In a bizarre coincidence, this hashtag-crammed @SorabNY tweet was retweeted by a bunch of accounts created in May 2014 with random-looking names. #FridayFeeling
These accounts are part of a 29-account retweet botnet created on May 25th, 2014. All the accounts have names consisting of 11 or 12 lowercase letters, beginning with a consonant and followed by alternating vowels and consonants. We suspect the names were generated randomly.
The accounts in this botnet have thus far posted all of their tweets (allegedly) via "Twitter Web App". Despite being created back in 2014, we found no evidence any of them tweeted prior to September 2020, with most accounts activating for the first time on December 9th, 2020.
Who do these accounts retweet? They mostly amplify accounts promoting various products and services, although political tweets from @realDonaldTrump turn up in the mix as well. (The tweets in the collage are examples of tweets retweeted by every bot in the network.)
Although we weren't able to find most of these accounts' profile pics via reverse image search, we did notice something interesting: portions of their profile pics are frequently used as header images on other accounts in the botnet.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Answer: unsurprisingly, a botnet. We found 19 accounts that we believe are part of the network, created over the course of a little over an hour on December 7th, 2020. All their tweets thus far are replies sent via either "Mobile Web (M2)" or "Twitter Web Client".
The 19 accounts in this reply spam botnet operate on nearly identical schedules, and often send the same replies. Most replies are in Arabic, with the occasional English reply thrown in for good measure. (As always, take the Google translations with a grain of salt.)
We've seen @justinsuntron turn up occasionally in our research on fake engagement networks, so we started perusing his followers to see what there is to see, and found an interesting little group of batch-created accounts.
The botnet we found following @justinsuntron consists of 886 accounts created on September 24th and October 1st, 2020. Their initial wave of tweets was set via TweetDeck, and subsequent tweets were (allegedly) sent via the Twitter Web App. All have female names.
These accounts do four things:
• quote tweet cryptocurrency giveaway tweets (mostly from @justinsuntron)
• retweet cryptocurrency tweets
• reply "good" to a tweet from @OneSwap
• post original tweets composed of random nonsense
Answer: they're part of a botnet, consisting of 12 accounts automated via a custom app called "TweetFoxx". Although they do have occasional organic tweets, the vast majority of their content (19802 of 20233 tweets since September 1st, 2020, or 97.9%) is automated.
The majority of accounts in this botnet operate on very similar schedules. The exception is @TaioSchmid , which is active for fewer hours a day and skips out on retweeting some of the tweets amplified by its compatriots.
We found a group of 22 accounts sending automated tweets linking to soompi(dot)com, created between 2010 and 2014. Although some have older organic tweets, all recent content was posted via automation service twittbot(dot)net.
What does this botnet do? It links soompi(dot)com, and does literally nothing else (or at least hasn't in the most recent ~3200 tweets from each account, every single one of which contains a link to soompi(dot)com).
While looking at something mostly unrelated, we ran across @coinkit_, a tool that allows one to pay cryptocurrency to the first N accounts that retweet/quote tweet one's tweets. We can't help but notice that this appears to be a TOS violation.
The get-paid-cryptocurrency-to-retweet feature of CoinKit is triggered by adding to one's tweets the phrase "@coinkit_ mon" followed by information about how much one intends to pay for the astroturfing assistance. Are folks using multiple accounts to game the payouts?
Answer: yes. We downloaded recent tweets containing "@coinkit_ mon" and found a number of spikes in account creation dates indicating batch creation of accounts. We looked at the largest six spikes, which correspond to five distinct bot/sock networks.
Earlier tonight, a Twitter account named @Fauci sent out a tweet impersonating Dr. Anthony Fauci and was quickly suspended. We did some research on it before the ban, and decided to present our findings as a tutorial of sorts on detecting impostor accounts.
First off, the (subsequently suspended) @Fauci account sent what it claimed was its first tweet in December 2020, despite being created in 2009. It's also potentially odd that Fauci would retweet the Biden transition team while still working for the Trump administration.
Secondly, we looked at old tweets tagging @Fauci, and most of them don't appear to have much to do with virology or any other medical topic. Some are in Indonesian, which as far as we have been able to discern, the real Dr. Fauci does not speak.