An Android SMS bot that uses Twitter and spreads through spam attachments read from Android-running devices was spotted in the wild. With the ability to hide its launcher icon, the SMS bot makes it difficult for users to spot its detection after the installation process is completed. The malware uses various Twitter profiles to get a domain name a common technique used to obfuscate the malicious domain. The bot also receives instructions to send SMS messages by accepting parameters like phone number, message content, and the number of times the message is to be sent. This is common practice for voting malware.”]
Source: https://www.bitdefender.com/blog/hotforsecurity/android-sms-bot-uses-twitter-to-hide-cc-server/

