-->
J u d u l :

Hacker Use Twitter for Botnet Control


San Francisco - Now that many hackers take advantage of Twitter to send the message that update is coded to have a computer before they have been infected with the virus of evil.

It appears that this is the first case in which hackers are using popular sites to control the botnet. With a botnet, hackers concentrate that has infected the computer in order to snoop the user's computer directly, to send spam or attack a site that used the computer users with fake internet traffic.

O
ne of the experts in the field of botnet, Jose Nazario, find a structure, called a command-and-control structure or the structure of command and control. Computers that have been infected with the Twitter feed? Upd4t3? via RSS feed.

"Basically, the hacker is using to send the status message a link to a new contact. Link this new command, or contain links that can not be downloaded or run. In fact, this link is the info-stealer operation," said Nazario, as quoted from Wired . com, Friday (14/8/2009).

Twitter messages are then turned into a link that directs users to download the code or instructions to install the virus.

Previously, hackers had to use the IRC chat room to control the botnet. Now, they get new ideas by using Twitter.ne of the experts in the field of botnet, Jose Nazario, find a structure, called a command-and-control structure or the structure of command and control. Computers that have been infected with the Twitter feed? Upd4t3? via RSS feed.

"Basically, the hacker is using to send the status message a link to a new contact. Link this new command, or contain links that can not be downloaded or run. In fact, this link is the info-stealer operation," said Nazario, as quoted from Wired . com, Friday (14/8/2009).

Twitter messages are then turned into a link that directs users to download the code or instructions to install the virus.

Previously, hackers had to use the IRC chat room to control the botnet. Now, they get new ideas by using Twitter.
>