本文摘要:Hammertoss’scontrollers,bypossessinganidenticalalgorithm,areabletoknowthenameoftheTwitteraccountthemalwarewilllookforeachday

图片

这必须高超的技巧。这似乎不是没经过思维就创建一起的。”For all its digital sophistication, the principles behind Hammertoss are reminiscent of the low-tech spy signals of the Cold War — chalk marks on trees or dead-letter boxes. In essence, the social media site allows Russia’s cyber warriors to communicate with their agents in plain sight and under the noses of those on the look out for unusual behaviour or communications.尽管Hammertoss必须简单的数字技巧,但其背后的原则让人回想世界大战(Cold War)时期科技含量较低的间谍信号:树上的粉笔记号或者荒废的信箱。大体而言,Twitter使得俄罗斯网络间谍以求在光天化日之下与他们的特工联系,而且就在那些监控不奇怪不道德或信息交流的机构的眼皮底下。

The malware, once embedded, performs a daily check for a specific Twitter account, the unique name of which is generated on each occasion by an inbuilt secret algorithm.一旦植入这种恶意程序,它将每日查阅明确某个Twitter账号,内置的秘密算法不会每次分解独一无二的名字。Hammertoss’s controllers, by possessing an identical algorithm, are able to know the name of the Twitter account the malware will look for each day. If they wish to issue a command to Hammertoss, they set up the account and post a tweet.Hammertoss的控制者通过处置某种程度的算法,就能知悉这种恶意软件将每天找寻的Twitter账号的名字。如果他们想要向Hammertoss发布命令,他们就创建一个账号,公布消息。

The tweet may look innocuous, but it will contain a link to an image. The image has a secret message for Hammertoss encoded within it — another Cold War technique known as steganography.这些消息有可能看起来没什么蓄意,但将在图片中隐蔽一个链接。图片中所含加密的秘密信息,这是世界大战中的另一种谍报技术:“隐写术”。Another Russian malware family, known as MiniDuke also used Twitter for certain command and control operations, but unlike Hammertoss, was limited to communications with a limited number of specific, pre-established accounts.俄罗斯的另一个恶意程序家族取名为MiniDuke,它也利用Twitter传送特定命令和掌控任务,但与Hammertoss有所不同的是,它仅限于与受限数量的提早设置的特定账户的信息沟通。

本文关键词:电竞体育竞猜平台,谍报,信息,账号,利用,图片

本文来源:电竞体育竞猜平台-www.serserline.com

相关文章

网站地图xml地图