"As of now, we do not know whether this is the case. "This similarity has led to speculation that this exploit was created by FBI or another law enforcement agency," Veditz wrote. The code in general resembles the types of so-called network investigative techniques used by law-enforcement agencies, and specifically one that the FBI used in 2013 to identify Tor-protected users who were trading child pornography. The exploit used the capability to send the target's IP and MAC address to an attacker-controlled server. Further Reading Attackers wield Firefox exploit to uncloak anonymous Tor usersThe attack executed code when targets loaded malicious JavaScript and code based on scalable animation vector graphics.
0 Comments
Leave a Reply. |