• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Bad Sites   »   The Dark Side of Social Media

The Dark Side of Social Media

  • Posted on:December 7, 2011 at 6:52 am
  • Posted in:Bad Sites
  • Author:
    Maxim Goncharov (Senior Threat Researcher)
39

On December 6 2011, a number of pro-Kremlin activists launched an attack on Twitter using bots which posted messages with a hashtag #триумфальная (Triumfalnaya). These bots posted a range of national slogans and crude language. With a rate of up to 10 messages per second, these bots succeeded in blocking the actual message feed with that hashtag.

The reason to boycott the conversations surrounding the pre-arranged #триумфалtная (Triumfalnaya) hashtag was that it had been announced as a channel for exchanging information by anti-government opposition protesters, and was also been used as a live text translation on protestor actions against the recent election results in Russia – which are taking place at Triumfalnaya Square in Moscow.

Below is a list of possible bots, many of which may be compromised accounts:

  • berk
  • Руслан Дельянов
  • Jeje89
  • karyn
  • Armalda Balistreri
  • Tiernan Magers
  • aretha
  • Scarlett Rotz
  • pascale
  • Михаил Южный
  • benedict
  • Player Heine
  • alisa
  • Matrona Severson
  • Сережа Логинов
  • Oberon Buechner
  • сен-бернар
  • Polinski Leinen
  • евсей
  • alden
  • savannah
  • Fornof Ruf
  • Clower Provencher
  • Thorne Brager
  • shay
  • дедал
  • brett
  • Levy Valois
  • velma
  • Kellyn Slavin
  • Holden Petro
  • mercedes
  • kenyon
  • holmes
  • тифонтай
  • Юрий Подковыров
  • amber
  • Undry Vantassell
  • tanek
  • timon
  • avram
  • erin
  • price
  • jessica
  • Octavius Cauffman
  • piper
  • баба-яга
  • Кирилл Ст.
  • charity
  • claudia
  • amos
  • veda
  • Stokes Correira
  • heidi
  • Николай Шматок
  • Dietsche Downer
  • orli
  • Magnum Shimmel
  • ronan
  • Lydon Eskola
  • devin
  • chantale

Twitter has always been used as a effective communication tool for coordination, such as during natural disasters; and for the world to remotely keep track of key events. These recent attacks show how the same technology can be used to for one side of a debate to attempt to silence the other side – the equivalent to one group having loudspeakers.

Whether the attack was supported officially or not is not relevant, but we can now see how social media has become the battlefield of a new war for freedom of speech.

Learn how to protect Enterprises, Small Businesses, and Home Users from ransomware:
ENTERPRISE »
SMALL BUSINESS»
HOME»

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Recent Posts

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits
  • August Patch Tuesday Fixes Critical IE, Important Windows Vulnerabilities Exploited in the Wild
  • Water Nue Phishing Campaign Targets C-Suite’s Office 365 Accounts

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.