{"id":3898,"date":"2009-01-05T11:38:59","date_gmt":"2009-01-05T11:38:59","guid":{"rendered":"http:\/\/localhost\/wordpress\/?p=3898"},"modified":"2009-01-05T11:38:59","modified_gmt":"2009-01-05T11:38:59","slug":"twitter-phishing-scam-proves-there-is-value-to-twitter-implications-for-the-attack","status":"publish","type":"post","link":"http:\/\/10.10.2.102\/creevacom\/index.php\/2009\/01\/05\/twitter-phishing-scam-proves-there-is-value-to-twitter-implications-for-the-attack\/","title":{"rendered":"Twitter Phishing Scam – Proves There is Value To Twitter – Implications For the Attack"},"content":{"rendered":"
<\/p>\n
The recent Twitter phishing scam<\/a> had nontwitter users scratching their heads on why this service would be targeted for a phishing scam<\/a> at all.. Most people view little or no monetary value to twitter accounts. For most people, this may actually be true. For people like Scoble<\/a> or companies that promote themselves over Twitter, well the brand name damage caused by a hijacked Twitter account could be quite costly.<\/p>\n One of my friends on twitter<\/a> had a reply about this issue<\/a> (I’m assuming the other person didn’t realize the long tail potential impact (yes I used the term long tail – get over it)). What I saw was this:<\/p>\n @jeremyasmus<\/a> could be any number of reasons, spread malware, spam, get passwords, us humans tend to use the same password over and over. <\/span><\/p><\/blockquote>\n This is the crux of the issue, isn’t it? The problem isn’t the average user with nine friends directly, it’s the large power users and the passwords for other services. Let’s look at each of these.<\/span><\/p>\n Let’s say you are Scoble<\/a> and your account get’s hijacked. Scoble has a level of trust built from himself, he is known to get the inside scoop on information, people click his links. Scoble has over 47,000 followers. If his account was hijacked and ten percent clicked a link that was really a malware installer – that would be 4,700 people infected within a matter of minutes. I think however the number of Scoble followers would be much larger probably in the 50-60% range. For a malware distribution, this is a great return for the time frame, with the added benefit that you may get some other high-profile names in the attack. <\/span><\/p>\n The cost to deploy such an attack is extremely low – under ten dollars, while the net return would be a few thousand, potentially more. Since there is little risk of getting caught if you know what you are doing, you could make some decent money by exploiting this chain of trust that exists and is protected by a mere password. <\/span><\/p>\n