TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

More Fake jQuery sites

31 点作者 davedd超过 12 年前

6 条评论

Hopka超过 12 年前
I wonder how the links to these fake sites are injected into the infected sites in the first place. Is it through some other vulnerability and the fake sites are mainly needed to make the hack less obvious for a human auditing the code?<p>Or do they hope that somebody finds the fake jQuery site on Google or through a typo in the URL and then includes their fake JavaScript file instead? That seems unlikely to me.
pav3l超过 12 年前
&#62;We keep seeing fake jQuery sites popping up and being used to distribute malware.<p>Anyone has more info? What kind of malware? I'm assuming client side? Any 0-days? Unsurprisingly, both websites are blocked at where I am.
评论 #4819218 未加载
VMG超过 12 年前
Previously, jquery.it: <a href="http://news.ycombinator.com/item?id=2734138" rel="nofollow">http://news.ycombinator.com/item?id=2734138</a>
leeoniya超过 12 年前
a funny one: <a href="http://jqueery.com" rel="nofollow">http://jqueery.com</a> - click around :D
评论 #4819952 未加载
Zirro超过 12 年前
"window.top.location.href = "httx://www.jqueryc.com"<p>Is the "httx" a mistake by the malware-authors or Sucuri Malware Labs? I find the second option more likely.
评论 #4819291 未加载
Eduard超过 12 年前
As used in this article, what does TDS mean?
评论 #4819965 未加载