News & Information for Technology Purchasers NewsFactor Sites:     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
You are here: Home / Viruses & Malware / Tumblr Worm Spreads Offensive Post
Is your endpoint data protected?
Tumblr Worm Demonstrates Ongoing IT Security Struggle
Tumblr Worm Demonstrates Ongoing IT Security Struggle
By Jennifer LeClaire / NewsFactor Network Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus

In an ugly event that demonstrates how easy it still is for hackers to compromise networks, Tumblr was infected with a worm that propagated a racist message to member blogs without their knowledge or permission.

Tumblr is asking bloggers that have witnessed the post on the site to "immediately" log out of any browser they used to access the social media platform. Tumbler actually relied on Twitter to communicate with its base.

The GNAA post also said Tumblr members are not beyond redemption and suggested they "drink bleach and die, you emo, self-insisting, self-deprecating, self-indulgent empty husks of human beings." After continued rants against the Tumblr population, the GNAA suggested attempting to delete the post would delete a user's Tumblr account.

Absolute Filth

A group that goes by the name Gay N***er Association of America, or GNAA, took credit for the racist post. Wikipedia describes the GNAA as "an anti-blogging Internet-trolling organization." The racist post called out Tumblr for propagating the "most f***ing worthless, contrived, bourgeoisie, self-congratulating and decadent bulls**t the Internet has ever had the misfortune of facilitating."

The GNAA post also said Tumblr members are not beyond redemption, as long as they "drink bleach and die, you emo, self-insisting, self-deprecating, self-indulgent empty husks of human beings." After continued rants against the Tumblr population, the GNAA suggested attempting to delete the post would delete a user's Tumblr account.

Brad Shimmin, an analyst at Current Analysis, said because the technologies and platforms being used so prevalently today for cloud-based services are both open and familiar -- and because of the level of maturity in the hacker realm -- these breaches tend to pop up regardless of the efforts companies put forth to maintain security.

"Companies don't talk about the efforts that go into subverting threats and avoiding threats and responding to threats for good reason," Shimmin said. "Companies are being attacked all the time. It's literally an ongoing 24/7 effort to secure both the availability of a service and security and privacy of the user data that's housed in that service."

How Hackers Breached Tumblr

So how did the attack happen? Graham Cluley, a senior security consultant at Sophos, said it appeared the worm took advantage of Tumblr's reblogging feature, meaning that anyone who was logged into Tumblr would automatically reblog the infectious post if they visited one of the offending pages.

As Cluley explained it, each affected post had some malicious code embedded inside it. A Base 64 string was encoded in JavaScript, hidden inside an iFrame that was invisible to the naked eye, that dragged content from a URL. Once decoded, he said, the intention of the code becomes more clear.

"If you were not logged into Tumblr when your browser visited the URL, it would simply redirect you to the standard login page. However, if your computer was logged into Tumblr, it would result in the GNAA content being reblogged on your own Tumblr," Cluley said.

"It shouldn't have been possible for someone to post such malicious JavaScript into a Tumblr post -- our assumption is that the attackers managed to skirt around Tumblr's defenses by disguising their code through Base 64 encoding and embedding it in a data URI."

Tell Us What You Think


Like Us on FacebookFollow Us on Twitter
AdvertisementToday's CIO needs to adopt an "Everyone's IT" approach to leadership, embracing technology to increase enterprise agility & collaboration. View the free Gartner research report to learn how to adapt your IT leadership style to today's business standards.
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Dairy Queen Latest Retailer To Report Hack
Known for its hot fries and soft-serve ice cream, Dairy Queen just made cyber history as the latest victim of a hack attack. The fast food chain said that customer data at some stores may be at risk.
Lessons from the JPMorgan Chase Cyberattack
JPMorgan Chase is investigating a likely cyberattack. The banking giant is cooperating with law enforcement, including the FBI, to understand what data hackers may have obtained.
Who Is the Hacker Group Lizard Squad?
Are they dangerous or just obnoxious? That’s what many are wondering about the hacker group Lizard Squad, which tweeted out a bomb threat that grounded a flight with a Sony exec aboard.

Enterprise Hardware Spotlight
Intel Intros Lightning-Fast PC Processors
Call it extreme. Intel just took the covers off its first-ever eight-core desktop processor, which is aimed at hardcore power users who expect more than the status quo from their computers.
HP Previews ProLiant Gen9 Data Center Servers
Because traditional data center and server architectures are “constraints” on businesses, HP is releasing new servers aimed at faster, simpler and more cost-effective delivery of computing services.
Apple Set To Release Largest iPad Ever
Tech giant Apple seems to have adopted the mantra “go big or go home.” The company is planning to introduce its largest iPad ever: a 12.9-inch behemoth that will dwarf its largest existing models.

Mobile Technology Spotlight
iWatch Watch: What Will Apple Ask Us To Wear?
There are still more questions than answers when it comes to details about the smart watch Apple seems poised to debut on Sept. 9. In fact, nobody seems completely sure that it will be a smart watch at all.
Samsung Maps Its Way with Nokia's 'Here' App for Galaxy Phones
Korean electronics giant Samsung has opted to license Here, Nokia’s mapping app -- formerly known as Nokia Maps -- for its Tizen-powered smart devices and Samsung Gear S wearable.
Google Successfully Tests Its Own Delivery Drone
While top technology companies are engaged in an "arms race" to develop drones that can quickly deliver goods to anyone anywhere, Google has revealed it successfully tested its own version.

NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.