Select your localized edition:

Close ×

More Ways to Connect

Discover one of our 28 local entrepreneurial communities »

Be the first to know as we launch in new countries and markets around the globe.

Interested in bringing MIT Technology Review to your local market?

MIT Technology ReviewMIT Technology Review - logo


Unsupported browser: Your browser does not meet modern web standards. See how it scores »

{ action.text }

Hacked Twitter accounts are selling briskly on Russian cybercriminal forums, with fraud artists and spammers paying between $100 and $200 for batches of 1,000 accounts, depending on number of followers the accounts have, according to a Russian security researcher.

In many cases the buyers are conducting a lucrative trade by hawking phony antivirus products via tweets sent through these accounts. “The technique of stealing account credentials and posting malicious links on Twitter is more and more popular,” and has surged in the past two months, says Costin Raiu, director of the global research and analysis group for the Moscow-based antivirus company Kaspersky Lab. “Cybercriminals are recognizing that social networking sites can be abused very efficiently for their needs.”

Even one successful hacked tweet from the account of a trusted user can have serious repercussions, especially if the bogus tweet is “retweeted” by followers to still more people. Typically, between 10 percent and 20 percent of people will click a link sent by a trusted source.

The illicit Twitter trade is being conducted on Russian-language, members-only cybercriminal forums, Raiu says. No aggregate numbers of stolen accounts are available. But based on the fact that accounts are offered in batches of 1,000, it’s reasonable to conclude that tens of thousands or more accounts might be for sale worldwide, Raiu says. Twitter has more than 75 million members, of which about 10 million to 15 million send out tweets regularly.

In one common scam, clicking the link of a hacked tweet infects the recipient’s computer with advertisements for a phony antivirus product. The infection produces a pop-up notice that announces an infection and offers the “full version” of the antivirus solution for $50 or more. One in 100 people likely end up paying for this, Raiu estimates, roughly a 50 to 1 return on investment.

The Twitter scam is built on the theft of login credentials through long-established tricks including password-stealing viruses, called Trojans, and through spam e-mails that trick recipients into entering their credentials into a fake version of Once access to an account is obtained, the hacker probably gets only a few shots at sending a fake tweet before the owner notices and changes his credentials.

4 comments. Share your thoughts »

Credits: Twitter

Tagged: Web, security, Twitter, cyber attacks, hack, cybercriminals

Reprints and Permissions | Send feedback to the editor

From the Archives


Introducing MIT Technology Review Insider.

Already a Magazine subscriber?

You're automatically an Insider. It's easy to activate or upgrade your account.

Activate Your Account

Become an Insider

It's the new way to subscribe. Get even more of the tech news, research, and discoveries you crave.

Sign Up

Learn More

Find out why MIT Technology Review Insider is for you and explore your options.

Show Me