How do the hackers do it? Well, they will first upload special images over to Twitter which are used to transmit directions to installed malware on the quiet, which will then allow them to perform various potentially damaging actions such as stealing files as reported by The Financial Times. This particular approach works simply because the “victimized” computer systems does not even realize or register such an intrusion, as it resembles yet another Tweet.
Cybersecurity firm FireEye has labeled this particular trick as “Hammertoss”, citing that such as attack method was “designed so that defenders can neither detect nor characterize its activity”. It looks like a whole lot more things than just computers are getting hacked these days, including self-targeting sniper rifles and a Jeep. Perhaps it really is time to live off the grid from now on.