“Security experts call it a ‘drive-by download’: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes. Now the technique is being adopted by a different kind of a hacker—the kind with a badge. For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement’s knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system.”
http://www.wired.com/2014/08/operation_torpedo/
Related posts:
Secret terrorism court orders declassification of its own rulings
Lamassu Sells 100th Bitcoin ATM
Buying Booze With Bitcoins: Yes, I Took One For the Team
Ukraine to Regulate Bitcoin Businesses Under Existing Laws
Students DESTROY NSA Recruiters Over Illegal Spying and Lies
Korea's biggest Bitcoin exchange gets $400K Silicon Valley investment
The John McKenna Case: Video Captures Baton Blows to University of Maryland Student
New NDAA Costs You $5,700
Virtual Currency Meets Healthcare as Polish Dentist Accepts Bitcoin
Of Course, Gun Laws MUST Exempt the Police
IRS: 330K Taxpayers Hit by ‘Get Transcript’ Scam
Ron Paul: Defending the NSA means embracing ‘dictatorship’
Google ordered to remove links to stories about Google removing links to stories
The Mike Bloomberg Legacy: 12 Years of Little Tyrannies in 2 Minutes!
Housing: Addicted to Fiat Money