skip to main content
10.1145/2660267.2660282acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Consequences of Connectivity: Characterizing Account Hijacking on Twitter

Authors Info & Claims
Published:03 November 2014Publication History

ABSTRACT

In this study we expose the serious large-scale threat of criminal account hijacking and the resulting damage incurred by users and web services. We develop a system for detecting large-scale attacks on Twitter that identifies 14 million victims of compromise. We examine these accounts to track how attacks spread within social networks and to determine how criminals ultimately realize a profit from hijacked credentials. We find that compromise is a systemic threat, with victims spanning nascent, casual, and core users. Even brief compromises correlate with 21% of victims never returning to Twitter after the service wrests control of a victim's account from criminals. Infections are dominated by social contagions---phishing and malware campaigns that spread along the social graph. These contagions mirror information diffusion and biological diseases, growing in virulence with the number of neighboring infections. Based on the severity of our findings, we argue that early outbreak detection that stems the spread of compromise in 24 hours can spare 70% of victims.

References

  1. Eytan Bakshy, Brian Karrer, and Lada A Adamic. Social influence and the difiusion of user-created content. In Proceedings of the 10th ACM conference on Electronic commerce, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Eytan Bakshy, Itamar Rosenn, Cameron Marlow, and Lada Adamic. The role of social networks in information difiusion. In Proceedings of the 21st international conference on World Wide Web, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Andrei Z Broder. On the resemblance and containment of documents. In Compression and Complexity of Sequences 1997. Proceedings, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Chris Brook. Github resets users' passwords following brute force attack. http://threatpost.com/github-resets-users-passwords-following-brute-force-attack/102983 , 2013.Google ScholarGoogle Scholar
  5. M. Cha, H. Haddadi, F. Benevenuto, and K.P. Gummadi. Measuring User Influence in Twitter: The Million Follower Fallacy. In Proceedings of the 4th International Conference on Weblogs and Social Media, 2010.Google ScholarGoogle Scholar
  6. Nicholas A Christakis and James H Fowler. The spread of obesity in a large social network over 32 years. New England Journal of Medicine, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  7. Dan Cosley, Daniel P Huttenlocher, Jon M Kleinberg, Xiangyang Lan, and Siddharth Suri. Sequential influence models in social networks. In Proceedings of the International Conference of Weblogs and Social Media, 2010.Google ScholarGoogle Scholar
  8. Anupam Das, Joseph Bonneau, Matthew Caesar, Nikita Borisov, and XiaoFeng Wang. The tangled web of password reuse. In Symposium on Network and Distributed System Security (NDSS), 2014.Google ScholarGoogle ScholarCross RefCross Ref
  9. Munmun De Choudhury, Yu-Ru Lin, Hari Sundaram, K Selcuk Candan, Lexing Xie, and Aisling Kelliher. How does the data sampling strategy impact the discovery of information difiusion in social media? In Proceedings of the International Conference of Weblogs and Social Media, 2010.Google ScholarGoogle Scholar
  10. Manuel Egele, Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna. COMPA: Detecting Compromised Accounts on Social Networks. In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2013.Google ScholarGoogle Scholar
  11. Facebook. Guidelines for advertised products & services. https://www.facebook.com/help/399392800124391/ , 2014.Google ScholarGoogle Scholar
  12. Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia, and Alok Choudhary. Towards online spam filtering in social networks. In Symposium on Network and Distributed System Security (NDSS), 2012.Google ScholarGoogle Scholar
  13. Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, and Ben Y Zhao. Detecting and characterizing social spam campaigns. In Proceedings of the 10th ACM SIGCOMM conference on Internet measurement. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Sharad Goel, Duncan J Watts, and Daniel G Goldstein. The structure of online difiusion networks. In Proceedings of the 13th ACM Conference on Electronic Commerce, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. C. Grier, L. Ballard, J. Caballero, N. Chachra, C.J. Dietrich, K. Levchenko, P. Mavrommatis, D. McCoy, A. Nappa, A. Pitsillidis, et al. Manufacturing compromise: The emergence of exploit-as-a-service. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. C. Grier, K. Thomas, V. Paxson, and M. Zhang. @spam: The Underground on 140 Characters or Less. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Brian Krebs. Adobe breach impacted at least 38 million users. http://krebsonsecurity.com/ 2013/10/adobe-breach-impacted-at-least-38-million-users/ , 2013.Google ScholarGoogle Scholar
  18. Jure Leskovec, Jon Kleinberg, and Christos Faloutsos. Graphs over time: densification laws, shrinking diameters and possible explanations. In Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Miller McPherson, Lynn Smith-Lovin, and James M Cook. Birds of a feather: Homophily in social networks. Annual review of sociology, 2001.Google ScholarGoogle Scholar
  20. Fred Morstatter, Jurgen Pfeffer, Huan Liu, and Kathleen M Carley. Is the Sample Good Enough? Comparing Data from Twitter's Streaming API with Twitter's Firehose. In Proceedings of the International Conference of Weblogs and Social Media, 2013.Google ScholarGoogle Scholar
  21. Mark EJ Newman. Spread of epidemic disease on networks. Physical review E, 2002.Google ScholarGoogle Scholar
  22. Nicole Perlroth. Lax Security at LinkedIn Is Laid Bare. http://nyti.ms/1fRQIl4 , 2012.Google ScholarGoogle Scholar
  23. Daniel M Romero, Brendan Meeder, and Jon Kleinberg. Differences in the mechanics of information difiusion across topics: Idioms, political hashtags, and complex contagion on Twitter. In Proceedings of the 20th international conference on World wide web, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Stuart Staniford, Vern Paxson, and Nicholas Weaver. How to Own the Internet in Your Spare Time. In USENIX Security Symposium, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Haitao Zheng, and Ben Y Zhao. Follow the Green: Growth and Dynamics in Twitter Follower Markets. In Proceedings of the 2013 conference on Internet measurement conference, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Fred Tanneau. Twitter hacked! 250,000 user accounts breached. http://www.cnbc.com/id/100343530 , 2013.Google ScholarGoogle Scholar
  27. Ke Tao, Fabian Abel, Claudia Hauff, Geert-Jan Houben, and Ujwal Gadiraju. Groundhog day: Near-duplicate detection on Twitter. In Proceedings of the 22nd international conference on World Wide Web, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. K. Thomas, C. Grier, V. Paxson, and D. Song. Suspended Accounts In Retrospect: An Analysis of Twitter Spam. In Proceedings of the Internet Measurement Conference, November 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Kurt Thomas and David M. Nicol. The Koobface botnet and the rise of social malware. In Proceedings of The 5th International Conference on Malicious and Unwanted Software (Malware 2010), 2010.Google ScholarGoogle ScholarCross RefCross Ref
  30. C. Yang, R. Harkreader, J. Zhang, S. Shin, and G. Gu. Analyzing Spammers' Social Networks for Fun and Profit: a Case Study of Cyber Criminal Ecosystem on Twitter. In Proceedings of the 21st International Conference on World Wide Web, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Alison Young. FTC takes action against deceptive weight-loss products. http://www.usatoday.com/story/news/nation/ 2014/01/07/ftc-charges-deceptive-weight-loss-products/4354669/ , 2014.Google ScholarGoogle Scholar

Index Terms

  1. Consequences of Connectivity: Characterizing Account Hijacking on Twitter

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
      November 2014
      1592 pages
      ISBN:9781450329576
      DOI:10.1145/2660267

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 3 November 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CCS '14 Paper Acceptance Rate114of585submissions,19%Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader