Kamis, 01 Agustus 2019 17:31:00

Trend Micro Study Reveals Criminal Abuses Of Twitter

Social network used for scams and malice, as well as a threat intelligence source
HONG KONG, RIAUONE.com - 31 July 2019 - Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today announced a new study revealing how cybercriminals are abusing Twitter via tech support scams, command-and-control (C&C) operations and data exfiltration.
 
Trend Micro researchers analyzed a large volume of Twitter data to identify relationships between various entities to spot anomalies and uncover key insights.
 
"Social media is an inescapable part of modern life, and our new research shines an important light on how it's being used positively by the security community, and abused by criminals," said Mark Nunnikhoven, vice president of cloud research for Trend Micro. "This research shows businesses how the misuse of social networks can damage their brand, and it informs consumers how they might be tricked into a scam from what is believed to be a trusted source. We hope by making these abuses known, both businesses and consumers can be vigilant to not become victims of such attacks."
 
Criminals were found using fake Twitter accounts to spoof those of legitimate vendors for credible tech support scams. Users call the fake phone number provided, believing they are speaking with the intended company's help desk, which results in the caller either sharing credit card information or installing malicious content on the their computer.
 
This is often part of a multi-platform strategy along with YouTube, Facebook, Telegram and other channels to improve SEO for fake tech support websites linked to the Twitter accounts, boosting their search rankings.
 
While criminals are using the social network for bad, threat researchers can  leverage the power of social media for good. Most notably, Twitter is used for monitoring vulnerability disclosures to inform patch prioritization, and scanning for indicators of compromise, threat detection rules, and other contextual information to boost threat intelligence.
 
Trend Micro recommends users confirm the validity of a Twitter account by checking the company's website directly, rather than through the account. It is also important for security teams to validate Twitter data when leveraging it for investigations or threat intelligence. (roc/red/*) #for information on collaboration publications, questions and other e-mails riauonemedia@gmail.com
RIAUONE.com

Share
Berita Terkait
  • 5 tahun lalu

    Trend Micro Announces World's First Cloud-Native File Storage Security

    Serverless tool provides malware scanning for compliance and security of files in cloud-based applications
    Hong Kong SAR  - 16 December 2020 - Trend Micro Incorporated (

  • 6 tahun lalu

    Trend Micro Named a Leader in Cloud Workload Security by Top Independent Research Firm

    Highest scores in current offering and strategy categories secured by the company in cloud security report

    HONG KONG, RIAUONE.com - December 10, 2019 - Trend Micro Incorpo

  • 6 tahun lalu

    Trend Micro Debuts World's Broadest Security Services Platform for Organizations Building Applications in the Cloud

    Trend Micro Cloud One automates and simplifies cloud security to give organizations the flexibility they need to meet their most strategic cloud priorities

    HONG KONG, - De

  • 6 tahun lalu

    Trend Micro Leads the Industry in Hybrid Cloud Security Market Share

    #1 Ranking in 2018 market share for SDC Workload Security According to Global Analyst Firm
    HONG KONG, - 5 December 2019 - Trend Micro Incorporated (TYO: 4704; TSE: 4704), a g

  • Komentar
    Copyright © 2012 - 2026 riauone.com | Berita Nusantara Terkini. All Rights Reserved.Jasa SEO SMM Panel Buy Instagram Verification Instagram Verified