
“Security experts call it a ‘drive-by download’: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes. Now the technique is being adopted by a different kind of a hacker—the kind with a badge. For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement’s knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system.”
http://www.wired.com/2014/08/operation_torpedo/
Related posts:
Sell a gun to someone who smokes a joint, get 20 years in jail
Chinese fish vendor finds live bomb inside squid’s stomach
U.S. Secret Service Bans Sale of Silver and Gold Liberty Dollars on Ebay
Mastercoin: A Second-Generation Protocol on the Bitcoin Blockchain
NSA Reassures Family & Friends Of NSA Employees It Isn't Evil
Crypto-currency for NSA leaker: Snowden fund accepts Bitcoin
Should Detroit’s Bankruptcy Be an Early-Warning Sign for Washington?
Angry anti-war protesters besiege John Kerry’s home, banging on doors, windows
Glenn Greenwald: Obamacare architect leaves White House for pharmaceutical industry job
Israel and Iran: A love story?
The Evolution of the Marijuana Marketplace
Persian Handmade Shoes: Why Bitcoin
Andrea Castillo Discusses Bitcoin on Capital Insider
Khan Academy now accepts bitcoin donations
FBI Software For Analyzing Fingerprints Contains Russian-Made Code