SlideShare une entreprise Scribd logo
1  sur  41
Click to edit Master title style ,[object Object],[object Object],[object Object],[object Object],[object Object],June 10 th , 2009 Event details (title, place) Costin G. Raiu Kaspersky Lab Virus Bulletin 2009 – September 24 th , Geneva Morton Swimmer Trend Micro Twarfing: Malicious tweets
Thanks to: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 10 th , 2009 Event details (title, place)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 10 th , 2009 Event details (title, place) Overview
What is Twitter? ,[object Object],[object Object],[object Object],June 10 th , 2009 Event details (title, place) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],App Browser Phone App Browser Phone
Related to: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 10 th , 2009 Event details (title, place)
Twitter internals ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 10 th , 2009 Event details (title, place)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Twitter internals June 10 th , 2009 Event details (title, place)
Stats (June 2009) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 10 th , 2009 Event details (title, place)
But what is  ON  Twitter? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 10 th , 2009 Event details (title, place) * Paper available at http://is.gd/3xmPz  ,[object Object]
And what is inside a Tweet? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 10 th , 2009 Event details (title, place) SifuMoraga:  presenting together with  @ craiu  at # vb2009  L: Geneva schouw : RT  @ SifuMoraga:  presenting together with @ craiu  at # vb2009  L: Geneva
Long URLs, short URLs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 10 th , 2009 Event details (title, place)
Most popular URL shortening services Default URL shortener on Twitter since May 2009
Malware   on Twitter June 10 th , 2009 Event details (title, place) August 2008
[object Object],[object Object],[object Object],[object Object],[object Object],June 10 th , 2009 Event details (title, place) Notable incidents ,[object Object],[object Object]
June 10 th , 2009 Event details (title, place) Notable incidents ,[object Object]
June 10 th , 2009 Event details (title, place) Notable incidents ,[object Object],[object Object],[object Object]
Notable incidents ,[object Object],[object Object],[object Object],June 10 th , 2009 Event details (title, place)
Twitter and Google SB API ,[object Object],[object Object],[object Object],June 10 th , 2009 Event details (title, place) ,[object Object],[object Object]
Twitter and Google SB API June 10 th , 2009 Event details (title, place)
Google SB API ,[object Object],[object Object],[object Object],[object Object],June 10 th , 2009 Event details (title, place)
A bit about ‘bit.ly’ / ‘j.mp’ ,[object Object],[object Object],[object Object],June 10 th , 2009 Event details (title, place) Source:  http://bit.ly/pages/faq/
A bit about ‘bit.ly’ / ‘j.mp’ June 10 th , 2009 Event details (title, place)
Our Robot(s) – Krab Krawler June 10 th , 2009 Event details (title, place)
Kaspersky Robot ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 10 th , 2009 Event details (title, place)
Krab Krawler: Architecture June 10 th , 2009 Event details (title, place)
New unique URLs per day June 10 th , 2009 Event details (title, place)
Malware we found so far June 10 th , 2009 Event details (title, place)
General stats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 10 th , 2009 Event details (title, place)
Most popular URL on Twitter during Aug, Sep ‘09 June 10 th , 2009 Event details (title, place)
Our Robot(s) – Red Twarf June 10 th , 2009 Event details (title, place)
Whitetwarf ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 10 th , 2009 Event details (title, place)
June 10 th , 2009 Event details (title, place) WhiteTwarf – the exploratorium Twitter Tweet processing WT-Redirector Analysis Redirectors and Shorteners Domain reputations RDF Store Shortener API HTTP request SPARQL Queries Attacks, Malicious users, etc Text Sigs URLs RDF Converter URL processing Tweets
WhiteTwarf in detail ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 10 th , 2009 Event details (title, place)
URL redirector processing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 10 th , 2009 Event details (title, place)
The next stage: RedTwarf ,[object Object],[object Object],[object Object],[object Object],June 10 th , 2009 Event details (title, place)
Detection malicious activity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 10 th , 2009 Event details (title, place) posts posts tw:hasURL tw:hasURL drs:hasFQDN drs:rating mal http://mal.com/evil.exe tweet/1234 mal.com malicous http://unk.com/what.exe tweet/5678
Matching graphs June 10 th , 2009 Event details (title, place) posts posts tw:hasURL tw:hasURL drs:hasFQDN drs:rating posts posts tw:hasURL tw:hasURL drs:hasFQDN drs:rating mal http://mal.com/evil.exe tweet/1234 mal.com malicous http://unk.com/what.exe tweet/5678 ?m ?u1 ?t1 ?f malicous ?u2 ?t2
More complex attack ,[object Object],June 10 th , 2009 Event details (title, place) @ iceman : This link is cool  http://cool.com/ice.html @notniceman: RT: @ iceman : This link is cool  http://c00l.com/ice.exe posts posts hasURL hasURL textSig textSig iceman tweet/1001 thislinkiscool http://cool.com/ice.html notniceman tweet/1005 http://c00l.com/ice.exe
Matching Graphs June 10 th , 2009 Event details (title, place) posts posts posts posts hasURL hasURL hasURL hasURL textSig textSig textSig textSig iceman tweet/1001 thislinkiscool http://cool.com/ice.html notniceman tweet/1005 http://c00l.com/ice.exe ?u1 ?t1 ?s ?u1 ?mu ?t2 ?u2
June 10 th , 2009 Event details (title, place) Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object],We would like to thank VB and the charming audience for your support with 140 characters and guess what, we just did it! #vb2009
Click to edit Master title style ,[object Object],[object Object],[object Object],[object Object],[object Object],June 10 th , 2009 Event details (title, place) Thank you! [email_address] ro twitter.com/craiu [email_address] twitter.com/sifumoraga

