High profile Twitter hack spreads porn Trojan

Malware posted to Guy Kawasaki's Twitter page attacks the Mac and the PC

Former Apple Macintosh evangelist Guy Kawasaki [cq] posts Twitter messages about a lot of different things, but the message he put up on Tuesday afternoon was really out of character.

"Leighton Meester sex tape video free download!"

His message included a link that, after some further clicking, landed Kawasaki's followers on a fake porn site where online criminals try to install a nasty Trojan horse program on victim's computers. And in an interesting twist, the program attacks both Mac and Windows users.

Kawasaki, a well known entrepreneur who is now a a managing director of Garage Technology Ventures, isn't the only person whose account was misused during a new round of Twitter hacking Tuesday, but with nearly 140,000 followers he's the most high-profile. Meester, the star of the TV Show GossipGirl is also said to be the subject of a homemade sex tape that is reportedly in circulation.

It's not clear how hackers managed to gain access to Kawasaki's account -- security experts say that he and others may have fallen victim to earlier Twitter phishing attacks, where attackers tried to trick victims into logging into fake Twitter sits in hopes of stealing their login credentials.

Other hacked accounts are being used to to promote pornographic Web sites. Victims include an Arizona political blogger, an up-and-coming Canadian musician, and a Gay news site. (note, some of these Twitter pages still include pornographic and possibly malicious links)

Twitter has had its share of security problems over the past months. Earlier this year someone gained access to the Twitter accounts of U.S. President Barack Obama, Britney Spears, and others.

Recently scammers have become more aggressive on the site. They will set up new accounts and post spam messages on hot topics in hopes of gaining clicks when people search through Twitter.

And while hacked Twitter accounts are still rare, they're a much more effective way to reach victims, according to Rik Ferguson, a researcher with Trend Micro. "If you can take over an account that has a couple of thousand follower then you can get a much better return on your investment"

The Trojan link posted by Guy Kawasaki has been followed by more than 1,600 people, according to Gary Warner, director of research in computer forensics with the University of Alabama at Birmingham.

If a Windows user actually falls for the scam and downloads the Trojan linked by Kawasaki, the software will change his DNS (domain name system) server to one that is controlled by the hackers. That gives them away to steal more information, such as Twitter passwords or even online banking credentials, Warner said. "You're going to be using a DNS server that's controlled by criminals who can point you to whatever Web site you want and you'll believe it's the site you typed into your browser."

Mac users download a similar program, which also points them to a malicious DNS server, a McAfee spokesman said.

Kawasaki didn't respond to messages left by the IDG News Service asking him about the incident, but he did leave a Twitter message late Tuesday afternoon, "Don't know how that Leighton Meester sex tape tweet got into my stream here. Sorry all. Sad thing is that I don't even know who she is!" he wrote. Although Kawasaki admitted he hadn't posted the link, he also did not remove it from his Twitter page.

Join the CSO newsletter!

Error: Please check your email address.

Tags securitysocial networkingtwittertrojan

More about AppleMcAfee AustraliaTrend Micro Australia

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Robert McMillan

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts