Twitter Impersonated to Steal Credentials

July 2, 2020

Social media access can provide a lens into other parts of a person's life, making Facebook and Twitter unique when it comes to credential phishing campaigns. In this attack, cybercriminals targeted a specific individual who works at an organization that heavily leverages Twitter. This attack was intended to steal this individual's Twitter credentials, and provide access to their entire Twitter environment.

Summary of Attack Target

  • Platform: Office 365
  • Email Security Bypassed: Proofpoint
  • Payload: Malicious Link
  • Technique: Impersonation

Overview of Twitter Impersonation Attack

In this attack, the attacker impersonates a security notification email from Twitter. The sender email contains the Twitter brand name in the domain and the message states that there may have been a malicious login on the user’s account. In order to protect their account, the recipient must log in from the link provided.

The link is wrapped with text and redirects twice. The first redirect is hosted on a dynamic DNS service, and the second redirect is hosted by a recently registered anonymous domain that impersonates the Twitter landing page. The landing page is identical to the legitimate Twitter login page, and the domain contains the Twitter brand name as well.

Once on the landing page, if the user inputs their login credentials, the attacker can utilize this information to compromise the account.

Why the Twitter Credential Phishing Attack is Successful

By masquerading as a security notification, the attacker is able to inject a sense of urgency into this correspondence. The user’s main focus is to ensure the protection of their account, rather than dwelling on whether or not the email itself is authentic. Because the link is concealed with text, the user may hastily click the link to protect their account, without realizing that the link directs to a fake Twitter login page.

In addition, the email appears to be a legitimate automated notification, with the fake landing page appearing similar to Twitter's actual login page. By impersonating a security notification email, the attacker gains a sense of credibility to the user because, by notifying the recipient of a case of a “bad” login, the recipient believes the email to be “good”. The section of the email “How do I know an email is from Twitter?” is crafted by the attacker in an attempt to legitimize this attack to further fool the target.

This attack is highly sophisticated and unique, as it targets a specific individual in this organization. This type of attack has not been seen anywhere else, and the domain of the payload link was not flagged as malicious by many search engines. Compared to many social media phishing campaigns, this particular attack stands out as it is very selective in who is the recipient of such a unique attack.

Nevertheless, Abnormal was able to detect and stop it due to a variety of factors, including the suspicious link, unusual sender, and unusual reply-to address. Combined with the language that attempts to steal personal information, it quickly becomes clear that this email is malicious.

Interested in preventing these types of attacks for your employees? See a demo of the Abnormal Security platform today.

Previous
Blog green surveymonkey
SurveyMonkey is a survey service that is normally used to host legitimate surveys. However, sometimes attackers will utilize file sharing and surveying sites like SurveyMonkey to host redirect links to a phishing webpage. By using these legitimate services...
Read More
Next
Blog green stars
Abnormal Security has observed attackers impersonating major social media platforms like Instagram, Facebook, and Twitter to steal the login credentials of employees at enterprise organizations. In the past two months, we have seen a 60% increase for several organizations...
Read More

Related Posts

Blog engineering cybersecurity careers
Cybersecurity Careers Awareness Week is a great opportunity to explore key careers in information security, particularly as there are an estimated 3.1 million unfilled cybersecurity jobs. This disparity means that cybercriminals are taking advantage of the situation, sending more targeted attacks and seeing greater success each year.
Read More
Blog hiring cybersecurity leaders
As with every equation, there are always two sides and while it can be easy to blame users when they fall victim to scams and attacks, we also need to examine how we build and staff security teams.
Read More
Cover automated ato
With an increase in threat actor attention toward compromising accounts, Abnormal is focused on protecting our customers from this potentially high-profile threat. We are pleased to announce that our new Automated Account Takeover (ATO) Remediation functionality is available.
Read More
Email spoofing cover
Email spoofing is a common form of phishing attack designed to make the recipient believe that the message originates from a trusted source. A spoofed email is more than just a nuisance—it’s a malicious communication that poses a significant security threat.
Read More
Cover cybersecurity month kickoff
It’s time to turn the page on the calendar, and we are finally in October—the one month of the year when the spooky becomes reality. October is a unique juncture in the year as most companies are making the mad dash to year-end...
Read More
Ices announcement cover
Abnormal ICES offers all-in-one email security, delivering a precise approach to combat the full spectrum of email-borne threats. Powered by behavioral AI technology and deeply integrated with Microsoft 365...
Read More
Account takeover cover
Account takeovers are one of the biggest threats facing organizations of all sizes. They happen when cybercriminals gain legitimate login credentials and then use those credentials to send more attacks, acting like the person...
Read More
Blog podcast green cover
Many companies aspire to be customer-centric, but few find a way to operationalize customer-centricity into their team’s culture. As a 3x SaaS startup founder, most recently at Orum, and a veteran of Facebook and Palantir, Ayush Sood...
Read More
Blog attack atlassian cover
Credential phishing links are most commonly sent by email, and they typically lead to a website that is designed to look like common applications—most notably Microsoft Office 365, Google, Amazon, or other well-known...
Read More
Blog podcast purple cover
Working at hyper-growth startups usually means that unreasonable expectations will be thrust on individuals and teams. Demanding timelines, goals, and expectations can lead to high pressure, stress, accountability, and ultimately, extraordinary growth and achievements.
Read More
Blog yellow skyline
No one wants to receive an email from human resources that they aren’t expecting. After all, that usually means bad news. And when we think there may be bad news, cybersecurity training tends to fall by the wayside. Threat actors know this, and they’re taking advantage of human emotions.
Read More
Blog rising building
There is little doubt that business email compromise and other advanced email threats are causing significant damage–both financial and reputational—to organizations worldwide. Because these never-before-seen attacks contain few indicators of compromise, they evade secure email gateways and other traditional email infrastructure...
Read More