- Joined
- 27 Oct 2016
- Messages
- 4,569
- Solutions
- 3
- Reaction score
- 6,776
Trend Micro said in a blog post that the malware listens for commands from a Twitter account run by the malware operator. The researchers found two tweets that used steganography to hide “/print” commands in the meme images, which told the malware to take a screenshot of an infected computer. The malware then separately obtains the address where its command and control server is located from a Pastebin post, which directs the malware where to send the screenshots.
New malware pulls its instructions from code hidden in memes posted to Twitter