Be careful on Twitter bot which can attack DDoS.

1. Introduction

Toolkits generating Twitter bot which can command DDoS attack have been reported by various security companies in these days, general users need to be careful on using Twitter.
This toolkit can make normal user easily generate malicious file, therefore it must be dealt in urgent.

2. Spreading path and symptoms of infection

This Twitter bot generating toolkit can be easily downloaded by web portal sites.
Following figure is one of toolkits on internet.

Following figure is the error page on running when the computer hasn't been installed .NET framework 4.0.

See the run screen.

* Interface

- Twitter Username : User account
- File Name : Input the file name. "file.exe"
- Internal : Set the interval by minutes.
- Build TweBot Server : Build Twitter bot

To click "Build TweBot Server" after inputting all fields, will generate Twitter bot file.
If a PC is infected by Twitter bot, it will be a zombie PC and can be ordered by attacker.
Sending order via twitter isn't same as previous DDoS attacking.

3. How to prevent

We can share and get information on Twitter. When an attacker decided to use Twitter for one of attacking method, tracing IP can be impossible on using 3G or WiFi.
Furthermore, this toolkit can be easily downloaded by web portal sites and can be used by normal user.
To use PC safely from security threats of these malicious attachments, we recommend following "Security management tips" for general users.

Security management tips

1. Maintain the latest security update on OS and applications
2. Use anti-virus SW from believable security company and keep updating the latest engine and using real time detecting function
3. Do not see and download attached file from suspicious e-mail.
4. Keep caution to link from instant messenger and SNS.
5. Execute downloaded file after scan with anti-virus SW.

INCA Internet (Security Response Center / Emergency Response Team) provides diagnosis/treatment function with “nProtect Anti-Virus/Spyware” for detecting such as malicious file stated above and runs responding system against various security threats.


  1. Advanced and affordable DDoS Protection and mitigation that can be deployed in minutes.

  2. After some time you will begin to recognize your "Twitter voice" and refine the sort of Twitter nearness you need to have by changing your substance style and the things that you Tweet about. As you refine your quality, you will assemble a following. buy uk twitter followers

  3. will really appreciate the writer's choice for choosing this excellent article appropriate to my matter.Here is deep description https://twitter.com/darrenwinters01 about the article matter which helped me more.

  4. You know, admissions essay writing is quite a stressful task. Follow my link to get help with it!