-
November 14th, 2008, 01:43 AM
#1
Phishing for twits
I was curious as to what people thought of the recent use of twitter ranking sites to steal username/passwords of Twitter users (and thus likely get access to email and such).
-
November 14th, 2008, 03:53 AM
#2
i dont even know what twitter is, never heard of it. but i will do some research and get back to you
-
November 14th, 2008, 05:44 AM
#3
i dont even know what twitter is, never heard of it.
My guess is that it deals in mental masterbation.
I was curious as to what people thought of the recent use of twitter ranking sites to steal username/passwords of Twitter users
Sounds like a barrel of laughs.
-
November 15th, 2008, 12:10 AM
#4
It looks like it might just be an attempt to embarrass Twitter and its users?
http://twitpic.com/lfm9
and: http://mashable.com/2008/11/12/twitterrank/
Amazing just how gullible some people can be
-
November 15th, 2008, 02:53 AM
#5
Nihil it goes back to the saying.
"There's an idiot born every 5 Seconds".
-
April 16th, 2009, 04:13 PM
#6
Sorry! I know this is an older thread.
I just wanted to ask if anyone sees any benefit in stealing twitter account details? What can be gained?
Other than the sheer embarrasment and perhaps a small probably negligable bit of reputation damage should it be a 'corporate twitter'
Thanks!
I remember when Nihil was ickle. Does that mean I'm old?
-
April 16th, 2009, 06:09 PM
#7
Being on it is embarrassing enough, I should think.
-
April 16th, 2009, 06:49 PM
#8
Originally Posted by VicE$DoS$
Sorry! I know this is an older thread.
I just wanted to ask if anyone sees any benefit in stealing twitter account details? What can be gained?
Other than the sheer embarrasment and perhaps a small probably negligable bit of reputation damage should it be a 'corporate twitter'
Thanks!
Well for most folks, it can give you access to quite a bit. See, the avarage joe uses the same username/password on every account they have, or its very similar. So by taking control of something unvaluable like twitter, you could indirectly gain access to their bank as well. Of course this would have to be more of a personalized attack, where you would have to know or guess where they have other accounts at.
-
April 17th, 2009, 01:09 PM
#9
Originally Posted by cross
Well for most folks, it can give you access to quite a bit. See, the avarage joe uses the same username/password on every account they have, or its very similar. So by taking control of something unvaluable like twitter, you could indirectly gain access to their bank as well. Of course this would have to be more of a personalized attack, where you would have to know or guess where they have other accounts at.
Right but that one account compromise could mean, since many corporations have employees using twitter, a compromise into the corporation. It is a doorway in. Additionally, since there are some websites that prompt ways to enhance the twitter experience, it may be a way into the environment (albeit that twitter only uses UDP -- at this point) it may still present a way in.
-
April 21st, 2009, 09:52 AM
#10
Interesting. Never thought about the UDP aspect and the possibility of inbound attacks.
I think anyone using these Twit ranking and or Twit enhancement sites get everything they deserve!
** Goes to quickly un-install Twibble.de from his Blackberry...........:0
I remember when Nihil was ickle. Does that mean I'm old?
Similar Threads
-
By tonybradley in forum Phishing and Cyber Scams
Replies: 10
Last Post: February 17th, 2022, 08:33 PM
-
By YoungNobody in forum Security News
Replies: 0
Last Post: April 11th, 2006, 03:24 AM
-
By MrLinus in forum Miscellaneous Security Discussions
Replies: 15
Last Post: January 22nd, 2005, 06:52 PM
-
By phishphreek in forum Phishing and Cyber Scams
Replies: 2
Last Post: August 20th, 2004, 11:17 PM
-
By phishphreek in forum Phishing and Cyber Scams
Replies: 3
Last Post: June 17th, 2004, 10:53 PM
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|