website statistics

A new web exploit has been discovered by F-secure researchers. This web exploit intelligently determines the OS of the victim machine.

What is the next Gadget you want?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading ... Loading ...

It is common knowledge that more often than not, the same web exploit does not work on machines running different operating systems. This is precisely the reason why authors of different web exploits tend to write multiple versions to penetrate multiple OS with them. Now, a live web exploit has been found which can intelligently determine the OS of its victim before targeting it with its payload.


The web exploit is able to detect whether the victim’s system is running Windows or Linux or Mac OS X. Once it has determined the target OS, it then releases a different trojan which is specific to that OS.

The web exploit was first discovered on a Columbian transport website. The website has been compromised already and it now contained a Java applet which was able to determine the exact OS of its target machines. Once it found out the answer to this question, it would download relevant files to the victim’s system.

According to the researchers who discovered it, “All three files for the three different platforms behave the same way. They all connect to 186.87.69.249 to get additional code to execute. The ports are 8080, 8081, and 8082 for OS X, Linux, and Windows respectively.”

Mac machines are becoming more and more popular, thanks to the immense popularity that Apple has earned courtesy its other products such as iPhone and iPad. And since Mac platform is now being used by millions of users, it has attracted the attention of many new malware attacks which aim at infecting the Mac machines.

However, normally, a specific and specialized attack is launched for a given platform. For instance, if a malware author intends to infect Mac machines, he would most probably release a specific malware for the Mac platform. Generalized malware, which are meant for all platforms, are very rare. And that is why this recent web exploit is a rare discovery.

Source: F-Secure Blog

Courtesy: Arstechnica

Buy Cheapest Related Product From Amazon.com


[Tutorial] How To Perform A Hard Reset In Windows 8

[Tutorial] How To Download Wikpedia Articles In PDF
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On July 12, 2012(1 year, 9 months ago.)

Recent Search

Recent Tutorials

At the beginning level, many people don't know how to use Gmail properly. For them, a here's a helpful guideline.
Skype now allows you to call directly from your Outlook account. Find the step-by-step installation process from this tutorial.
This tutorial helps you quickly resolve four of the most common problems that occur with Windows XP.
After releasing Look Back, many people didn't like it. So Facebook planned to add an Edit tool to the feature and now you can edit your Facebook Look Back video.
Do you want to record Skype calls but don't know how to do that? Then this guide is absolutely for you. Get inside the article for details.
Do you know that many companies can track you on Facebook? Do you want to know who they are? Do you want to block them?
So you've been planning on replacing your old hard drive with the new drive? This tutorial helps you with a few simple steps.
Bitcoin is a digital currency that has gained extraordinary momentum in the last few months. This tutorial helps you get started with the basics.
Android lockscreen can be secured in a number of ways, some of which are described in this brief tutorial.
This review of iSkysoft Video Converter tells you everything you want to know about this Win 8/7 compatible video/DVD tool. Check the below to learn more details.
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook