Erk, Who is on Twitter again? (Consolidated lists!)

Every now and then the discussion comes up “Where do I find ‘x’ people on twitter?”  I usually resort to random google searches, sometimes finding what I’m looking for, sometimes not quite so much!  So here is my repository for you, me and my cat to find people easier.

NetApp Folks are Twittering!

Storage Folks Are Twittering

Virtual Twits including a script which will auto-add them for you!

PowerShell Twitterers, including a script which will auto-add them for you!

C Level Tweeters

December: Newspapers that use Twitter (Thousands of accts on Twitter!)

60 New York Times profiles on Twitter

UK journalists on Twitter

USGovernment on Twitter

Hunger Twitterers

And that’s all I have for a repository right now – if you have a list which should be added here, or you think I should include some specific grouping, make it known :)

Sweet! NetApp VMware ESX Host Utility Kit 5.0R1 + mbrscan!

Sweet! Yea, you heard me, sweet!

The VMware ESX Host Utility Kit v5.0R1 was just released! Hooray!

And one of the coolest parts of it – mbrscan!

mbrscan – interrogates a disk file and reports on the primary partitions’ alignment

For those of you who haven’t used mbrscan, you can use it to check the alignment of your vm’s in order to determine if they’re properly aligned on disk.  I’ve done it on countless vm’s with great success.

The even greater success will come about when you use mrbalign which I hope to see get approved and added to the HUK sometime in the near future! (Though if you want/need access to mbralign, which actually –aligns- your vm’s for you – contact your local Sales/PS org :))

No, that wasn’t a pitch, that was merely a factual statement, it’s a sweet tool though! I used that to align my VM’s I run on VMware fusion :)

Who is Craig Martin (A funny blog post about You!)

Alright, in honor of the great successes brought about by Jason Mitchener’s question before, a few more funny blog posts! (It may not be funny, it may simply be ironic what this Worm has done ;))

So on to our question of – Who is Craig Martin?

Full-time traveller; lover of coffee and wine; editor of websites 

Which is a pretty good question, he appears to be a traveler and a Kiwi – I love Kiwi’s, especially with Strawberry!  

Well, for one thing by the look of his website he’s a pretty busy guy out wining and dining err wining.

He’s an editor of websites, so I’d suggest checking out his (various) sites, because from his main site alone, wow! Looks good to me! Very structured especially inlight of others trying to do similar and only inducing chaos.   I also think it’s cute how he says “zed” in his little video, not to mention that he has a whole introduction and video going on – while sitting in a beautiful garden!

He’s a traveler, adventurer, Ninja.  Okay, maybe he’s not a traveler, but he is a hardcore ninja, the likes of which you could only counteract with Pirates.

So, be sure to follow @craig_martin and check him out, he’s great and apparently with his following of 666 followers he’s in lieu with the devil so help break him from that habit! ;)

Oh, and he’s very friendly so check him out! :)

Twitter Phishing Scam with Blogspot – Post Mortem

What are our lessons learned so far from this little Twitter Phishing Scam?

First of all, this involved infecting a single or single groups of people.

Distribution consisted of Infect a person by sending them to a site to capture their credentials.   Once those usernames and passwords were collected, they would then use those compromised credentials to send this same message (via DM) to their followers, and continue the spread.

If Joe has 10 followers and DM’s it to those 10, and those 10 have 10 followers and DM it to the next 10, shortly you’d have thousands who are redistributing this – So long as they’ve visited the site and entered their credentials to be captured.

I see a lot of anger “I’m going to get person ‘x’ who sent me this message!”

It’s not the fault of the sender, not entirely.   They were compromised by a phishing scam, it happens, you should work towards educating them instead of castrating them.  So next time it will be part of their sense to not transmit their username/password to an untrusted site.

How could this terrible thing have happened? Now I hate (BlogSpot, Twitter, Followers)

Don’t hate the player, just be glad that it WAS done this way (a semi-safe site with only a small portion of cookies which get added to your browser)   Here is what could have happened if it were introduced in an effective ‘distribution manner’.

You visit the site, you are prompted for credentials.  Perhaps you’re prompted for credentials, though the better payload would be in the form of Malware, Spyware, Phishing-ware, Password capturers, and a number of other infection mechanisms.

Once this would be done, you’d be able to compromised on a number of fronts and able to distribute this to millions instead of just the few followers you have – Infecting Facebook, your banking account, etc so on and so forth.

What can I do about this in the future?

The universal rule of communication, especially unsolicited is ask yourself a few questions.   Would you visit this link if you were having a conversation with the person? Having established rapport with them while talking? Yes likely.

However the tip here is – Random “auto-dm’s” does not guarantee a reason to visit their link.  Yes a lot of people DO send out auto-DM’s, to the bane of all of us (SocialToo/ChrisBrogan– Thanks for helping limit that exposure!)  However, don’t bane all communication in the future.   If you think someone seriously DID write a funny blogpost about you because the person knows you, definitely do check it out! But in all seriousness, if you’ve not had some kind of established communication with this person to justify it, and let alone it brings you to not a funny blogpost, but to a fake twitter login page – Be sure to question it and use your common sense here.

Oh, and be wary of ever entering your credentials – again unless you explicitly trust the source.

Hopefully this Post-Mortem helps you deal with this situation, I’m still waiting for my self-infected account to start tweeting out to me (Controlled infection) For every problem there will be people looking to exploit it, and others trying to solve and contain it.   I’ll be there trying to find new solutions and rid the world of future exposure as well :)

Good luck, and feel free to follow me if you like :) @cxi

Phishing Scams finally hit Twitter!

Ever been Phished on Twitter? Get ready to.

You might receive a message similar to this:

hey! check out this funny blog about you... http://jannawalitax.blogspot.com/

Going to this page causes a redirect to this lovely site: http://twitter.access-logins.com/login/

image

Wow, that looks like the Twitter login page, however it isn’t Twitter.

Don’t enter your credentials, for you begin to enter into the world of being Phished!

Simply clicking on each of their links results in a broken page as well (That’s not very good phishing!)

Not Found

The requested URL /about was not found on this server.

Even their SignUp link is broken!

Once you enter your credentials you’re passed on to the Twitter.com mainsite and are able to see the basic information you’d see as if you were logging in to twitter.

I created a test account specifically to bring you that information :)

So, beware, and be sure not to visit this site and enter your credentials.

This is REAL Phishing in motion!

FYI: When this operates correctly, it appears to operate in an almost “Worm-like” fashion by infecting one person and then sending the payload “Auto-DM” to everyone that is following the person, so on and so forth while it spreads itself through the interwebs.

I’m still trying to self-infect a test account in order to see it in action, but so far on luck!