Malware writers have revamped code that uses a popular Twitter command to
generate hard-to-predict domain names, a technique that brings stealth to their
drive-by exploits.

Four weeks ago, when The Register reported Twitter application programming
interfaces were being used to generate pseudorandom domain names, none of the
addresses checked had actually been registered. Denis Sinegubko, the Russian
researcher who discovered the technique, speculates the creators abandoned it
because it was buggy and required too much effort.

Оставить мнение

Check Also

Пишешь на С++ или .NET? Даем скидку 50% на Deleaker, программу для поиска утечек памяти

Deleaker — это программа для разработчиков под Windows, пишущих на C++. Она ищет утечки па…