DocumentCode :
669123
Title :
It´s you on photo?: Automatic detection of Twitter accounts infected with the Blackhole Exploit Kit
Author :
White, J.S. ; Matthews, Jeanna N.
Author_Institution :
Wallace H. Coulter Sch. of Eng., Clarkson Univ., Potsdam, NY, USA
fYear :
2013
fDate :
22-24 Oct. 2013
Firstpage :
51
Lastpage :
58
Abstract :
The Blackhole Exploit Kit (BEK) has been called the “Toyota Camry” of exploit kits - cheap, readily available and reliable. According to some estimates, it was used to enable the majority of malware infections in 2012. One major infection vector for BEK is through Twitter. In this paper, we analyze over two months of Twitter data from May through July of 2012 and identify user accounts affected by BEK. Based on reports that BEK infected tweets containing the string ”It´s you on photo?” were being used to lure victims to BEK infected sites, we identified matching messages and analyzed the associated accounts. We then identified a wider range of message types associated with BEK infection and developed an automated mechanism for identifying infectious accounts - both accounts that were created specifically for malware distribution and legitimate accounts that began distributing malware after the owner´s system was infected. Specifically, we find that BEK infectious accounts are characterized by tweets with an entropy lower than 4.5, tweets that are sent using the Mobile Web API and tweets containing an embedded URL. We present an automated method for isolating the point at which an account becomes infectious based on changes in the entropy of tweets from the account.
Keywords :
computer crime; invasive software; social networking (online); BEK infected sites; BEK infectious accounts; Toyota Camry; Twitter accounts; Twitter data; automatic detection; blackhole exploit kit; embedded URL; infected tweets; infection vector; its-you-on-photo; malware distribution; malware infections; message types; messages matching; mobile Web API; user accounts identification; Correlation; Electronic mail; Entropy; Malware; Mobile communication; Twitter; Vectors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Malicious and Unwanted Software: "The Americas" (MALWARE), 2013 8th International Conference on
Conference_Location :
Fajardo, PR
Print_ISBN :
978-1-4799-2534-6
Type :
conf
DOI :
10.1109/MALWARE.2013.6703685
Filename :
6703685
Link To Document :
بازگشت