malicious reconnaissance campaign that targets websites. It is unknown what is the intent behind the campaign as of this writing, however, the profile of the targets resembles those that are common targets of Advanced Persistent Threat (APT) actors. As the attack is currently active, it effectively turns compromised sites into attack surfaces against their visitors.
Hacktivist group Anonymous hacks the company servers Freedom Hosting II and lay down some 10,000 web pages based on Tor, representing almost 20% of the web deep. Hackers claim that at least half of the web pages were child pornography.
Our experts confirm spoofing contact details is easy to do. There are a number of websites who offer the service as a way to "prank" your friends.Not saying these sites are set up for criminals but are they taking into account that fraudsters are making use of the spoofing services.
If the user have JAVA (or python or similar interpreters) an attacker can insert jar file or py file into the presentation and trigger it when mouse moves, for easier exploitation the attacker can use ppsx file which will load automatically in presentation mode and once the user opens the file and moves mouse it will trigger the payload.