Malware writers have revamped code that uses a popular Twitter command to generate hard-to-predict domain names, a technique that brings stealth to their drive-by exploits. Four weeks ago, when The Register reported Twitter application programming interfaces were being used to generate pseudorandom domain names, none of the …
So it's not really using Twitter...
... as anything other than a publicly-observable source of common random numbers? Huh, there are a million ways of doing this sort of trick. Check a stock feed and get the third letter of the day's highest riser. Download the front page of a news website and look at the fourth letter of the third word in the second paragraph of the first story. Number of posts to alt.test that day? Hell, check the temperature in LA or the humidity in Moscow on a weather site.... the possibilities are endless. Twitter just makes a badger-tastic hook to hang the story on.
Why is using twitter topics to generate random URLs any better than using say the headlines on bbcnews or any RSS feed that changes on a regular basis?
- Analysis iPhone 6: The final straw for Android makers eaten alive by the data parasite?
- First Crack Man buys iPHONE 6 and DROPS IT to SMASH on PURPOSE
- First Fondle Register journo battles Sydney iPHONE queue, FONDLES BIG 'UN
- TOR users become FBI's No.1 hacking target after legal power grab
- Vid Reg bloke zips through an iPHONE 6 queue from ZERO to 60 SECONDS