Contenu connexe

Tendances

[Tips] how to use google search efficiently
[Tips] how to use google search efficiently[Tips] how to use google search efficiently
[Tips] how to use google search efficientlySanjeev Kumar Jaiswal
 
What is Twitter and How to Use It
What is Twitter and How to Use ItWhat is Twitter and How to Use It
What is Twitter and How to Use ItEkaterina Walter
 
pycon-2015-liza-daly
pycon-2015-liza-dalypycon-2015-liza-daly
pycon-2015-liza-dalyLiza Daly
 
Twitter & Tweets
Twitter & TweetsTwitter & Tweets
Twitter & TweetsBARRY HAMMOND
 
La recherche sur internet, l'E-réputation
La recherche sur internet, l'E-réputationLa recherche sur internet, l'E-réputation
La recherche sur internet, l'E-réputationBernard André
 
Twitter And Its Value To Librarians
Twitter And Its Value To LibrariansTwitter And Its Value To Librarians
Twitter And Its Value To LibrariansPhil Bradley
 
Twinder: A Search Engine for Twitter Streams
Twinder: A Search Engine for Twitter Streams Twinder: A Search Engine for Twitter Streams
Twinder: A Search Engine for Twitter Streams Ke Tao
 
Effective Use of the Twitter Search API
Effective Use of the Twitter Search APIEffective Use of the Twitter Search API
Effective Use of the Twitter Search APIEric Jensen
 
Twitter & Facebook 101
Twitter & Facebook 101Twitter & Facebook 101
Twitter & Facebook 101Kory Kredit
 
Module 02.Spreadable media
Module 02.Spreadable mediaModule 02.Spreadable media
Module 02.Spreadable mediaJulian Matthews
 
Social Media Online Reputation Management (ORM)
Social Media Online Reputation Management (ORM)Social Media Online Reputation Management (ORM)
Social Media Online Reputation Management (ORM)Jordan Kasteler
 
Podcamp Nashville
Podcamp NashvillePodcamp Nashville
Podcamp NashvilleDick Pepper
 
Search engines coh m
Search engines coh mSearch engines coh m
Search engines coh mcpcmattc
 
