Drive By Malware

Twitter Domain API Back in Malware Fray

Malware writers have revamped code that uses a popular Twitter command
to generate hard-to-predict domain names, a technique that brings
stealth to their drive-by exploits. Read the full article. [The Register]

Twitter API Being Exploited by Drive By Malware

Drive-by exploit writers have been spotted using a popular Twitter
command to send web surfers to malicious sites, a technique that helps
conceal the devious deed.  According to researcher Denis Sinegubko, it’s
being added to heavily obfuscated redirection scripts injected into
compromised websites. The scripts, which redirect victims to drive-by
sites that attempt to exploit unpatched vulnerabilities in programs
such as Apple’s QuickTime. Read the full article. [The Register]

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.