• MENU
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar

SecNews In Depth IT Security News

  • Blog
  • Inet
  • Security
  • Investigations
  • tweaks
  • Views
  • TV
  • Search
  • Blog
  • Inet
  • Security
  • Investigations
  • tweaks
  • Views
  • TV
  • Search
Home / security / Hackers use Twitter Card vulnerability and attack users

Hackers use Twitter Card vulnerability and attack users

23 July, 2019, 6: 18 by Absent Mia Leave a Comment

Twitter

Twitter was found with a new one vulnerability, which could allow hackers to attack platform users. Accordingly, the vulnerability was detected in the operation “Twitter Cards”. Hackers can take advantage of it vulnerability and target users by malicious sharing software and realizing Phishing attacks.

Vulnerability

The vulnerability in Twitter Cards is related to the way the URLs are displayed. When the hacker uses the vulnerability, the tweet will display the Twitter Card for one website, but will actually redirect the user to another site.

Twitter 's vulnerability became known by Terence Eden, who discovered it when he detected a malicious tweet. Eden remarked that the tweet led the user to a completely different site than what he was showing.

As the platform explains, you can attach with Twitter Cards photos, video and multimedia on Tweets, helping to increase traffic to your site.

However, the problem lies in the fact that users redirected to other sites.

Accordingly, this vulnerability still exists.

Most worrying is that despite the fact that vulnerability has been known for some months, Twitter has not taken care of it. Any hacker could exploit and attack Twitter users, even before it was released.

Additionally, it is impossible to find the wrong redirect. This makes vulnerability particularly dangerous.

The error can be used for many scams. Hackers can use it to spread fake news, phishing attacks, and malware in victim's systems. It can be used almost for any malicious activity.

Meanwhile, the same issue has been identified in Facebook. However, the platform claims to know its existence and is something they wanted to be.

For the time being, it is unclear whether Twitter intends to correct this error in the near future.

How useful was this post?

Average rating / 5. Vote count:

No votes so far! Be the first to rate this post.

Hackers use Twitter Card vulnerability and attack users was last modified: July 23, 2019, 6: 18 by Absent Mia

Share
Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on 23 July | 18: 18 by Absent Mia

Competition: securityTag: hackers, redirection, vulnerability, malicious activity

Absent Mia

About Absent Mia

Being your self, in a world that constantly tries to change you, is your greatest achievement

Previous Post: « Firefox 70 brings Lockwise password manager. Get ready for a lot of hacks!
Next Post: iPhone 11: They come with Taptic Engine, improved camera and A13 chip »

Reader Interactions

Comment Policy:

SecNews.gr does not immediately post comments. Malicious comments, comments that include ads, or comments with insults are deleted without any warning. We do not endorse the views expressed by our readers.


Leave a reply Ακύρωση απάντησης

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *

Primary Sidebar

  • Base64 encoded image 35,602 Happy fans
  • Base64 encoded image 3,623 Followers

trending


Find out how much damage your SSD drive has to Windows 10
Lidl Black Friday deals: Maybe we get the Xbox One S at a low price?
Zorin OS 15 Lite to replace Windows 7
Windows 10 Version 1909 installation keys
Windows 7 hack to continue with support
Bliss OS run the latest Android on your computer
Windows 7 Too hard to die
Fake Windows Update is spreading Cyborg ransomware
Kickass Torrents: LOC 15 alternatively site for free movies and games!
SecNews MX Linux 19 x64 custom ISO release for Windows

tweaks

FBI: Beware! Connect your IoT devices to a separate network!

Microsoft: Spear-phishing is growing rapidly - How is it treated?

Comparium: Try your site in different browsers and OS

Find out how much damage your SSD drive has to Windows 10

SecNews MX Linux 19 x64 custom ISO release for Windows

7 pronunciation dictionaries to improve your English

Display the version of Windows on the desktop

Fido: easily download Windows ISO

Set when the password expires on windows 10

Set when the PIN expires in Windows 10

Copyright © 2010 - 2019 · SecNews | ToS | SiteMap | Contact

el Greek
ar Arabiczh-CN Chinese (Simplified)en Englishfr Frenchde Germanel Greekit Italianru Russian