Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

3/15/2017
01:50 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Twitter Counter Hack Uses Familiar Attack Mode

Experts advise users to be more aware of the potential downside of third-party apps.

Turkey’s rift with Holland and Germany became worldwide technology news today when it was reported that thousands of Twitter accounts – some of them high-profile such as Forbes', Amnesty International's and even Justin Bieber’s – were hacked via a compromise of the third-party analytics app Twitter Counter.

Experts speculate that the attacks are a reprisal for recent moves by both countries to deny permission for Turkish ministers to speak about a forthcoming Turkish referendum on presidential powers at local rallies of Turkish expatriates in those European countries.

According to The Guardian, the attackers used Twitter Counter’s permissions to post anti-Fascist tweets in Turkish that used hashtags such as #NaziGermany, #NaziNetherlands and "see you on #April16," the date when Turkey plans to hold the referendum. The tweets also linked to a pro-President Tayyip Erdoğan video on YouTube.

Security experts were not surprised by the hack, and warned users that they need to be more careful about using third-party social media applications.

“People have to be careful about the ability of third-party apps to post on your behalf because you can’t assume that the third-party app is as secure as the mother ship,” says Michael Patterson, CEO of Plixer International. “Consumers have to understand that by gaining big data analytics they are giving up the privacy of their information.”

Patterson says users should log off social media apps such as Facebook, Twitter, and LinkedIn after every session, pointing out that even though they could still be hacked in the event of a major push by an attacker, logging off still “hedges their bets in case your account is compromised.”

Nathan Wenzler, chief security strategist at AsTech, adds that many hacks follow this type of attack sequence, saying that it’s easier to break into something less defended, which already has access to where you want to ultimately break in than it is to go after the well-protected application directly.

“Using a flaw in Twitter Counter to then gain access to accounts which live in Twitter absolutely follows an attack chain I would expect,” he explains.

Wenzler says users need to review which applications they have connected to their Twitter account, adding that they should remove any they don’t use or trust. He also advises making sure users review their Twitter feed regularly to ensure that no tweets are being posted that they are not aware of.

“Unusual messages are an immediate [sign] that someone has gotten control of your account,” Wenzler says. “And be sure you use a strong, complex password for your account that isn’t the same password that you use elsewhere and change it on a regular basis.”

In response to the news, Twitter issued the following statement: “We are aware of an issue affecting a number of account holders. Our teams worked at pace and took direct action. We quickly located the source which was limited to a third party app. We removed its permissions immediately. No additional accounts are impacted. Advice on keeping your account secure can be found here.”

Related Content:

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
State of SMB Insecurity by the Numbers
Ericka Chickowski, Contributing Writer,  10/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16966
PUBLISHED: 2019-10-21
An issue was discovered in Contactmanager 13.x before 13.0.45.3, 14.x before 14.0.5.12, and 15.x before 15.0.8.21 for FreePBX 14.0.10.3. In the Contactmanager class (html\admin\modules\contactmanager\Contactmanager.class.php), an unsanitized group variable coming from the URL is reflected in HTML on...
CVE-2019-9491
PUBLISHED: 2019-10-21
Trend Micro Anti-Threat Toolkit (ATTK) versions 1.62.0.1218 and below have a vulnerability that may allow an attacker to place malicious files in the same directory, potentially leading to arbitrary remote code execution (RCE) when executed.
CVE-2019-16964
PUBLISHED: 2019-10-21
app/call_centers/cmd.php in the Call Center Queue Module in FusionPBX up to 4.5.7 suffers from a command injection vulnerability due to a lack of input validation, which allows authenticated attackers (with at least the permission call_center_queue_add or call_center_queue_edit) to execute any comma...
CVE-2019-16965
PUBLISHED: 2019-10-21
resources/cmd.php in FusionPBX up to 4.5.7 suffers from a command injection vulnerability due to a lack of input validation, which allows authenticated administrative attackers to execute any commands on the host as www-data.
CVE-2019-18203
PUBLISHED: 2019-10-21
On the RICOH MP 501 printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn and KeyDisplay parameter to /web/entry/en/address/adrsSetUserWizard.cgi.