Twitter folk preyed on (again)

Abuse of Twitter users is getting to be such a regular thing than a wiser journalist would write a macro for the story, though for once they're not being duped into revealing their passwords. That said, Rik Ferguson at Trend Micro is reporting today that a site sharing a name with a brand-new iPhone application for the popular microblogging service has a nasty little malware payload waiting for the unwary.

The application, TweetFollow, was released just last week. It is safely available from its developers at b1te.com, as well as from Apple's apps store. It is not, however, available from tweetfollow.com, which instead has a JavaScript infection called, in Trend Micro parlance, JS_IFRAME.AKK. The domain was registered on December 31, 2008 to John Dennis of Netus Group, with whom Betanews has left a message requesting clarification concerning a) how the site is connected to the TweetFollow application and b) why the site has JavaScript cooties. We'll keep you posted.

6 Responses to Twitter folk preyed on (again)

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.