2008. Twitter attacked by cyber criminals who set up a specially crafted page with an ad for an erotic video. Clicking the photo would infect users with a Trojan-downloader declaring to be a new version
of Adobe Flash.
- February 2009. Clickjacking attacks proliferate. Twitter users see links in accounts they follow with the message "Don't click". Users who follow the links have their clicks hijacked.
- April 2009. Twitter hit by multiple variants of an XSS (cross-site-scripting) worm. Thousands of messages containing the name "Mikeyy" (the nickname of the author) are generated as the worm propagation.
- April 2009. A French hacker gains access to Twitter's admin panel. Screenshots show internal access to accounts belonging to many high-profile celebrities from Britney Spears to Ashton Kutcher.
- June 2009. Cyber criminals hijack Twitter trending topics to serve malware. A malware serving campaign starts abusing the trending system to trick users into visiting bogus exclusive video sites and infect them with
- June 2009. Guy Kawasaki's Twitter account hijacked and attempts to serve Mac and Windows malware to some 130.000+ followers.
- July 2009. A new Koobface modification enables the infection to spread through Twitter users. Once an infected users attempts to log in to Twitter, Koobface hijacks the session and posts a tweet on behalf of the
user in an attempt to infect their followers.
- August 2009. A Twitter account is used as a Command and Control center for botnets. Tweets contained special code that was downloaded, decrypted and saved as an infection component to update the malware on
previously infected machines.
- May 2010. A bug is discovered which allows a malicious user to force others to follow them.
- June 2010. Twitter settles a case with FTC which requires them to undertake a number of steps to secure user info, due to multiple breaches. One of the provisions is a bi-annual security audit.
- September 2010. A "MouseOver" exploit is discovered. Just moving your mouse over the malicious tweet is enough to launch the worm, which then reports to your account. The exploit is later used to deliver pop-up ads
and links to pornographic websites.