Skip to main content

Your Android might be controlled by a malicious Twitter account

Twitter
Image used with permission by copyright holder
Twitter has quite the storied history of being used for both good and evil, what with its ability to connect millions of people and allow them to communicate faster than ever before. But now, it’s being used to form some particularly malevolent connections.

According to a recent blog post from ESET, there’s a new kind of mobile malware that makes use of Twitter to control an Android device-based botnet. It’s the first known mobile malware to use this kind of social media account instead of a command-and-control server to exercise its power over infected devices.

Recommended Videos

It’s called Twitoor, and this Trojan apparently lies dormant on Android devices, and awaits commands from a malicious Twitter account. Commands can either tell Twitoor to download and install other applications — generally of the data-stealing mobile banking malware variety — or switch to another command-and-control Twitter account.

Please enable Javascript to view this content

“Using Twitter instead of command-and-control servers is pretty innovative for an Android botnet,” said Lukas Stefanko, the ESET malware researcher who first found the app. Apparently, it’s been around for about a month, and while it can’t be downloaded from the Google Play store, experts think that devices are infected either with text messages or malicious URLs.

The use of social media networks in the botnet’s communication is rather creative, Stefanko admits, noting, “These communication channels are hard to discover and even harder to block entirely.” He added, “In the future, we can expect that the bad guys will try to make use of Facebook statuses or deploy LinkedIn and other social networks.”

So proceed with great caution, friends. Your Android could indeed be controlled by a rogue Twitter account. “Twitoor serves as another example of how cybercriminals keep on innovating their business,” Stefanko concluded. “The takeaway? Internet users should keep on securing their activities with good security solutions for both computers and mobile devices.”

Lulu Chang
Former Digital Trends Contributor
Fascinated by the effects of technology on human interaction, Lulu believes that if her parents can use your new app…
Google Gemini is about to get a lot more useful on your Android phone
Google Gemini app on the Motorola Razr Plus 2024.

Google isn’t planning on hitting the breaks on Gemini anytime soon. After first teasing a number of new extensions during Google I/O 2024, a recent APK teardown from Android Authority has revealed a ton of unannounced, useful new features from Gemini that are soon coming to your Android phone. Gemini is expected to get a variety of new extensions that will allow integration into Google services like Keep, Tasks, and Calendar.

Each of the extensions seems to provide useful features, and Android Authority has demo videos showcasing each. With Google Keep, you can now ask Gemini to create new notes and lists, add information to notes, and add or remove items from lists. Google Tasks now lets you use Gemini to create new tasks, including reminders. It’ll also allow you to view existing tasks and show their due dates.

Read more
You might be waiting a while longer for Samsung’s Android 15 beta
The Samsung Galaxy S24 Ultra in Titanium Orange and in Titanium Silver.

Today is all about dealing with software delays. First, there's news that Apple users might have to wait a bit longer for Apple Intelligence to arrive with iOS 18 this fall. There's also news that Samsung's Android 15 beta may be later to release than we initially thought.

According to SamMobile, Samsung originally planned to release One UI 7 today. However, the release has been slightly delayed due to the public release of One UI 6.1.1 for the Galaxy S24 series.

Read more
Android 15 will give your phone an important new security feature
Android 15 logo on a Google Pixel 8.

Google is introducing a security feature in Android 15 to guard against "juice jacking" attacks, as reported by Android Authority, The new feature is currently being tested in the Android 15 beta.

Wondering what a "juice jacking" attack is? It describes an event where a hacker secretly sends data payloads to your device, should it have the ability to both charge and transfer data over the same USB connection. This includes most modern smartphones, and examples of hardware used for juice jacking include mobile charging stations. Should the attack be successful, hackers could compromise the device, wreak havoc, and endanger your privacy.

Read more