Twitter has put a stop to a worm that posted obscene messages to victims' Twitter feeds. It's the second worm attack the site has suffered in a week.
Those whose accounts became infected with the worm would see a message posted on their Twitter account that read in part "WTF:" followed by a URL, according to a blog post from Sophos, a security vendor:
http://www.sophos.com/blogs/gc/g/2010/09/26/wtf-twitter-goat-viral-message-spreadsIf someone clicked on the link, their profile would also be hijacked, reposting the same link and increasing the chance that one of their followers would click on it and spread the worm.
Sophos wrote that the worm used a cross-site request forgery (CSRF) technique in order to post to someone's account. In a CSRF attack, a Web application is tricked into honoring a request from a malicious Web site.
The attack was invisible to those who clicked on the link. "All the user sees if they visit the link is a blank page, but behind the scenes it has sent messages to Twitter to post from your account," wrote Graham Cluley, senior technology consultant for Sophos.
Twitter wrote on its status blog on Sunday that "a malicious link is making the rounds that will post a tweet to your account when clicked on:
http://status.twitter.com/post/1192873885/malicious-links-on-twitter Twitter has disabled the link, and is currently resolving the issue."
It the second time in a week Twitter has been hit with an attack as the result of a flaw in the site's coding. Last week it closed a cross-site scripting (XSS) flaw that could allow an attacker to steal data:
http://scforum.info/index.php/topic,4557.0.html Some of those who picked up on it wrote proof-of-concept code that combined JavaScript with the "onmouseover" function, which would launched a pop-up window. The problem was quickly fixed by Twitter.
(PCW)