Warning- Twitter Direct Message Phishing Attack Spreading

Hey guys and gals, Just wanted to make you aware of a new phishing attack affecting Twitter. If you recieve a Direct Message reading “lol, is this you”, and linking to a site called bzpharma, DO NOT CLICK ON THE LINK. People who do, and enter their details into the fake twitter page will let a spammer hijack your account. The Hijacker will then use the same message to Direct Message the same thing to all your friends. Now, just to be clear, if you’re receiving these messages your account is not compromised. However, if you find you’re sending them, make sure to change your Twitter password as soon as humanly possible.

Wikipedia defines Phishing as

the criminally fraudulent process of attempting to acquire sensitive information such as usernames,passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail or instant messaging,[1] and it often directs users to enter details at a fake website whose look and feelare almost identical to the legitimate one. Even when using server authentication, it may require tremendous skill to detect that the website is fake. Phishing is an example of social engineering techniques used to fool users,[2] and exploits the poor usability of current web security technologies.[3] Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.

-Zach Morton “The Uber Geek”

Reblog this post [with Zemanta]

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>