![]() Unuchek wrote that using a TOR site as a command-and-control server makes it "impossible to shut down." TOR websites are difficult to trace because the network masks the site's true IP address, making it difficult to know which hosting company supports it. TOR-enabled websites, which included ones such as now defunct Silk Road marketplace, are denoted by ".onion" at the end of their URL. The malware can intercept SMSes, and collect other data, such as a user's phone number, the device's IMEI and the country where the device is located and request GPS coordinates. The latest finding shows hackers are increasingly targeting powerful mobile devices, which often hold valuable personal data. Adding TOR functions to desktop malware programs is nothing new.
0 Comments
Leave a Reply. |