Hackers create 'disposable codes'
Researchers and security companies are struggling with the emergence of a new user attack tactic that can easily pass through their surveillance eyes.
Researchers and security companies are struggling with the emergence of a new user attack tactic that can easily pass through their surveillance eyes.
Accordingly, hackers will kidnap a website and insert malicious code. If a user accidentally accesses this website, their PC will be infected with malicious code if it has not been fully installed. The main task of malicious code is to kidnap the system for other purposes of hackers or steal confidential personal information of users.
Security firm Finjan said the special feature of this attack method is that hackers use JavaScript to ensure that every user accessing that website is infected only once.
" This method of attack is the clearest proof of a leap in the complexity of attacks. The new method has limited the maximum exposure of malicious code to security studies or feces. Each member can only see malicious code once . "
When users access the hackers' website, they will record their IP address into the database. If users re-access the website again, the programming code will confirm the IP and no longer infect their PC. In addition, hackers can block malicious code from infecting a user's PC in a certain country.
This method has helped hackers hide their malicious code in the eyes of security researchers. Now they may want their malicious code to exist as long as they want. But security firms have been able to detect the threat from this attack.
There are still no statistics on how many websites use this kind of attack. However, Finjan warned that this method is very popular among hackers.
Hoang Dung
- Forests are at risk because of disposable chopsticks
- How to read UPC bar codes to identify US, Japanese or Chinese goods
- Change the phone code for some localities and agencies
- Danger from disposable wet paper
- Disposable plastic dishes can cause cancer
- Disc made from tree leaves - The invention that the world needs
- New Zealand prohibits the use of disposable plastic bags
- 25% of US hackers work for the FBI
- The world of thieves
- Warning about new ways of operating hackers
What is the Snapdragon SiP chip? How to create a yellow circle around the mouse cursor on Windows Edit the Boot.ini file in Windows XP 3 ways to restart the remote computer via the Internet Vietnam computer market: Looking back a year How to restore deleted applications on Android How to increase the capacity of C drive on Windows 10, 8, 7 ... 8 security features of Windows operating system