Twitter for PR (Public Relations)
Twitter for PR (Public Relations)Twitter for PR (Public Relations)
Twitter for PR (Public Relations)Corinne Weisgerber
 
Enterprise SEO - Pain Management Strategies
Enterprise SEO - Pain Management StrategiesEnterprise SEO - Pain Management Strategies
Enterprise SEO - Pain Management Strategiespetryshen
 
4 presentation identifying good quality information sources using twitter
4 presentation   identifying good quality information sources using twitter4 presentation   identifying good quality information sources using twitter
4 presentation identifying good quality information sources using twittermoledzki
 

Tendances (20)

How to start using Twitter
How to start using TwitterHow to start using Twitter
How to start using Twitter
 
Twitter Slides
Twitter SlidesTwitter Slides
Twitter Slides
 
Twitter
TwitterTwitter
Twitter
 
[Tips] how to use google search efficiently
[Tips] how to use google search efficiently[Tips] how to use google search efficiently
[Tips] how to use google search efficiently
 
An introduction to Twitter
An introduction to TwitterAn introduction to Twitter
An introduction to Twitter
 
What is Twitter and How to Use It
What is Twitter and How to Use ItWhat is Twitter and How to Use It
What is Twitter and How to Use It
 
pycon-2015-liza-daly
pycon-2015-liza-dalypycon-2015-liza-daly
pycon-2015-liza-daly
 
Twitter & Tweets
Twitter & TweetsTwitter & Tweets
Twitter & Tweets
 
La recherche sur internet, l'E-réputation
La recherche sur internet, l'E-réputationLa recherche sur internet, l'E-réputation
La recherche sur internet, l'E-réputation
 
Twitter And Its Value To Librarians
Twitter And Its Value To LibrariansTwitter And Its Value To Librarians
Twitter And Its Value To Librarians
 
Twinder: A Search Engine for Twitter Streams
Twinder: A Search Engine for Twitter Streams Twinder: A Search Engine for Twitter Streams
Twinder: A Search Engine for Twitter Streams
 
Effective Use of the Twitter Search API
Effective Use of the Twitter Search APIEffective Use of the Twitter Search API
Effective Use of the Twitter Search API
 
Twitter & Facebook 101
Twitter & Facebook 101Twitter & Facebook 101
Twitter & Facebook 101
 
Module 02.Spreadable media
Module 02.Spreadable mediaModule 02.Spreadable media
Module 02.Spreadable media
 
Social Media Online Reputation Management (ORM)
Social Media Online Reputation Management (ORM)Social Media Online Reputation Management (ORM)
Social Media Online Reputation Management (ORM)
 
Podcamp Nashville
Podcamp NashvillePodcamp Nashville
Podcamp Nashville
 
Search engines coh m
Search engines coh mSearch engines coh m
Search engines coh m
 
Twitter for PR (Public Relations)
Twitter for PR (Public Relations)Twitter for PR (Public Relations)
Twitter for PR (Public Relations)
 
Enterprise SEO - Pain Management Strategies
Enterprise SEO - Pain Management StrategiesEnterprise SEO - Pain Management Strategies
Enterprise SEO - Pain Management Strategies
 
4 presentation identifying good quality information sources using twitter
4 presentation   identifying good quality information sources using twitter4 presentation   identifying good quality information sources using twitter
4 presentation identifying good quality information sources using twitter
 

Similaire à Analyzing Malware and Trends on Twitter

B-sides Las Vegas - social network security
B-sides Las Vegas - social network securityB-sides Las Vegas - social network security
B-sides Las Vegas - social network securityDamon Cortesi
 
Mashups and data portals where next? (spatial@gov)
Mashups and data portals where next? (spatial@gov)Mashups and data portals where next? (spatial@gov)
Mashups and data portals where next? (spatial@gov)josediacono
 
The Internet as Web Services: introduction to ReST
The Internet as Web Services: introduction to ReSTThe Internet as Web Services: introduction to ReST
The Internet as Web Services: introduction to ReSTBruno Kessler Foundation
 
