Russian Hackers Can Track Anyone Who Uses Chrome & Firefox

The majority of the hackers won’t look beyond exploiting the basic weaknesses in web , but one collective has gone a step further. According to Kaspersky, Turla, a group, has attempted to fingerprint TLS-encrypted web traffic by modifying and Firefox.

The group first contaminates systems through a remote access trojan, modifying the browsers. First by installing their certificates (to intercept TLS traffic from the host) and afterward connecting the pseudo-random number generation that conveys TLS connections. That allows them to add a fingerprint to every TLS action and inertly track traffic.

The motives of these hackers are unclear as of yet and if your system is infected with this, you don’t need to patch the browser to spy on traffic. According to , it might be a foolproof method to let them spy on traffic on who remove the virus but don’t reinstall their browsers.

The hacker collective is easier to identify with Turla through to be protected by the Russian government and the targets in the start are based in and Belarus.

You might also like More from author

Leave A Reply

Your email address will not be published.