Refer to previous introduction on the OSX.FalshBack.K.
Symantec has just published a more detailed overview and inner workings.
It is interesting to take note this time that the ultimate goal of the OSX.Flashback.K Trojan is to generate money through ad-clicking.
It works on the basis of generating dynamic URLs as a form of reporting-back-to-the -HQ. These URLs are known as C & C (command and control) server addresses.
Once the HQ gained control of the infected PC, it will perform hijack on Google Ad-click.
This security threat makes a good case study for computer science and software engineering.
Symantec has just published a more detailed overview and inner workings.
It is interesting to take note this time that the ultimate goal of the OSX.Flashback.K Trojan is to generate money through ad-clicking.
It works on the basis of generating dynamic URLs as a form of reporting-back-to-the -HQ. These URLs are known as C & C (command and control) server addresses.
Once the HQ gained control of the infected PC, it will perform hijack on Google Ad-click.
This security threat makes a good case study for computer science and software engineering.
Comments