by iroddis on 1/31/24, 10:56 PM with 37 comments
by krackers on 1/31/24, 11:12 PM
I'm guessing the only reason it is done this way is to make network activity less suspicious than if the device were to connect to some novel 3rd party domain?
by scosman on 1/31/24, 11:16 PM
by rising-sky on 1/31/24, 11:47 PM
by hamandcheese on 2/1/24, 3:30 AM
It seems no different in concept than a spy signaling another spy by leaving something in a public space.
by technion on 2/1/24, 2:08 AM
Any time something is actually described as a novel technique: cryptominer. Ugh.
by AtlasBarfed on 2/1/24, 1:48 AM
This isn't even very advanced stenography, am I right?
Heck, something like the network buffer datastore seems a lot more advanced.
by kurthr on 1/31/24, 11:27 PM
They can serve malware only to targeted domains so you may be the only one hit.
Even more targeted and obscured is to include several keywords in an article of interest that lead to a single controlled page optimized for search engines, which again serves targeted malware.