Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
This granted insight into follower relationships, allowing attackers to mention followers in tweets to increase the chance that targets would click malicious links.Attacks were best placed where triangles were created in the tool's visual grid of relationships between Twitter accounts. Those indicated likely trusted relationships, which were useful to social engineers. "I can start sending communications to accounts referencing [their followers] and it will look like I know something about them. Or I can include all of them and it will look like I'm forwarding information that's relevant to them," Palka said at the Hack3rcon event this month.The popular Maltego toolkit could be used to determine these relationships, but Palka said it was tough work to handle the necessary complex filters.In a simple demonstration of the tool at the recent Defcon security conference, Palka created a fake account, which copied all tweets sent out by event staffer Ryan Clarke.
It was enough to get his fake account ranked higher than Clarke's, and even retweeted by Defcon organiser Jeff Moss, which scored him followers.Hypertwish also kept an accurate list of victims who clicked malicious URLs via HTTP logs which parsed bots.
Palka found Twitter bots automatically requested URLs but did not dive deeper into the links to examine content.Hypertwish took advantage of this by redirecting victims via iFrames to target payload sites, a move that went unnoticed by the bots.The tool can be downloaded free for Linux.
Copyright © SC Magazine, Australia
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.