drmike
100% Tier-1 Gogent
FBI Admits Control of Malware-Spewing Tor Servers
...malware attack on the Tor network used a Firefox exploit to send the personal data of Tor users to an IP address in Reston, Virginia. FBI's "computer and internet protocol address verifier" (CIPAV) spyware iniatiative.... a new Wired report confirms that the FBI in court has acknowledged they controlled the servers behind that attack on the Tor network.
It looked up the victim’s MAC address — a unique hardware identifier for the computer’s network or Wi-Fi card — and the victim’s Windows hostname. Then it sent it to a server in Northern Virginia server, bypassing Tor, to expose the user’s real IP address, coding the transmission as a standard HTTP web request.
The magic behind the exploit?
"malicious Javascript with a tiny Windows executable hidden in a variable named “Magneto".
[source: http://www.dslreports.com/shownews/FBI-Admits-Control-of-MalwareSpewing-Tor-Servers-125839]
...malware attack on the Tor network used a Firefox exploit to send the personal data of Tor users to an IP address in Reston, Virginia. FBI's "computer and internet protocol address verifier" (CIPAV) spyware iniatiative.... a new Wired report confirms that the FBI in court has acknowledged they controlled the servers behind that attack on the Tor network.
It looked up the victim’s MAC address — a unique hardware identifier for the computer’s network or Wi-Fi card — and the victim’s Windows hostname. Then it sent it to a server in Northern Virginia server, bypassing Tor, to expose the user’s real IP address, coding the transmission as a standard HTTP web request.
The magic behind the exploit?
"malicious Javascript with a tiny Windows executable hidden in a variable named “Magneto".
[source: http://www.dslreports.com/shownews/FBI-Admits-Control-of-MalwareSpewing-Tor-Servers-125839]