The malware, once embedded, performs a daily check for a specific Twitter account, theunique name of which is generated on each occasion by an inbuilt secret algorithm.
一旦植入这种恶意程序,它将每日查看具体某个Twitter账号,内置的秘密算法会每次生成独一无二的名字。
Hammertoss’s controllers, by possessing an identical algorithm, are able to know the name ofthe Twitter account the malware will look for each day. If they wish to issue a command toHammertoss, they set up the account and post a tweet.
Hammertoss的控制者通过处理同样的算法,就能知晓这种恶意软件将每天寻找的Twitter账号的名字。如果他们想向Hammertoss发布命令,他们就建立一个账号,发布消息。
The tweet may look innocuous, but it will contain a link to an image. The image has a secretmessage for Hammertoss encoded within it — another Cold War technique known assteganography.
这些消息可能看上去毫无恶意,但将在图片中隐藏一个链接。图片中含有加密的秘密信息,这是冷战中的另一种谍报技术:“隐写术。
Another Russian malware family, known as MiniDuke also used Twitter for certain commandand control operations, but unlike Hammertoss, was limited to communications with a limitednumber of specific, pre-established accounts.
俄罗斯的另一个恶意程序家族名为MiniDuke,它也利用Twitter传递特定命令和控制任务,但与Hammertoss不同的是,它限于与有限数量的提前设置的特定账户的信息沟通。
【俄罗斯间谍利用Twitter掩护网络入侵】相关文章:
★ 美国大选与金价
最新
2020-09-15
2020-09-15
2020-09-15
2020-09-15
2020-09-15
2020-09-15