Beautynetkorea

Monday, December 14, 2009

Torpig Domain Generator : Hackers Using Twitter Trending Topics

 ana05     December 14, 2009     News, Twitter     No comments   

Torpig botnet uses Twitter API (trends) to generate new pseudo-random domain names of attack sites where infected websites silently redirect visitors to. Active domain names change at least twice a day.

This real-time tool generates a domain name of the currently active attack site and two domain names that hackers should activate in upcoming 24 hours.

 twitter bot

This tool is a initiative by a hacker Denis or you can say a security guy. The tool uses JavaScript and Twitters API to find a domain for attacking using the twitters Trending topics.

Well its big hole in the whole twitter’s API and the way this tool have predicted the domain names are right one so far. Its now the all up to the twitter API developers hand…

 

What is Torpig Botnet

Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security threats on the Internet.

 

A particularly sophisticated and insidious type of bot is Torpig, a malware program that is designed to harvest sensitive information (such as bank account and credit card data) from its victims.

 js

At the beginning of 2009, we took control of the Torpig botnet for ten days. Over this period, we observed more than 180 thousand infections and recorded more than 70 GB of data that the bots collected.

 

Torpig relies on domain flux not only for its main C&C servers, but also to generate the names of the drive-by-download servers that it uses to spread. In traditional drive-by-download attacks, the iframe or script tags reference a hard-coded domain to redirect the victim browser to a malicious webpage to start the attack.

 

However, Torpig redirects victims to a malicious webpage by computing a pseudo-random domain name on-the-fly (seeded by the current date) using JavaScript code.

 

Two Twitter API Botnet Uses

 

However, this time they use two consecutive calls to Twitter (was one).

The first request goes to

 

http://search.twitter.com/trends/daily.json?callback=callback

 

The response contains a timestamp (current time) and hackers use it to calculate a date (2 or 3 days before the current date) for the next API request.

 

http://search.twitter.com/trends/daily.json?date=yyyy-mm-dd"&callback=callback2

where yyyy-dd-mm is the calculated date. This request returns the top 20 trending topics for each hour in a given day.

as per the author..

 

Conclusion

Well you can also view the hackers blog post on Here . Overall its a good news for some malicious hackers who work on some twitter stuff and try to get victims. But it has some hole in this botnet too..

 

botnets

 

Happy Hacking @hackerthedude

  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
Email ThisBlogThis!Share to XShare to Facebook

Related Posts:

  • Darren Kitchen On Hackers Vs Cyber Criminals [Video]Darren Kitchen is Hacker and Host of a hackers show Hack5. He is well know hacker and is been in computer for a long time. well hack5 is video podcast… Read More
  • Is Google Chrome OS Really LeakedYeah, You heard it right the new Google product or you can say the upcoming Stunning Product of Google the Google Chrome OS is leached or its working … Read More
  • New BIOS Virus Which Can Make Your Anti-Virus UselessHackers Have once again launched a Root kit Virus which loads directly into the BIOS memory of the computer and makes it prone . Well BIOS mem… Read More
  • 2009 Is The Year Of Biggest Data Breach's Ever Says Forbes.icc { background: url(http://concept.makedesignnotwar.com/themes/wp/mu/wpmu/wp-content/themes/concept/img/content/gridbg.gif) white;} .icc a:hover { … Read More
  • John Matherly Launches Shodan : A Computer Search EngineJohn Matherly is a Serial webapp developer and entrepreneur and is great in developing cool and very useful programs whether its web based or its a pl… Read More
Newer Post Older Post Home

0 Comments:

Post a Comment



Popular Posts

  • Weekend Wrap-Up
    THIS WEEK: So, this week was exhausting! I spent most of my time wiping running noses, soothing coughs, waking up in the middle of the nigh...
  • Max Factor Radiant Lift Foundation
    Radiant Lift is Max Factor's latest foundation that promises a radiant finish and all day hydration. I was sent two of the darkest shade...
  • How To Download as premium on all premium hosting !
    There have been a very long discussion on how to download on premium websites such as Rapidshare.com , MegaUpload.com , Megarotic.com and S...
  • MISSHA LINE FRIENDS EDITION: NEW PRODUCTS
    Because one release is never enough. Not too long ago, MISSHA released a load of cute products in collaboration with LINE . This is the seco...
  • New in #80 - Hair Care Edition
     JOICO K-Pak Deep Penetrating Reconstructor I used to have this product many years ago when I had highlights and then dyed my hair red and b...
  • FARMASI Matte Liquid Lipsticks
    Od siječnja stižu upiti u inbox na Facebooku o Farmasi tekućim mat ruževima. Svi su se zanimali za njih, nitko se nije mogao dokopati ruževa...
  • The Beauty Products Going VIRAL On TikTok
    via Giphy If a product goes viral on TikTok it usually means one of two things: it’s either super affordable and/ or gives the most amazing...

Copyright © 2025 Beautynetkorea | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates