The Online Timer scam claims to measure how long users have spent on the Twitter Website. It spreads via seemingly innocuous Twitter messages along the lines of “I have spent 30 days, 14 hours on Twitter. How much have you? Find out here,” followed by a shortened link to a malicious Website.
Anybody who clicks the link is directed to a Website that requests to connect to the user’s Twitter account in order to measure their usage. The first thing it actually does, however, is post the same message in the user’s feed, this time with a different and seemingly random time measurement, but with the same link.
Oblivious to this happening, the user is rewarded with a pop-up window that claims to show how many views the user’s account has had. Again, the number appears to be random. By way of the main payload, a pop-up window then appears offering an IQ test, which it’s claimed the user must complete to defeat spam and “verify you are not a bot.” Upon completion of the survey, users are requested to enter their cell phone number to receive further questions, although the small print says that users will be sent four text messages a week, at a cost of $2 each.
It’s a clever scam that tiptoes effectively through the minefield of credulity. It’s not hard to see why people would fall for it, although it’s good to see that the savvy and urbane “Twitterites” perhaps aren’t that much brighter than the grass-grazing Facebook multitude.
I’ve always had a quiet admiration for malware writers who manage to succeed. A good attack vector is a piece of pure wit, like a good joke; it manages to bypass our defenses and draw us in. Of course, if the malware is destructively malicious rather than just annoying, then my admiration is a little tempered.
In many ways, it’s surprising it’s taken so long for Twitter to be targeted like this. Because of the requirement to stick to 140 characters in each message, most people use URL shortening services. This leaves those clicking the link with absolutely no idea where they’re going to end-up (and most of us have learned to have one eye on the status bar whenever we hover over any link).
Twitter is trying to combat this with its t.co service, which claims to be safer. This checks URLs against a list of known malicious sites, and the full URL appears in Tweeted messages. However, t.co is clumsy and confusing to use. To generate a link, you have to precede the original link in your browser bar with http://twitter.com/share?url= for example, and it currently doesn’t provide metrics to end users (that is, a measure of how many people have clicked the link). Thus, many people stick with rival services bit.ly and goo.gl, the latter being offered by Google. It’s possible to wrap bit.ly or goo.gl link in a t.co link but then the process of making a quick tweet becomes annoyingly protracted.
Additionally, Twitter relies on users to verify the authenticity of sites that want to “connect” to a user’s account. As is becoming clear, users simply aren’t scrupulous enough. Many simply don’t care. On both Facebook and Twitter, users are encouraged to allow connections from trivial sites and applications as part of day-to-day use.
In short, users are a little too loose with what they link up with, but that helps the wheels of Twitter and Facebook keep rolling.
One would think the notification that a site wants to post on an individual’s Twitter feed to be so important that it would be highlighted in red, and might be accompanied by the sound of sirens in case the individual is suddenly struck blind. Alas, that’s not the case. The exact phrasing is this: “The application would like the ability to access and update your data on Twitter.” It’s not even made explicitly clear that the app might post messages.
At the present time it appears the scam no longer works; either the malicious Website is offline, or clicking through to allow permission for connection causes Twitter to explain that the required token is no longer valid.
However, should you find yourself hit with this malware or something similar, the first step is to remove the connection. You can do this by visiting Twitter.com, clicking on your username at the top right, and then clicking the Settings link.
On the page that appears, click the Connections tab and find the app in the list. Then click the Revoke Access button.
You can prune your Twitter feed of the malware messages by going to your list of Tweets (click Home and then the Your Tweets link), and hovering the mouse over the message until a Delete option appears. Run a full virus scan just in case–and while that’s completing, it might be a good idea to tweet that you’ve been infected, but that everything is now cleaned up.