The popular social media service Twitter is being targeted by a new attack seeking access to user accounts to send spam via direct messages.
At first, the attack was thought to be the result of "phishing" or social engineering asking people to enter their username and password details into bogus sites masquerading as Twitter's website, possibly done by utilising a cross-scripting vulnerability.
However, New York-based PHP and application security specialist Chris Shiflett says that he strongly suspects there's a new variant of the Facebook worm Koobface at large, which searches for users' session ID cookies. These are set on users' computers when they tick the "Remember Me" box to stay logged onto Twitter.
While the exact scale of the attack isn't known, anecdotal evidence suggests many thousands of people have been affected and have had their accounts compromised.
Once it has access to the session cookies, the worm can log on to Twitter and send direct messages to the followers of the user whose account has been compromised.
Complicating the issue is the fact the worm has yet to be found -- the specialist says it appears the worm deletes itself after finishing its programmed task. However, the modus operandi of the worm is similar to earlier Koobface attacks, the specialist say.
Apart from a primary payload of infecting further machines, the worm appears to be sending out direct message spam for a Premium SMS "quiz" service website, aimed at US customers. The service has a minimum charge of US$4.99, and a US$10 a month continual cost.
Koobface runs on Windows only and is highly polymorphic with over 20,000 variations discovered so far, making it hard to protect against.
Find your next job with computerworld UK jobs