Onesocialweb Presentation at OTA10
Onesocialweb Presentation at OTA10Onesocialweb Presentation at OTA10
Onesocialweb Presentation at OTA10dianacheng
 
Web2 And Java
Web2 And JavaWeb2 And Java
Web2 And Javasenejug
 
Twitter API & OAuth 101 TVUG October 2009
Twitter API & OAuth 101 TVUG October 2009Twitter API & OAuth 101 TVUG October 2009
Twitter API & OAuth 101 TVUG October 2009Andrew Badera
 
Splunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk TrafficSplunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk TrafficSplunk
 
Drive By Downloads: How To Avoid Getting a Cap Popped in Your App
Drive By Downloads:  How To Avoid Getting a Cap Popped in Your App Drive By Downloads:  How To Avoid Getting a Cap Popped in Your App
Drive By Downloads: How To Avoid Getting a Cap Popped in Your App Cenzic
 
Internet for everyone
Internet for everyoneInternet for everyone
Internet for everyoneAshesh R
 
Intriduction to Ontotext's KIM platform
Intriduction to Ontotext's KIM platformIntriduction to Ontotext's KIM platform
Intriduction to Ontotext's KIM platformtoncho11
 
RSS and Atom in the Social Web
RSS and Atom in the Social WebRSS and Atom in the Social Web
RSS and Atom in the Social Webhchen1
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
 
Turbot - A Next Generation Botnet
Turbot - A Next Generation BotnetTurbot - A Next Generation Botnet
Turbot - A Next Generation BotnetItzik Kotler
 
Semantic Web and the Social Web
Semantic Web and the Social WebSemantic Web and the Social Web
Semantic Web and the Social Webrobin fay
 
SeaBeyond 2011 ProcessOne - Diana Cheng: OneSocialWeb
SeaBeyond 2011 ProcessOne - Diana Cheng: OneSocialWebSeaBeyond 2011 ProcessOne - Diana Cheng: OneSocialWeb
SeaBeyond 2011 ProcessOne - Diana Cheng: OneSocialWebProcessOne
 
Ssn Web 2.0 And Beyond
Ssn   Web 2.0 And BeyondSsn   Web 2.0 And Beyond
Ssn Web 2.0 And Beyondloseyourself
 

Similaire à Analyzing Malware and Trends on Twitter (20)

B-sides Las Vegas - social network security
B-sides Las Vegas - social network securityB-sides Las Vegas - social network security
B-sides Las Vegas - social network security
 
Mashups and data portals where next? (spatial@gov)
Mashups and data portals where next? (spatial@gov)Mashups and data portals where next? (spatial@gov)
Mashups and data portals where next? (spatial@gov)
 
The Internet as Web Services: introduction to ReST
The Internet as Web Services: introduction to ReSTThe Internet as Web Services: introduction to ReST
The Internet as Web Services: introduction to ReST
 
Onesocialweb Presentation at OTA10
Onesocialweb Presentation at OTA10Onesocialweb Presentation at OTA10
Onesocialweb Presentation at OTA10
 
Web2 And Java
Web2 And JavaWeb2 And Java
Web2 And Java
 
Twitter API & OAuth 101 TVUG October 2009
Twitter API & OAuth 101 TVUG October 2009Twitter API & OAuth 101 TVUG October 2009
Twitter API & OAuth 101 TVUG October 2009
 
Splunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk TrafficSplunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk Traffic
 
Drive By Downloads: How To Avoid Getting a Cap Popped in Your App
Drive By Downloads:  How To Avoid Getting a Cap Popped in Your App Drive By Downloads:  How To Avoid Getting a Cap Popped in Your App
Drive By Downloads: How To Avoid Getting a Cap Popped in Your App
 
We are losing our tweets!
We are losing our tweets!We are losing our tweets!
We are losing our tweets!
 
