![]() Plus, the data pulled from infected machines indicates it could be an example of the FBI's computer and internet protocol address verifier (CIPAV) software first identified by Wired in 2007. There's no direct evidence that the malware comes from the government, but the malware's command and control IP address is registered to a governmental defense contractor. In this case, affected Freedom Hosting servers delivered web pages to users with the JavaScript exploit embedded in them. ![]() The browser exploit - a JavaScript vulnerability inherent to Firefox version 17, the version upon which the Tor browser was built - was enabled by a breach of Freedom Hosting servers. Once installed, the code delivered infected machines' hostnames and MAC addresses to a remote web server in Reston, Virginia, a city located just outside Washington D.C. ![]() ![]() Wired reports that an exploit of that very same browser has been recently discovered that allowed a number of users' Windows computers to be infected with malware. It was just over two years ago that the paragon of internet privacy, the Tor project, decided to build its own browser by forking Firefox. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |