Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Android Malware Can Control Your Phone Through Twitter

Alert: Android Malware Can Control Your Phone Through Twitter

Hackers continue to innovate and cause trouble for businesses of all industries and sizes. One of the more interesting recent tactics includes utilizing a malicious Twitter account to command a botnet of Android devices to do its bidding. Twitoor is considered to be the first real threat to actively use a social network in this manner, making this a major cause for concern.

Twitoor is an app that, when installed, places a Trojan on the Android device that receives commands from a central Twitter account. Twitoor can download and install malicious applications, steal data, and switch between alternative command-and-control Twitter accounts. Since you can’t find Twitoor on the Google Play store, it’s thought that it spreads through downloading via a malicious link and “side-loading” it onto a device.

Once Twitoor has been installed on the device, it becomes a part of a botnet. Botnets are commonly used by cyber criminals to spread the influence of their malware across multiple devices. The idea is to infect as many devices as possible by creating “zombie-bots,” or devices that are enslaved and forced to adhere to the hackers’ commands. These networks are capable of performing actions that singular devices cannot, like initiate DDoS attacks. Normally, a typical botnet can leave behind signs of its origins (where it’s receiving commands from), which security professionals can use to find the source of the botnet. They can then shut down the server issuing the commands, but in the case of Twitoor, it’s a bit more complicated.

The problem with Twitoor is that its devices receive commands from a Twitter account that’s always changing. This helps it to avoid detection. ZDNet explains further measures taken by the message to avoid detection: “Those behind the malware have also taken additional steps to safeguard Twitoor, including encrypting messages to further obfuscate their activities.” This makes Twitoor more difficult to destroy at its roots than a typical botnet.

Criminals are adapting their approaches to hacking in an attempt to innovate and explore new opportunities, and Twitoor is the perfect example of this. You always need to be aware of all types of threats, not just traditional ones. We recommend that you reach out to Voyage Technology for assistance with securing your organization’s network security. This includes mobile devices like smartphones, tablets, and laptops.

In particular, a mobile device management solution can help your organization keep tabs on its mobile devices. You can secure your devices through whitelisting and blacklisting apps, limiting access to sensitive data, and remotely wiping devices that are in danger of being compromised or infection. These preventative measures are designed to mitigate risk, which is an essential part of working with technology solutions.

To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 06 July 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Efficiency Internet IT Support Malware Privacy Google Computer Email Workplace Tips Phishing Hosted Solutions IT Services Users Collaboration Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Microsoft Cybersecurity Passwords Communication Data Backup Saving Money Smartphone Backup Managed Service Android Smartphones VoIP Business Management Mobile Devices Upgrade communications Disaster Recovery Social Media Data Recovery Browser Windows Managed IT Services Microsoft Office Productivity Current Events Remote Network Tech Term Internet of Things Automation Artificial Intelligence AI Facebook Gadgets Covid-19 Cloud Computing Holiday Miscellaneous Server Remote Work Managed Service Provider Outsourced IT Information Compliance Spam Employee/Employer Relationship Encryption Training Windows 10 Office Business Continuity Government Data Management Business Technology IT Support Blockchain Bandwidth Windows 10 Wi-Fi Virtualization Two-factor Authentication Apps Vendor Mobile Office Data Security Employer-Employee Relationship Chrome Budget Apple Networking App Mobile Device Management Gmail BYOD Managed Services Voice over Internet Protocol Access Control Office 365 Tip of the week Hacker HIPAA Avoiding Downtime How To Applications Marketing BDR Computing Conferencing WiFi Information Technology Health Analytics Office Tips Augmented Reality Retail Computers Storage Password Bring Your Own Device Router Managed IT Services Website Help Desk Operating System Virtual Private Network Risk Management Big Data Healthcare Social Paperless Office Infrastructure Cooperation Free Resource Project Management Windows 7 Document Management Customer Service Microsoft 365 Solutions Scam Data loss Windows 11 Going Green Patch Management Save Money Remote Monitoring Monitoring 2FA Firewall Vulnerability End of Support Vendor Management Cybercrime Excel Physical Security The Internet of Things Remote Workers Display Printer Telephone iPhone Virtual Desktop LiFi Licensing Data storage Vulnerabilities Entertainment Data Privacy Outlook Machine Learning Customer Relationship Management Money Images 101 Humor Telephone System Multi-Factor Authentication Mobility Hacking Cost Management Maintenance Presentation Antivirus Sports Mouse Wireless Technology Employees Integration Administration User Tip Modem Mobile Security Processor Word Holidays Robot Data Storage Settings Smart Technology Supply Chain Printing Wireless Video Conferencing Content Filtering IT Management Managed Services Provider Professional Services VPN Saving Time YouTube Meetings Virtual Machines Safety Cryptocurrency Managed IT Service Computer Repair Downloads Break Fix Scams Application Google Wallet Browsers Smartwatch Connectivity IT Monitors Upload Procurement Azure Hybrid Work Windows 8 Social Network Telework Laptop Websites Cyber security IBM Multi-Factor Security Tech Human Resources Dark Web Cables Drones CES IoT Communitications Trends Supply Chain Management Electronic Medical Records SharePoint Customer Resource management FinTech Halloween Regulations Google Calendar Term Google Apps Writing Microsoft Excel IT Maintenance Lenovo Data Analysis Star Wars IT Assessment Gamification Flexibility Virtual Reality Staff Value Business Intelligence Competition Hacks Server Management Organization Scary Stories Private Cloud Social Networking Legislation Shortcuts Fun Ransmoware Superfish Fileless Malware Digital Security Cameras Identity Theft Smart Devices Deep Learning Content Remote Working Twitter Wearable Technology Memory Vendors User Health IT Error Motherboard Data Breach Comparison Google Play Be Proactive Social Engineering Permissions Workforce Directions Videos Education Assessment Electronic Health Records Remote Computing Wasting Time Threats Mobile Computing Trend Micro IP Address Specifications Security Cameras Workplace Strategies Internet Exlporer Software as a Service Search Fraud Meta Microchip Tablet Best Practice Username Alert Managing Costs Amazon Black Friday SSID Recovery Managed IT Buisness File Sharing eCommerce Dark Data Database Surveillance How To Virtual Assistant Outsource IT Hard Drives Legal IT solutions Business Growth Notifications IT Technicians Virtual Machine Environment Domains Media Cyber Monday Medical IT Proxy Server Reviews Travel Cookies Tactics Development Cortana Hotspot Transportation Small Businesses Refrigeration Techology Google Maps Alt Codes Mirgation Hypervisor Displays Public Speaking PowerPoint Shopping Downtime Unified Threat Management Nanotechnology Optimization Lithium-ion battery Addiction Language Employer/Employee Relationships Outsourcing Entrepreneur Unified Threat Management Hosted Solution Typing Management PCI DSS Chatbots Navigation Distributed Denial of Service Workplace Gig Economy Screen Reader Network Congestion Service Level Agreement Internet Service Provider Knowledge Computing Infrastructure Teamwork Hiring/Firing Undo Google Drive User Error Regulations Compliance Identity Evernote Paperless Co-managed IT Bookmark Point of Sale Smart Tech Memes 5G Download Net Neutrality Experience Alerts SQL Server Technology Care Google Docs Unified Communications Bitcoin Network Management Financial Data Running Cable Tech Support History Business Communications

Blog Archive