Takes you back doesn't it? What used to be a daily reality back in 2008 namely the use of iFrame injected scripts on major Web properties basically forwarding the redirecting legitimate traffic to client-side exploits serving web malware exploitation kits is still a valid practice in today's modern and sophisticated cybercrime ecosystem.
Independent Contractor. Bitcoin: 15Zvie1j8CjSR52doVSZSjctCDSx3pDjKZ Email: dancho.danchev@hush.com OMEMO: ddanchev@conversations.im | OTR: danchodanchev@xmpp.jp | TOX ID: 2E6FCA35A18AA76B2CCE33B55404A796F077CADA56F38922A1988AA381AE617A15D3D3E3E6F1
Monday, February 06, 2023
A Peek Inside the Internet Explorer Zero Day Exploits Serving Campaign Affecting Thousands of Legitimate Sites Circa 2008 - An Analysis
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment