The latest version of the Flashback malware that s infecting Macs has a new command-and-control infrastructure that used Twitter as a fallback mechanism in case the normal C&C system isn t available. This is not the first time a botnet has used Twitter for some form of command and control, but it’s a good example of the ways in which attackers are always adapting to defenders actions and changing their tactics. Twitter security officials were somewhat slow to catch on to that phenomenon, but have been quicker to respond of late.
Source: https://threatpost.com/new-flashback-variant-using-twitter-backup-cc-channel-043012/76498/

