国产制服丝袜亚洲日本,无码一区二区三区AV免费换脸,亚洲另类欧美日韩国产,自拍偷拍第十页,亚洲最新av一区

手機(jī)號(hào)
驗(yàn)證碼
立即登錄    忘記密碼? 注冊(cè)
手機(jī)號(hào)
郵箱
立即登錄    免費(fèi)注冊(cè) 找回密碼

5/9/2018 2:54:00 PM

雙語(yǔ)閱讀:身邊的網(wǎng)站安全隱患

Researchers with cybersecurity firm Trend Micro have uncovered a malicious extension in Google’s Chrome web browser that uses a multitude of methods to steal and mine cryptocurrency from infected users.

網(wǎng)絡(luò)安全公司趨勢(shì)科技(Trend Micro)的研究人員在谷歌Chrome瀏覽器中發(fā)現(xiàn)了一個(gè)惡意擴(kuò)展程序,它使用多種方法從受感染的用戶(hù)那里竊取和挖掘加密貨幣。

雙語(yǔ)閱讀:specific musical anhedonia?


The malware, which Trend Micro calls “FacexWorm”, makes its way onto a victim’s browser via social engineering tactics conducted through Facebook Messenger. A target would receive a link leading to a fake YouTube page that would prompt the user to install an extension in order to play the video. Once the extension is installed, it’s programmed to hijack users’ Facebook accounts and spread the link throughout their friends list.
趨勢(shì)科技稱(chēng)為“FacexWorm”的惡意軟件通過(guò)Facebook Messenger進(jìn)行的社交工程策略侵入受害者的瀏覽器。一個(gè)目標(biāo)會(huì)收到一個(gè)鏈接,彈出一個(gè)虛假的YouTube頁(yè)面,提示用戶(hù)安裝擴(kuò)展程序以播放視頻。一旦安裝了擴(kuò)展程序,它就會(huì)被編程為劫持用戶(hù)的Facebook賬號(hào)并將其鏈接傳播到他們的朋友列表中。

FacexWorm appears to be a Swiss Army knife of cryptocurrency-oriented malware. According to Trend Micro, the malicious extension has various capabilities:
FacexWorm似乎是面向加密貨幣惡意軟件的“瑞士軍刀”,包含多種可能性。據(jù)趨勢(shì)科技稱(chēng),惡意擴(kuò)展具有各種功能:

If an infected user tries logs into Google, MyMonero or Coinhive, FacexWorm will intercept the credentials.

如果受感染用戶(hù)嘗試登錄谷歌,MyMonero或Coinhive,F(xiàn)acexWorm將攔截憑證。

那些有趣的外國(guó)明星的中文昵稱(chēng)


When a victim tries to go to a specified set of cryptocurrency trading platforms, they get redirected to a scam site that requests a small amount of Ether, ostensibly for verification purposes.
當(dāng)受害者試圖訪問(wèn)一組指定的加密貨幣交易平臺(tái)時(shí),他們會(huì)被重定向到一個(gè)要求少量Ether的騙局網(wǎng)站,表面上用于驗(yàn)證目的。

If FacexWorm detects that a user is on a cryptocurrency transaction page, the extension replaces the wallet address entered by the user with another one from the attacker. Trend Micro says currencies targeted include bitcoin, Bitcoin Gold, Bitcoin Cash, Dash, Ethereum, Ethereum Classic, Ripple, Litecoin, Zcash and Monero.
如果FacexWorm檢測(cè)到用戶(hù)處于加密貨幣交易頁(yè)面,則擴(kuò)展程序?qū)⒂脩?hù)輸入的錢(qián)包地址替換為攻擊者的另一個(gè)地址。趨勢(shì)科技表示,目標(biāo)貨幣包括比特幣、比特幣黃金、比特幣現(xiàn)金、Dash,以太幣,Ethereum Classic、瑞波幣,萊特幣,Zcash和Monero。

Trying to go to certain websites will redirect a victim to a referral link that rewards the attacker.
試圖訪問(wèn)某些網(wǎng)站會(huì)將受害者重定向到獎(jiǎng)勵(lì)攻擊者的推薦鏈接。

And, of course, FacexWorm has a cryptojacking component, using the victim’s processor to mine for cryptocurrency.
當(dāng)然,F(xiàn)acexWorm還有一個(gè)加密組件,使用受害者的處理器來(lái)挖掘加密貨幣。

If an affected user appears to be trying to remove the malicious plugin, it has ways of stopping them, Trend Micro says. If a user tries opening Chrome’s extension management page, the malware will simply close the tab.
趨勢(shì)科技稱(chēng),如果受影響的用戶(hù)似乎試圖刪除惡意插件,還可以阻止它們。如果用戶(hù)嘗試打開(kāi)Chrome的擴(kuò)展管理頁(yè)面,惡意軟件將簡(jiǎn)單關(guān)閉該選項(xiàng)卡。

Trend Micro says it’s only discovered one instance in which FacexWorm compromised a bitcoin transaction, according to the attacker’s digital wallet address, but that that there’s no way to tell for sure how much the attackers have actually profited.
根據(jù)攻擊者的數(shù)字錢(qián)包地址,只有FacexWorm發(fā)現(xiàn)了一個(gè)比特幣交易被入侵的例子,但是沒(méi)有辦法確定攻擊者實(shí)際獲利的多少。

The attacker is persistently trying to upload more FacexWorm-infected extensions to the Chrome Web Store, the researchers say, but Google is proactively removing them. Trend Micro says Facebook, with which it has a partnership, has automated measures that detect the bad links and block their spread.
研究人員說(shuō),攻擊者一直在試圖將更多受FacexWorm感染的擴(kuò)展程序上傳到Chrome網(wǎng)上應(yīng)用店,但Google正在主動(dòng)將其刪除。趨勢(shì)科技稱(chēng)Facebook與其建立了合作伙伴關(guān)系,它采用自動(dòng)化措施來(lái)檢測(cè)不良鏈接并阻止其傳播。


閱讀文章:積分+1