There are currently two known TwitterNET Builder variants. The first variant uses malicious commands with static names. The second variant, detected by Kaspersky Lab, allows users to change the names of the command making it harder to identify which Twitter accounts are being used to control the botnets.
It takes just a couple of mouse clicks to create malicious code capable of turning infected computers into zombies, which when joined together form a botnet. The botnets are then controlled via an account set up with the popular microblogging service Twitter. Such botnets are subsequently used for the usual practices of distributing spam, carrying out DDoS attacks, etc.
TwitterNET Builder is freely available and is likely to appeal to hackers of every type, especially novices.
For further information please contact email@example.com