
“Security experts call it a ‘drive-by download’: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes. Now the technique is being adopted by a different kind of a hacker—the kind with a badge. For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement’s knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system.”
http://www.wired.com/2014/08/operation_torpedo/
Related posts:
From Petrodollar To Petrogold: The US Is Now Trying To Cut Off Iran's Access To Gold
New exploit leaves most Macs vulnerable to permanent backdooring
Russia Asks For The Impossible With Its New Surveillance Laws
Massachusetts Crime Lab Investigation; 34,000 Cases Tainted
Dec. 20, 1983: Rumsfeld shakes hands with Saddam Hussein
"Why Did You Call the Police? They Don't Help"
A Bit Above The Rest
Fed Warns of 'Escalating Threats' to U.S. Payment System
Colombia Stops Short of Bitcoin Ban, Bars Banks From Industry
Grandmother in violent SWAT raid for neighbor's wireless internet use
How to negotiate directly with physicians and hospitals
EU Parliament Study Warns Politicians Not To Ban Bitcoin
Drone crashes into crowd at American ‘Running of the Bulls’
House Republican Claims Reagan Stood Up To Chemical Weapons Use
James Bamford: The Secret War