Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

4/13/2009
01:32 PM
Connect Directly
LinkedIn
Twitter
RSS
E-Mail

Twitter Visited By Worms Instead Of Bunnies

An exploit of a cross-site scripting flaw in Twitter sent almost 10,000 spam tweets and compromised at least 190 accounts over the weekend.



Over the weekend, a computer worm attacked the Twitter messaging service in three distinct attacks, generating almost 10,000 spam tweets -- as online posts are called in Twitter's twee terminology -- and compromising at least 190 accounts.

In a post on the Twitter blog, company co-founder Biz Stone said that no sensitive information was compromised as a result of the attacks.

The worm uses a cross-site scripting (XSS) flaw in Twitter to send spam tweets from infected accounts. The infection appears to have started when the worm's creator opened four new Twitter accounts containing the infectious code. The worm spread when Twitter users viewed the user profiles of the infected accounts.

"This is particularly nasty because you could get infected simply by viewing somebody’s profile page on Twitter that was already infected," explained developer Damon Cortesi in a blog post Saturday. "If you visited an infected profile, the JavaScript in the profile would execute and by doing so tweet the misleading link, and update your profile with the same malicious JavaScript thereby infecting anybody that then visits your profile on twitter.com."

The worm can be blocked by disabling JavaScript in your Web browser or by using the NoScript plug-in for Firefox.

The first attack struck about 2 a.m. PST on Saturday, and the Twitter security team worked to secure the service from about 7:30 a.m. PST through about 11 a.m. PST. Some 90 accounts were compromised.

The second attack struck later that afternoon. It affected about 100 accounts.

The third attack began Sunday and affected an undisclosed number of accounts.

Twitter's Stone said the company is still reviewing what happened, cleaning up, and watching for further incursions. "Every time we battle an attack, we evaluate our Web coding practices to learn how we can do better to prevent them in the future," he said. "We will conduct a full review of the weekend activities. Everything from how it happened, how we reacted, and preventative measures will be covered."

Despite Stone's reassurances, Mikko Hypponen, chief researcher at F-Secure, said further attacks occurred Monday. "Twitter administrators don't seem to be able to shut down the various XSS/CSRF worms that have been plaguing the service over the weekend," he said in a blog post. "The actual problems to end users haven't been devastating -- so far. Most of the Twitter worms simply modify people's profiles to infect more users. However, attacks like these could be much worse if the attackers would incorporate nastier attacks, such as browser exploits."

Hypponen observes that the latest worm attack uses the bit.ly URL shortening service to redirect victims to an infected profile. URL shortening services like bit.ly have been criticized recently for various reasons, one of which is the security implications of disguised URLs.

Last month, Secure Science researchers Lance James and Eric Wastl said Twitter was vulnerable to a serious XSS vulnerability that could allow an attacker to hijack users' accounts or, in conjunction with other exploit code, compromise their computers.

The Twitter worm that struck over the weekend appears to make use of a different XSS vulnerability. Its code has been posted on GitHub, a collaborative programming code repository.

A post on the Secure Science blog warns that the viral effect of social networks magnifies the impact of viral computer code. "[W]hen vulnerabilities are found such as cross-site scripting, this viral effect may be easily abused and produce a detrimental outcome such as infecting account holders and possibly crashing the social network," the company said.

According to online news site BNOnews.com, a 17-year-old from Brooklyn, N.Y., identified as Mikeyy Mooney, claimed responsibility for creating the Twitter worm to drive traffic to his Web site, StalkDaily.com.

A request for comment sent to StalkDaily.com was not answered.


Attend a Webcast on why bad security breaches keep happening to good organizations. It happens Wednesday, April 15. Find out more and register.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Take me to your BISO 
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-23369
PUBLISHED: 2021-05-10
In YzmCMS 5.6, XSS was discovered in member/member_content/init.html via the SRC attribute of an IFRAME element because of using UEditor 1.4.3.3.
CVE-2020-23370
PUBLISHED: 2021-05-10
In YzmCMS 5.6, stored XSS exists via the common/static/plugin/ueditor/1.4.3.3/php/controller.php action parameter, which allows remote attackers to upload a swf file. The swf file can be injected with arbitrary web script or HTML.
CVE-2020-23371
PUBLISHED: 2021-05-10
Cross-site scripting (XSS) vulnerability in static/admin/js/kindeditor/plugins/multiimage/images/swfupload.swf in noneCms v1.3.0 allows remote attackers to inject arbitrary web script or HTML via the movieName parameter.
CVE-2020-23373
PUBLISHED: 2021-05-10
Cross-site scripting (XSS) vulnerability in admin/nav/add.html in noneCMS v1.3.0 allows remote authenticated attackers to inject arbitrary web script or HTML via the name parameter.
CVE-2020-23374
PUBLISHED: 2021-05-10
Cross-site scripting (XSS) vulnerability in admin/article/add.html in noneCMS v1.3.0 allows remote authenticated attackers to inject arbitrary web script or HTML via the name parameter.