[TTJDeals] The Ultra-Premium Mac Bundle
A new web exploit has been discovered by F-secure researchers. This web exploit intelligently determines the OS of the victim machine.

Your take on Getting a SmartWatch?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading...Loading...

It is common knowledge that more often than not, the same web exploit does not work on machines running different operating systems. This is precisely the reason why authors of different web exploits tend to write multiple versions to penetrate multiple OS with them. Now, a live web exploit has been found which can intelligently determine the OS of its victim before targeting it with its payload.


The web exploit is able to detect whether the victim’s system is running Windows or Linux or Mac OS X. Once it has determined the target OS, it then releases a different trojan which is specific to that OS.

The web exploit was first discovered on a Columbian transport website. The website has been compromised already and it now contained a Java applet which was able to determine the exact OS of its target machines. Once it found out the answer to this question, it would download relevant files to the victim’s system.

According to the researchers who discovered it, “All three files for the three different platforms behave the same way. They all connect to 186.87.69.249 to get additional code to execute. The ports are 8080, 8081, and 8082 for OS X, Linux, and Windows respectively.”

Mac machines are becoming more and more popular, thanks to the immense popularity that Apple has earned courtesy its other products such as iPhone and iPad. And since Mac platform is now being used by millions of users, it has attracted the attention of many new malware attacks which aim at infecting the Mac machines.

However, normally, a specific and specialized attack is launched for a given platform. For instance, if a malware author intends to infect Mac machines, he would most probably release a specific malware for the Mac platform. Generalized malware, which are meant for all platforms, are very rare. And that is why this recent web exploit is a rare discovery.

Source: F-Secure Blog

Courtesy: Arstechnica

Buy Cheapest Related Product From Amazon.com


[Tutorial] How To Perform A Hard Reset In Windows 8

[Tutorial] How To Download Wikpedia Articles In PDF
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On July 12, 2012(2 years, 9 months ago.)

Recent Products

Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  
Compare  

What Do You Think?

Loading Disqus Comments ...
Loading Facebook Comments ...

FTC Disclosure: Some of the links of this website are "affiliate links." This means if you click on the link and purchase the item, we will receive an affiliate commission.


Recent Search

Recent Tutorials

Not sure if you are aware that your Wi-Fi Router Or Modem could be hacked too. Here we found a quick tips, how to check if your Router or Modem is hacked.
Our today’s tutorial is about how to change Font on Android.
Here is the tutorial about how to setup MMS on Android device.
In this tutorial I will show you how to enable Instant Upload inside your Google+ app on Android, so that you can sync your photos and videos with Google+ instantly.
Here is another tutorial for the Android lovers. I will show you how to change keyboard on Android.
Here is our new android tutorial on how to change the default launcher on Android.
Here is the tutorial about how to setup Internet settings on Android device.
Today, We are going to show you a tutorial on how to disable Geotagging on Android.
here is our new Android tutorial on how to change default music player on android
The tutorial will help you to add multiple Google Account on your Android device.
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook