iTnews

Hackers used Twitter 'malmeme' pics to control Trojan

By Juha Saarinen on Dec 18, 2018 9:22AM
Hackers used Twitter 'malmeme' pics to control Trojan

Images contained embedded command.

A security vendor has discovered an attempt at using images posted to Twitter - memes - to allow criminals to remotely control malware on infected machines.

Trend Micro detailed the latest attempt at using steganography to hide malicious code within images to avoid detection, with the malware it has named TROJAN.MSIL.BERBOMTHUM.AA being coded to fetch JPG memes posted by specific Twitter accounts in October this year.

Two memes containing malicious code were posted to the @b0mb3rnc Twitter account, which was closed by the social media company on December 14 Australian time.

The malware appears to be a half-baked as it stands currently:  the memes only contained a "/print" command that directed the malware to take screenshots; an hyper text transfer protocol link would then be retrieved from the Pastebin copy and paste site, which pointed to a server address.

However, the Pastebin link pointed to an RFC 1918 private internet protocol address, that can't be reached outside internal networks so the screenshot transfers would not work.

Trend Micro's analysis of the malware showed that apart from taking screenshots, it can retrieve a list of running processes, account name of the logged in user, and filenames in specific directories on an infected machine.

The malware can be instructed to capture clipboard content as well.

At this stage, it is not clear how the malware is spread beyond it not being distributed via Twitter, Trend Micro said.

"Stegomalware" that weaponises seemingly innocuous images, videos, text files and other digital content is a growing threat vector that emerged some years ago. 

 

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
malware security trend micro trojanmsilberbomthumaa twitter

Partner Content

Preventing cybercrime in the world of forex trading
Promoted Content Preventing cybercrime in the world of forex trading
Setting a path to self-funded mainframe-to-cloud modernisation with Micro Focus
Promoted Content Setting a path to self-funded mainframe-to-cloud modernisation with Micro Focus
Four data superpowers to harness before 2022
Promoted Content Four data superpowers to harness before 2022
Tackling cybersecurity in 2021
Partner Content Tackling cybersecurity in 2021

Sponsored Whitepapers

The top 5 tech trends to deliver business outcomes
The top 5 tech trends to deliver business outcomes
10 reasons why businesses need to invest in cloud security training
10 reasons why businesses need to invest in cloud security training
Your guide to application security solutions
Your guide to application security solutions
State of Software Security: Open Source Edition
State of Software Security: Open Source Edition
Five questions to ask before you upgrade to a SIEM solution
Five questions to ask before you upgrade to a SIEM solution

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
  • [iTnews and Micro Focus] Navigating the cloud modernisation minefield
By Juha Saarinen
Dec 18 2018
9:22AM
0 Comments

Related Articles

  • Twitter reveals purges of state-sponsored threat actors
  • Twitter worried by 'secret' account takeover, data access powers
  • US authorities charge alleged Netwalker ransomware affiliate
  • Police take over global Emotet infrastructure
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

TPG Telecom to start enticing NBN customers to move

TPG Telecom to start enticing NBN customers to move

Infosys scores another $40m for Centrelink payments engine build

Infosys scores another $40m for Centrelink payments engine build

Telstra InfraCo opens up telco's own fibre network

Telstra InfraCo opens up telco's own fibre network

Transport for NSW data stolen in Accellion breach

Transport for NSW data stolen in Accellion breach

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.