Cybercriminals are abusing Twitter via tech support scams, command-and-control (C&C) operations and data exfiltration, with criminals found using fake Twitter accounts to spoof those of legitimate vendors for credible tech support scams.
Researchers at security firm Trend Micro say they have discovered a new campaign that aims to implant a cryptocurrency miner when users visit infected websites using Chrome or Internet Explorer.