Q

How to secure Twitter accounts against man-in-the-browser attacks

Amid recent man-in-the-browser attacks aimed at Twitter, expert Nick Lewis explains how enterprises can best secure business Twitter accounts.

My organization uses Twitter to communicate with customers, so I was concerned by reports of man-in-the-browser attacks affecting Twitter users. Could you explain what attackers are doing and if there is any way to defend against them?

Ask the Expert!

SearchSecurity expert Nick Lewis is standing by to answer your questions about enterprise security threats. Submit your question via email. (All questions are anonymous.)

Social media security is a quickly evolving area of information security. As enterprises increasingly use social media accounts to engage customers and promote brands, attackers, as they are always wont to do, will follow enterprise activity and seek to exploit any and every weakness they can find in the major social media platforms.

In this case, malware authors have quickly figured out how to use compromised Twitter accounts to spread their malware. The most recent Twitter malware used a man-in-the-browser attack to compromise local accounts and gain access to Twitter application programming interfaces (APIs). Once API access was obtained, the malware would send malicious links. Previous attacks on Twitter have taken advantage of cross-site scripting vulnerabilities, where a malicious tweet could also inject JavaScript and cause the user to retweet the malicious content.

There are several ways to protect your organization's accounts against Twitter-based malware. First and foremost, post links for Twitter followers that promote security awareness around Twitter usage; Twitter's official security awareness page is the obvious place to start, but organizations such as Forrester also maintain information to promote better social media security. Beyond user awareness, organizations should ensure that any system or user with access to an enterprise Twitter account is using a secure computer to help minimize the impact if the computer is compromised. Simple steps to ensure such security measures include making sure that users' software has been updated to the most recent versions and rolling out security patches from the likes of Microsoft and Adobe as soon as possible.

As for Twitter-specific security measures, an organization could detect if its Twitter account was compromised by downloading a copy of all its tweets and running any posted URLs through an anti-malware service to see if any of the links were malicious. If a malicious link is found, this could be a good indicator the Twitter account was compromised, and if this is the case, the organization should delete the malicious tweets and inform its followers that its account was breached so they can be aware their own systems may be compromised. In response to recent attacks on high-profile accounts, Twitter has also enabled two-factor authentication capabilities, which could further secure Twitter accounts against various attacks.

This was first published in March 2014

Dig deeper on Social media security risks and real-time communication security

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close