Detect malicious code in Twitter images that reach the user's data



[ad_1]

Detect malicious code in Twitter images that reach the user's data

A number of researchers in the field of security and protection of computers have discovered malicious software that receives code instructions embedded in the same to ask them to collect certain information about users and their devices.

Trend Micro, a Japanese company specializing in protection against hacking and malware, said the process of routing and controlling these codes had been done through a Twitter account. The software commands to take a screenshot of the attacker's computer, as well as other commands to know the applications and processes used by the user and other users to steal the saved content, as well as additional code to access the name of certain files, so that the information is sent to a basket to save the data of the site. The intrusive software is titled separately.

It is likely that the first exploitation of memes and the integration of malware in this way are due in mid-October, which was then in the first evidence of the use of pastbin for direct orders. This is not the first time that a malicious programming process is handled via a Twitter account and it is impossible to determine if it is the last one. There are always people who think creatively to reach their target even if it spreads a malware as we see it.

[ad_2]
Source link