Internet for everyone
Internet for everyoneInternet for everyone
Internet for everyone
 
Intriduction to Ontotext's KIM platform
Intriduction to Ontotext's KIM platformIntriduction to Ontotext's KIM platform
Intriduction to Ontotext's KIM platform
 
RSS and Atom in the Social Web
RSS and Atom in the Social WebRSS and Atom in the Social Web
RSS and Atom in the Social Web
 
Designing & Building Secure Web APIs
Designing & Building Secure Web APIsDesigning & Building Secure Web APIs
Designing & Building Secure Web APIs
 
Web of data
Web of dataWeb of data
Web of data
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Turbot - A Next Generation Botnet
Turbot - A Next Generation BotnetTurbot - A Next Generation Botnet
Turbot - A Next Generation Botnet
 
Semantic Web and the Social Web
Semantic Web and the Social WebSemantic Web and the Social Web
Semantic Web and the Social Web
 
SeaBeyond 2011 ProcessOne - Diana Cheng: OneSocialWeb
SeaBeyond 2011 ProcessOne - Diana Cheng: OneSocialWebSeaBeyond 2011 ProcessOne - Diana Cheng: OneSocialWeb
SeaBeyond 2011 ProcessOne - Diana Cheng: OneSocialWeb
 
Web 2
Web 2Web 2
Web 2
 
Ssn Web 2.0 And Beyond
Ssn   Web 2.0 And BeyondSsn   Web 2.0 And Beyond
Ssn Web 2.0 And Beyond
 

Dernier

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Dernier (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

Analyzing Malware and Trends on Twitter

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Most popular URL shortening services Default URL shortener on Twitter since May 2009
  • 13. Malware on Twitter June 10 th , 2009 Event details (title, place) August 2008
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Twitter and Google SB API June 10 th , 2009 Event details (title, place)
  • 20.
  • 21.
  • 22. A bit about ‘bit.ly’ / ‘j.mp’ June 10 th , 2009 Event details (title, place)
  • 23. Our Robot(s) – Krab Krawler June 10 th , 2009 Event details (title, place)
  • 24.
  • 25. Krab Krawler: Architecture June 10 th , 2009 Event details (title, place)
  • 26. New unique URLs per day June 10 th , 2009 Event details (title, place)
  • 27. Malware we found so far June 10 th , 2009 Event details (title, place)
  • 28.
  • 29. Most popular URL on Twitter during Aug, Sep ‘09 June 10 th , 2009 Event details (title, place)
  • 30. Our Robot(s) – Red Twarf June 10 th , 2009 Event details (title, place)
  • 31.
  • 32. June 10 th , 2009 Event details (title, place) WhiteTwarf – the exploratorium Twitter Tweet processing WT-Redirector Analysis Redirectors and Shorteners Domain reputations RDF Store Shortener API HTTP request SPARQL Queries Attacks, Malicious users, etc Text Sigs URLs RDF Converter URL processing Tweets
  • 33.
  • 34.
  • 35.
  • 36.
  • 37. Matching graphs June 10 th , 2009 Event details (title, place) posts posts tw:hasURL tw:hasURL drs:hasFQDN drs:rating posts posts tw:hasURL tw:hasURL drs:hasFQDN drs:rating mal http://mal.com/evil.exe tweet/1234 mal.com malicous http://unk.com/what.exe tweet/5678 ?m ?u1 ?t1 ?f malicous ?u2 ?t2
  • 38.
  • 39. Matching Graphs June 10 th , 2009 Event details (title, place) posts posts posts posts hasURL hasURL hasURL hasURL textSig textSig textSig textSig iceman tweet/1001 thislinkiscool http://cool.com/ice.html notniceman tweet/1005 http://c00l.com/ice.exe ?u1 ?t1 ?s ?u1 ?mu ?t2 ?u2
  • 40.
  • 41.

Notes de l'éditeur

  1. First malware link as far as we can determine was posted to Twitter in August 2008 It was a link to a website that was trying to distribute a banking trojan through social engineering tricks