Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Android Malware Can Control Your Phone Through Twitter

Alert: Android Malware Can Control Your Phone Through Twitter

Hackers continue to innovate and cause trouble for businesses of all industries and sizes. One of the more interesting recent tactics includes utilizing a malicious Twitter account to command a botnet of Android devices to do its bidding. Twitoor is considered to be the first real threat to actively use a social network in this manner, making this a major cause for concern.

Twitoor is an app that, when installed, places a Trojan on the Android device that receives commands from a central Twitter account. Twitoor can download and install malicious applications, steal data, and switch between alternative command-and-control Twitter accounts. Since you can’t find Twitoor on the Google Play store, it’s thought that it spreads through downloading via a malicious link and “side-loading” it onto a device.

Once Twitoor has been installed on the device, it becomes a part of a botnet. Botnets are commonly used by cyber criminals to spread the influence of their malware across multiple devices. The idea is to infect as many devices as possible by creating “zombie-bots,” or devices that are enslaved and forced to adhere to the hackers’ commands. These networks are capable of performing actions that singular devices cannot, like initiate DDoS attacks. Normally, a typical botnet can leave behind signs of its origins (where it’s receiving commands from), which security professionals can use to find the source of the botnet. They can then shut down the server issuing the commands, but in the case of Twitoor, it’s a bit more complicated.

The problem with Twitoor is that its devices receive commands from a Twitter account that’s always changing. This helps it to avoid detection. ZDNet explains further measures taken by the message to avoid detection: “Those behind the malware have also taken additional steps to safeguard Twitoor, including encrypting messages to further obfuscate their activities.” This makes Twitoor more difficult to destroy at its roots than a typical botnet.

Criminals are adapting their approaches to hacking in an attempt to innovate and explore new opportunities, and Twitoor is the perfect example of this. You always need to be aware of all types of threats, not just traditional ones. We recommend that you reach out to Telesys Voice and Data for assistance with securing your organization’s network security. This includes mobile devices like smartphones, tablets, and laptops.

In particular, a mobile device management solution can help your organization keep tabs on its mobile devices. You can secure your devices through whitelisting and blacklisting apps, limiting access to sensitive data, and remotely wiping devices that are in danger of being compromised or infection. These preventative measures are designed to mitigate risk, which is an essential part of working with technology solutions.

To learn more, reach out to us at (800) 588-4430.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Wednesday, 20 November 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Business Productivity Hosted Solutions Microsoft Software Network Security Internet IT Services Computer Windows 10 Managed Service Provider Productivity Data Backup Backup Ransomware Innovation Business Continuity Mobile Devices Outsourced IT Android Hardware Smartphone Google Managed IT services Social Media Data Recovery Efficiency Upgrade User Tips Disaster Recovery Browser Communication Data IT Support Workplace Tips Small Business Business Management Cloud Computing IT Support Managed IT Services Data Management App Smartphones Microsoft Office Internet of Things Office Phishing Remote Monitoring Miscellaneous Server Holiday Windows Network Paperless Office Password Facebook communications WiFi Office 365 Artificial Intelligence Gmail Big Data Save Money Apps Encryption VoIP Cybersecurity Tech Term Spam Passwords Apple Bandwidth Robot Firewall Windows 10 Collaboration Saving Money Document Management Hosted Solution Recovery Customer Relationship Management Employer-Employee Relationship Unified Threat Management Risk Management Avoiding Downtime Word How To Government Hacker Money Managed IT Mobile Device Management Infrastructure Customer Service Work/Life Balance Operating System Content Filtering Tip of the week Remote Computing Downtime Wi-Fi Office Tips Vendor Management Compliance Chrome Analytics Computers Health Mobile Device Antivirus Applications Redundancy Windows 7 Virtual Reality Hacking Training Mobile Computing Project Management Data loss SaaS Tech Support BDR BYOD Education Business Technology Cybercrime Telephone Systems Presentation Business Growth Social File Sharing Website Vulnerability Help Desk Outlook Automation Going Green Data Security Alert Healthcare Two-factor Authentication Settings Printing Data storage Managed Service Computing IT Management The Internet of Things Business Owner Augmented Reality Computer Care Net Neutrality IBM Running Cable Marketing Proactive Smart Technology Tablet Software as a Service Remote Monitoring and Management Bring Your Own Device HIPAA Search Router Sports Competition Mobile Security IT service Automobile Upgrades Cortana Budget Virtualization Information Technology Administration End of Support Humor Mouse IT solutions Safety Analyitcs Legal Wireless Technology Patch Management Solid State Drive Display Wireless Access Control Scam Laptops Identity Theft Twitter Politics Monitors Specifications Travel YouTube Google Drive VPN Websites Unified Communications Physical Security Assessment Taxes Licensing User Server Management Virtual Private Network Botnet LiFi Consultation Digital Payment Samsung Retail Maintenance Regulations Best Practice Meetings Storage Lithium-ion battery Legislation Address Corporate Profile Relocation MSP Voice over Internet Protocol Operations Electronic Medical Records Social Networking Halloween Google Wallet DFW IT Service Refrigeration Proactive IT Quick Tips Webcam Remote Work History Crowdsourcing Recycling Favorites Dark Data WannaCry Private Cloud Deep Learning Wearable Technology Fun Motherboard Scary Stories Drones IT Consulting PowerPoint Time Management Point of Sale File Management Cabling Management Conferencing Internet Exlporer Mobility Consumers Error Manufacturing Staffing Distributed Denial of Service Undo Data Breach Network Management Telephone Enterprise Resource Planning Employees IP Address data services Technology Tips VoIP WPA3 Alt Codes Gadgets GPS IT Technicians Google Maps Update Modem Managed IT Service eWaste Technology Laws Touchscreen Web Server Mobile VoIP IT Sevices Disaster Mobile Zero-Day Threat Hotspot Mobile Office User Error Comparison Lenovo Digital Administrator Fleet Tracking Typing Proactive Maintenance Tracking 3D Printing Mirgation Chromebook Cookies Buisness Break Fix Environment Unified Threat Management Cameras Shortcut Uninterrupted Power Supply Law Enforcement Company Culture Backup and Disaster Recovery Network Congestion Language Printer Black Friday Superfish Spyware Asset Tracking Cryptocurrency Processor Unsupported Software Migration Knowledge Emoji Nanotechnology Dark Web Troubleshooting business communications systems CCTV Gadget Vulnerabilities RMM Computing Infrastructure Experience Hacks Cyber Monday How To Remote Workers Bitcoin Mobile Data Chatbots IoT Data Warehousing Internet Protocol Phone System Heating/Cooling Hard Disk Drive Geography Procurement Alerts SharePoint Identity Current Events flu season Networking Firefox Information Windows 8 Active Directory Supercomputer G Suite Processors Utility Computing Microsoft Excel Domains VoIP streamlines Servers Downloads Entrepreneur Cables Remote Worker Cooperation 5G Fort Worth Application Motion Sickness Monitoring Windows Server IT Budget Users Google Docs Blockchain Public Speaking business network infrastructure Multi-Factor Security Wires Professional Services Writing Staff Personal Information flu shot Techology Electronic Health Records User Management IT Consultant Software Tips Cost Management Cyberattacks Permissions iPhone Statistics Google Calendar Mail Merge Machine Learning Virtual Assistant Social Engineering Flexibility Computer Repair Laptop Fort Worth IT Hard Drives Disaster Resistance Batteries Cleaning Notifications Hard Drive Virtual Desktop Bookmarks Fraud Bluetooth

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code