📜 ⬆️ ⬇️

Exploit kits for security writers

Yesterday, I stumbled upon an interesting twitter account, which attracted the attention of strange tweets addressed to the receivers. Attention attracted the following properties:

This kind of account name was obviously chosen in order to attract more attention.



Later, I shared the information with Peter Kruse , who discovered that the links are URLs to bogus exploit statistics pages, and they themselves contained an exploit code to install malicious code into the system of the user who followed this link.
')




Kafeine believes that in this case we are not talking about attacks on resellers, but rather a deliberate leak of statistics on the operation of the panels.

Brian's post http://krebsonsecurity.com/2013/08/personalized-exploit-kit-targets-researchers/ .

Source: https://habr.com/ru/post/190314/


All Articles