Malware writers have revamped code that uses a popular Twitter command to
generate hard-to-predict domain names, a technique that brings stealth to their
drive-by exploits.

Four weeks ago, when The Register reported Twitter application programming
interfaces were being used to generate pseudorandom domain names, none of the
addresses checked had actually been registered. Denis Sinegubko, the Russian
researcher who discovered the technique, speculates the creators abandoned it
because it was buggy and required too much effort.

Теги:

Оставить мнение

Check Also

Целенаправленная социальная инженерия. Нестандартные техники введения в заблуждение

В предыдущей статье мы разобрали массовые атаки. Но их применимость ограничена: пентестер …