Gordon made it onto The Jester's hit list for his comments on Twitter referencing Anonymous in what The Jester saw as a sign of approval for the hacktivist group." The Jester called the hack "a highly targeted and precise attack, against known bad guys." The Register reported, "'Enemies' of the hacker listed as targets included (the Twitter address of sometime Anonymous spokesman Barrett Brown) and (Rhode Island State Representative Dan Gordon) and others. This is precisely the same vulnerability exploited in Mobile Rat, turning Android into the "ultimate spy tool" as was demonstrated at the RSA conference. He claims to have exploited the open-source software Webkit which is built into web browsers for mobile phones. ![]() The greeting featured my original profile pic and the word 'BOO!' directly below it." The Jester blogged, "Anyone who scanned the QR code using their mobile device was taken to a jolly little greeting via their device's default browser hosted on some free webspace. The "hacktivist for good" is best known for DDoS attacks to disrupt pro-Jihadist sites as well as his contempt for Anonymous. There's been plenty of ire and support in the past for what tweeted. The QR codes may be linked to coupons or special offers, but "if people see a random QR code that's not connected to anything, just a sticker on the wall, they're going to scan it because they want to know what the heck it is."ĭamon Petraglia, Chartstone director of forensic and information security services, told Dark Reading, "The biggest risk is that people cannot deny their own curiosity." As is becoming increasingly common, "attackers depend on that curiosity and the innate obfuscation of QR codes to craft their attacks."Īnd curiosity is exactly what " pro-American hacker" The Jester was banking on when he changed his Twitter avatar into a QR code attack. A user simply scans the QR code with a mobile device and is then directed to a website. ![]() ![]() With the huge popularity of smartphones, two-dimensional barcodes called QR codes are beloved by marketers and are being targeted by hackers and spammers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |