Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Android Malware Can Control Your Phone Through Twitter

Alert: Android Malware Can Control Your Phone Through Twitter

Hackers continue to innovate and cause trouble for businesses of all industries and sizes. One of the more interesting recent tactics includes utilizing a malicious Twitter account to command a botnet of Android devices to do its bidding. Twitoor is considered to be the first real threat to actively use a social network in this manner, making this a major cause for concern.

Twitoor is an app that, when installed, places a Trojan on the Android device that receives commands from a central Twitter account. Twitoor can download and install malicious applications, steal data, and switch between alternative command-and-control Twitter accounts. Since you can’t find Twitoor on the Google Play store, it’s thought that it spreads through downloading via a malicious link and “side-loading” it onto a device.

Once Twitoor has been installed on the device, it becomes a part of a botnet. Botnets are commonly used by cyber criminals to spread the influence of their malware across multiple devices. The idea is to infect as many devices as possible by creating “zombie-bots,” or devices that are enslaved and forced to adhere to the hackers’ commands. These networks are capable of performing actions that singular devices cannot, like initiate DDoS attacks. Normally, a typical botnet can leave behind signs of its origins (where it’s receiving commands from), which security professionals can use to find the source of the botnet. They can then shut down the server issuing the commands, but in the case of Twitoor, it’s a bit more complicated.

The problem with Twitoor is that its devices receive commands from a Twitter account that’s always changing. This helps it to avoid detection. ZDNet explains further measures taken by the message to avoid detection: “Those behind the malware have also taken additional steps to safeguard Twitoor, including encrypting messages to further obfuscate their activities.” This makes Twitoor more difficult to destroy at its roots than a typical botnet.

Criminals are adapting their approaches to hacking in an attempt to innovate and explore new opportunities, and Twitoor is the perfect example of this. You always need to be aware of all types of threats, not just traditional ones. We recommend that you reach out to Voyage Technology for assistance with securing your organization’s network security. This includes mobile devices like smartphones, tablets, and laptops.

In particular, a mobile device management solution can help your organization keep tabs on its mobile devices. You can secure your devices through whitelisting and blacklisting apps, limiting access to sensitive data, and remotely wiping devices that are in danger of being compromised or infection. These preventative measures are designed to mitigate risk, which is an essential part of working with technology solutions.

To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 22 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Information Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Covid-19 Training Gadgets Compliance Server Remote Work Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Vendor Two-factor Authentication Mobile Office Managed Services Data Security Apps BYOD Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Voice over Internet Protocol Apple Networking App Employer-Employee Relationship Computing Physical Security Hacker Information Technology HIPAA Avoiding Downtime Applications Marketing Access Control Office 365 Conferencing Managed IT Services How To BDR Operating System Computers Virtual Private Network Risk Management Router Website Health Office Tips Analytics 2FA Augmented Reality Help Desk Retail Storage Password Bring Your Own Device Healthcare Big Data Remote Monitoring Windows 7 Vulnerability End of Support Vendor Management Customer Service Cybercrime Microsoft 365 Solutions Display Printer Paperless Office Infrastructure Windows 11 Firewall Document Management Monitoring Excel The Internet of Things Scam Data loss Remote Workers Managed IT Service Telephone Social Going Green Patch Management Cooperation Free Resource Save Money Project Management Images 101 Settings Printing Wireless Content Filtering Multi-Factor Authentication Mobility Telephone System Hacking IT Management Cost Management Presentation VPN YouTube Meetings Cryptocurrency Wireless Technology Employees Computer Repair Integration Virtual Desktop User Tip Modem Data storage LiFi Processor Mobile Security Word Holidays Outlook Machine Learning Money Data Storage Smart Technology Supply Chain Humor Video Conferencing Managed Services Provider Maintenance Saving Time Virtual Machines Professional Services Safety Antivirus Sports Mouse Downloads Administration iPhone Licensing Entertainment Vulnerabilities Robot Data Privacy Customer Relationship Management Alt Codes Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Competition Downtime Unified Threat Management Gamification Flexibility Staff Value Business Intelligence Social Networking Legislation Shortcuts Unified Threat Management Hosted Solution Organization Typing Fileless Malware Digital Security Cameras Smart Devices Ransmoware Content Remote Working Network Congestion Wearable Technology Memory Vendors Knowledge Motherboard Data Breach Comparison Google Play Be Proactive Google Drive User Error User Health IT Directions Videos Assessment Electronic Health Records Permissions Workforce Point of Sale 5G Wasting Time Threats Experience Trend Micro Specifications Security Cameras Workplace Strategies IP Address Google Docs Unified Communications Bitcoin Network Management Microchip Running Cable Tech Support Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Google Wallet Username Monitors eCommerce Black Friday SSID Recovery Hard Drives Windows 8 Laptop Websites Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Domains Drones Proxy Server Reviews Electronic Medical Records Cookies Cyber Monday Medical IT SharePoint Refrigeration Halloween Tactics Development Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Public Speaking Lenovo Writing Shopping Virtual Reality Nanotechnology Optimization PowerPoint Lithium-ion battery Hacks Server Management Entrepreneur Scary Stories Private Cloud Addiction Language Employer/Employee Relationships Outsourcing Fun Chatbots Navigation Superfish Identity Theft Management PCI DSS Deep Learning Gig Economy Twitter Screen Reader Distributed Denial of Service Workplace Undo Error Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Social Engineering Identity Evernote Paperless Education Regulations Compliance Bookmark Remote Computing Smart Tech Memes Co-managed IT Mobile Computing Download Net Neutrality Alerts SQL Server Technology Care Search History Business Communications Tablet Financial Data Application Best Practice Browsers Smartwatch Alert Connectivity IT Break Fix Scams Managed IT Buisness File Sharing Upload Procurement Dark Data Azure Hybrid Work How To Cyber security Multi-Factor Security Tech Human Resources IBM Legal IT solutions Social Network Telework Business Growth CES Notifications IoT Communitications Dark Web Cables Travel Trends Supply Chain Management Cortana Regulations Google Calendar Term Google Apps Techology Google Maps Customer Resource management FinTech

Blog Archive