Researcher Warns of Twitter Security Flaw

A flaw in Twitter’s website has
left the login credentials of its users vulnerable to hackers,
according to a security researcher who has asked the social
media company to fix the problem.  Read the full story [Reuters]

A flaw in Twitter’s website has
left the login credentials of its users vulnerable to hackers,
according to a security researcher who has asked the social
media company to fix the problem.  Read the full story [Reuters]

Suggested articles

Discussion

  • Anonymous on

    i am going to try to fill yall in  and dont tell me to do a sapena, cause i dont know how, and i would need fbi to go further to validate info.  heres the situation.   when the botnet started, i chased cars that didnt exist for 6 months cause my hub/routers showed acer-pc and truck-pc as logged in.  the hacker loves decoys . they were put there on purpose.  the conficters were decoys.  the main worm uses the motherboard, bios, kernel/firmware/drivers/ and works in layers and runs as soon as the machines are on.  OS or not.   to this day, i still dont have full access to my machines since aug 2008 if not a year prior(if hardware issues are involved)   if you try to low level format, you cant.  it now goes as far as making you believe it succeeded.  but most programs will still get access violation.   no matter if you use windows or linux, the worm and hacker puts multiple partitions on your drives and uses them all.  he origianlly connected with phone towers and smartphone using safari( made past mistakes saying skyfire(couldnt remember fully)).   he has abanondoned the worm and gave info to kiddie hackers hoping to back out and get away.  i seen names linked that are arrested, but still need a person from windstream to be invested due to being  the original hacker(one of them).  after 2 years of being intercepted and couldnt get help or responses, i now am getting help.  i was told to contact ed gibson whom i cant find his info cept that hes leaving microsoft. 

     

    the lag that i got to see hotmail go through may have done what i did when i got them.  i thought it was part of the OS.  but the lag comes higher such as kernel.  i still dont know why the lag in kernel cept possibly experimenting with threads and timers.   the main way i found to detect if your infect is to update your video/audio/lan drivers.  if they fail, your infected.   also im not sure if this is normal, but sysinternals.com  has  logonsessions.exe and   whois.net

    logonsessions shows anonymous logon around 0x3e7.  even though some of the info may be normal, its linked to the worm.  0x3e7 came from the icmp packet with a message telling the hacker to make sure it doesnt show the IP.  the hacker searches unused or ignored storage areas to spread the worm and advance.     if you want to know if a connected ip is the hacker, all ya do is use whois.exe shown above, and search the IP.  if the thread freezes up, its linked.  the original hacker used yahoo through the icmp to connect till i made it known, then it switched to msft.  

    this is how they are getting in.  as hard as it is to believe.

    they use radio waves.  they send packets to the motherboard and/or lan getting in(limited right now).  this gives thim high priority over all during this process.    they then collect logon info, and uses the IP on any open port(mostly 80 and 8080).  they go though a list of exploits till in. 

    so far, if you have a firewall, it uses both sides of the connection to break through.  if you block an IP, hes still in.

    once in, i noticed he goes directly to the graphics card(originaly(was audio and legacy).  he alters all the drivers/firmware/bios/kernel(not 100percent sure of details)  in such a way where it runs independant of the OS(before it infects the OS). 

    once all set up, the hacker gets in using certs and cookies. 

    i seen him use the first connection(create any cert from any site).  you get an incoming cookie(i put mine on prompt) and if you block/allow/view info,  the worm is set up already to intercept the packet.   he gives it commands and can create any opening it wants.   i tried everything.  this worm/hacker seems to have a wide database of exploits, technical know how, and protocols. 

     

    i have info on the hackers, i gave some info to these new helpers, and they seem to be helping, but more info is needed for me to give.  it seems  that im still infecting others through this blackberry that was mysteriously sent to me through mail.   i was told  that it uses dualband.  everyone i call gets infected and gets problems. 

     

    hope this helps everyone realize that there is more to it and i have info on the worm/hackers since birth of its creation.   my goal is to make sure this main set of hackers goes behind bars.   i recogmend anyone calling or emailing for more info.  i rather you call due to interceptions of emails that i never know if i will get your emails. 

     

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.