Malware writers have revamped code that uses a popular Twitter command to
generate hard-to-predict domain names, a technique that brings stealth to their
drive-by exploits.

Four weeks ago, when The Register reported Twitter application programming
interfaces were being used to generate pseudorandom domain names, none of the
addresses checked had actually been registered. Denis Sinegubko, the Russian
researcher who discovered the technique, speculates the creators abandoned it
because it was buggy and required too much effort.

  • Подпишись на наc в Telegram!

    Только важные новости и лучшие статьи

    Подписаться

  • Подписаться
    Уведомить о
    0 комментариев
    Межтекстовые Отзывы
    Посмотреть все комментарии