Search:

Type: Posts; User: SirDice; Keyword(s):

Search: Search took 0.13 seconds.

  1. Replies
    7
    Views
    9,178

    Ah.. Now I understand :D AFAIK they used an...

    Ah.. Now I understand :D

    AFAIK they used an adobe acrobat exploit to install a keylogger. See http://www.securityfocus.com/bid/30035
    No names, so it's likely a custom build exploit.
  2. Replies
    7
    Views
    9,178

    As I said, they probably used spear phishing, not...

    As I said, they probably used spear phishing, not a trojan or any other type of malware.


    http://en.wikipedia.org/wiki/Phishing
  3. Replies
    7
    Views
    9,178

    DNS wasn't really hijacked. They managed to...

    DNS wasn't really hijacked. They managed to obtain the username/password that allowed them to change the domain.

    They probably got those credentials with spear phishing.
Results 1 to 3 of 3