![]() ![]() Without it, the attack could not have been successful.įortunately, there are ways to counter this. Isn’t it amazing how a small thing that we already know, can be combined and made into a big attack? SEO has played a major part here. This attack usually targets a different demographic. So, they need a different way of delivering it.Īttackers compromise WordPress sites and host multiple malicious pages which contain the torrent file. Generally, document malware comes via phishing emails, but in this case, recipients would be suspicious if they get the torrent file as an attachment. This is not a new technique that has appeared overnight, but it has been around for a number of years.įirst, the attacker creates a torrent file that contains the malware. People often go there to download movies or softwares that are not open source.Īttackers observed this trend and came up with an idea for an attack. Torrents are popular for media and other large files. There has been a particular kind of attack which leverages this and it has been happening for a while now. The more the optimization, the better the chances of getting the webpage in the search results. Generally, it is used to tune the search results of websites on any search engine. Have you ever thought about what role search engine optimization (SEO) might play in a cyber attack? ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2023
Categories |