Sunday, September 15, 2013

How FBI Magneto script and Google broke broke into your computers


The payload for the Tor Browser Bundle malware above is hidden in a variable called “magneto”.
Security researchers tonight are poring over a piece of malicious software that takes advantage of a Firefox security vulnerability to identify some users of the privacy-protecting Tor anonymity network.

Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted web site that triggers an attempt to execute data at an unmapped memory location. REMOTE ATTACKER TO FIREFOX BROWSER WAS GOOGLE CORP. TOO !

External Source: CONFIRM
Name: https://bugzilla.mozilla.org/show_bug.cgi?id=857883
Hyperlink:https://bugzilla.mozilla.org/show_bug.cgi?id=857883

Yes NSA did it 231 times in 2011. Budget documents say the $652 million project has placed “covert implants,” sophisticated malware transmitted from far away, in computers, routers and firewalls on tens of thousands of machines every year, with plans to expand those numbers into the millions

___________________________  
99% BAD HARDWARE WEEK proof: Find more at National Vulnerability Center  (driven by NIST and National Cyber Security Division). ALL RECENT STORIES RELATED WITH SNOWDEN LEAKS WHERE ACTUALLY TO DIVERT PUBLIC TO USE THEN  BREACHED TOR "SECURE" NETWORK !!!

Comments: Post a Comment



<< Home

This page is powered by Blogger. Isn't yours?