Fight back against #stalkdaily and its worm that hijacked Twitter today
UPDATE: Anonymous in comments says to go here to find out what to do if the worm has infected your Twitter account - the info looks pretty good. The comment also says that the domain uuuq.net was hosted at Zymic.com, not GoDaddy.
UPDATE: Twitter user jay_neff has done some research on Mikeyy Mooney and found out he appears to be from from Winnfield, Louisiana
UPDATE: I have made mistakes about who is hosting the servers. This is because I thought the companies that rented the domain names - apparently GoDaddy and Dreamhost - were the same ones renting the server space. See further corrections below and in the comments.
A 17 year old embryo scammer/spammer calling himself "Mikeyy [sic] Mooney", who says he is the founder of Twitter rip-off stalkdaily.com, has admitted launching a worm that has hijacked people's Twitter accounts today.
UPDATE: before admitting to being behind the worm, "Mikeyy" LIED to people on his own stalkdaily.com site asking him about the twitter hijacking - see Screenshot 5 below for the evidence of this, or check the account "mikeyy" on stalkdaily.com - No, I'm not linking to it!
A full account of the worm is available here at the Mashable site. The worm has deliberately changed the web link in people's Twitter profiles to point to "Mikeyy"'s own rip-off site, and has also hijacked people's twitter accounts and sent spam messages from them, promoting himself. If you notice an account that is sending messages about "Mikeyy", DO NOT CLICK ON IT!!!! Your account will be hijacked too. Twitter will no doubt let us know when all is safe again.
I did a whois lookup to see who owns the stalkdaily.com account. There is no personal info available, unfortunately, but
UPDATE/CORRECTION: The stalkdaily site is hosted by FastServers, NOT Dreamhost. FastServers' abuse reporting address is abuse@fastservers.com
I have sent a similar email to the one I sent to Dreamhost to FastServers - please consider sending one yourself. CORRECTION ENDS.
So I have sent an email to abuse@dreamhost.com asking them to cancel this loser's accounts:
Dear Madam, or Sir,
I am writing to let you know that a website hosted by you - according to a whois lookup - admits responsibility for launching a worm that has exploited security holes in the Twitter.com website, of which I am a member. The worm has been hijacking accounts and sending spam updates from those accounts, which has directly impacted my enjoyment and use of the twitter.com site. I attach a screenshot of the Twitter Search site, showing these spam messages.
The website is www.stalkdaily.com
I attach a screenshot of the front page of www.stalkdaily.com where the purported owner of the site - or someone with permission to post to that site's front page - admits that they are responsible for creating the worm. The article the link on the front page leads to is at http://www.bnonews.com/news/242.html
Since the worm links people's Twitter accounts to stalkdaily without their knowledge or consent, I can only assume that this is a breach of your terms of service.
I would appreciate it if you would delete all accounts held by this account holder immediately.
If you want to get this moron punished, please do the same - send a complaint email to abuse@dreamhost.com asking them to cancel "Mikeyy"'s accounts. Let's get this fool kicked off the Internet, if only for a while.
If your acccount has been infected, this link will tell you what to do:
http://mashable.com/2009/04/11/stalkdaily-twitter/?disqus_reply=8093439#comment-8093287
UPDATE: This blog post seems to show that the actual domain where the malicious script was hosted is uuuq.com. A whois lookup of that domain name
I have used this page to submit an email to GoDaddy as well:
Dear Madam, or Sir,
I am writing to you about the Twitter worm active today, April 12 2009, that was apparently hosted at a domain name that GoDaddy hosts.
Details of the worm can be found here: http://mashable.com/2009/04/11/stalkdaily-twitter/
This blog post: http://dcortesi.com/2009/04/11/twitter-stalkdaily-worm-postmortem/
indicates that malicious script that was used to hack the Twitter website, affecting my user experience there, was hosted at uuuq.com. A whois lookup: http://reports.internic.net/cgi/whois?whois_nic=uuuq.com&type=domain
indicates that GoDaddy is the host of this domain.
I assume that hosting malicious scripts on your servers is a breach of your Terms of Service. I ask that you delete all accounts hosted by the owner of uuuq.com
Regards,
David Jackmanson
UPDATE: This post at the Mundoreves blog says the new attack on Twitter is by a script hosted at ireel.com. The Whois lookup for ireel.com indicates it is hosted by Ideal Media in Quebec, email address
So I've sent another email off:
Dear Madam, or Sir,
I am writing because of this blog post: http://www.mundoreves.com/display/HOME/2009/04/12/Examining+the+StalkDaily-Mikeyy+twitter+worm... , which indicates that malicious script has been hosted on your site that has been used to hack the Twitter.com site, which has affected the experience of many users, including myself.
I would appreciate it if you could check this, and if it is indeed the case, if you would stop anyone hosting this sort of malicious script on your servers.
Regards,
David Jackmanson
Screenshot 6 below shows the whois lookup that provided me with this information.
Click on the screenshots below to see full-sized versions of them.
Screenshot 1: Stalkdaily.com's "Mikeyy" admits he is behind the worm:
Screenshot 2: Twitter Search shows how "Mikeyy" has infested the Twitter timeline:
Screenshot 3: Whois lookup screenshot confirming that stalkdaily.com is hosted by Dreamhost:
Screenshot 4: Whois lookup screenshot confirming that uuuq.com - host of the malicious script - is hosted by GoDaddy.com
Screenshot 5: Evidence that "Mikeyy" LIED to members of his own stalkdaily.com site about his involvement in the Twitter hijacking:
Screenshot 6: Whois lookup for ireel.com
5 comments:
uuuq.com is a Zymic domain. They have already suspended the mikeyylolz.uuuq.com account (go to it and you can see this). The current XSS worm script is coming from a different domain and has already been reported.
I found some good info here about how to deal with infected profiles: http://lynnepope.net/twitter-xss-attacks
The script has evolved a couple of times already in the past 24 hours so until Twitter gets its act together there could be more of these.
Anonymous, thanks for the info. So GoDaddy just provides the domain name but no hosting space?
I've added the link you've provided to the article and updated the info about GoDaddy.
actually, a whois on the IP address of stalkdaily.com seems to indicate that the hosting is at fastservers.net, not dreamhost
Anonymous, that also appears to be correct. I am obviously getting confused between who rents the domain name and who rents the server space.
The link confirming that Anonymous is correct is http://whois.domaintools.com/stalkdaily.com.
The whois record for the server is at http://whois.domaintools.com/74.200.253.195.
I've updated the post again with this information.
stalkdaily is now "undergoing redevelopment"
http://stalkdaily.com
I wonder if 'mikeyy' knows a really good attorney. He's gonna need it.
Post a Comment