Virus taken over Twitter

Hackers exploited a loophole in Java Script on Twitter, which makes Lritwite opening messages automatically malicious sites
Virus attack on micro hard hits - Belogynge Twitter. Last hour service users encounter a series of distorted messages - black spots, blue lines and error messages. This error code is a breach
of the site, was exploited by hackers.Breach the code uses Java script includes an order enough to go with the mouse cursor to activate, even without clicking on the tweet. As a result, anyone who goes with the cursor on the infected messages, making them an "Ritvwite" Automatically re-publish them. Those who pass on messages with links - the links open without clicking, and sent to external sites that may be harmful. So far, thousands of users Huatkelv this way, including Sarah Brown - wife of British Prime Minister Gordon Brown, Japanese porn site link posted in her feed.To avoid this problem you can use third party software - Tuesday communicate with Twitter, since the problem only occurs on the site itself - and the new version (it get some users). Security experts estimate that the gap was used to initially harmless prank, but now distributed in this way a network worm.Bloch Kfir surfer Facebook published an explanation for what happened on Twitter: "They took over the function of Java Script is of sending Twitty. Someone planted Twitty containing JavaScript that says the Web is run every time someone passes it with the mouse. What happens the text of the Tweety Tweety actually sent back new, which means that Tweety is redistributed by anyone who goes through it with the mouse Buvub. There is also a style that makes all Twitty black. luck Towettim impossible to duplicate, it means that anyone distributing the worm just once " , explained Bloch statement.Twitter has not yet responded to the crash. Know the number of service failures and attacks in recent years. Even in 2009 it had spread a network worm unwanted messages flooding.
Update (16:05): Twitter said that the problem was identified and fixed.

0 comments:

Post a Comment