Russian hackers are using Twitter as an ultra-stealthy way of concealing their intrusions intosensitive Western government computer systems — a new surveillance technique that blendscutting edge digital engineering with old-fashioned spy tradecraft.
俄罗斯黑客正把Twitter用作一种超级隐秘的方式,隐藏其入侵西方政府敏感电脑系统的行为,这种新的监视技术将先进的数字工程技术与老式的谍报技术结合在一起。
The hackers use images uploaded to the social media site to send messages and directions tomalware — or malicious software — with which they have infected target computers.
黑客利用上传至Twitter的图片向植入到目标电脑中的恶意程序传递信息和指令。
The value of using Twitter as a means to control the malware — which may direct computers tosteal files or other unintended operations — is that it is virtually invisible to most detectionsystems, appearing instead like myriad other visits users make to the social networking site.
把Twitter用作控制这种恶意程序的方法,其好处在于,多数侦测系统几乎无法察觉,看上去像是用户在大量访问这家社交网站。这种恶意软件可能会命令电脑盗取文件或进行其他意想不到的任务。
A new report from the cyber security firm FireEye released on Wednesday identifies the newmalware for the first time publicly, which it has nicknamed “Hammertoss.
【俄罗斯间谍利用Twitter掩护网络入侵】相关文章:
★ 伊索寓言9
★ 奥运让北京更文明
最新
2020-09-15
2020-09-15
2020-09-15
2020-09-15
2020-09-15
2020-09-15