Transaction: a9c1e6d2399a40eaeae44f85b1984b7c14159d04

Included in block 7,124,639 at 2016/11/28 17:04:18 (UTC).

Transaction overview

Loading...
Transaction info
transaction_id a9c1e6d2399a40eaeae44f85b1984b7c14159d04
ref_block_num 45,798
block_num7,124,639
ref_block_prefix 2,451,523,884
expiration2016/11/28T17:04:27
transaction_num 3
extensions[]
signatures 20326b3e92a940473312232722d12b14917ef9d2b3860756e62534e51dff0006177e9bf84f344a68016ea02e28b3b7ee1cd73bebf4755a17c68407c55074235e05
operations
comment
"parent_author":"",<br>"parent_permlink":"hackers",<br>"author":"jlove",<br>"permlink":"hackers-selling-malicious-software-with-backdoors-via-youtube",<br>"title":"Hackers selling malicious software with backdoors via YouTube",<br>"body":"Facts sale via YouTube tools for hacking,<br> containing backdoors,<br> discovered by security experts from the company Proofpoint. It turns out that even hackers do not trust their colleagues - the data obtained via phishing,<br> receives not only the buyer but also the creator of a set to crack,<br> according TechViral.\n\n### How it works\n\nBackdoor - a vulnerability that allows you to receive data without the owner's knowledge. In this case,<br> the circuit operates as follows: some hackers develop tools to crack and sell them via YouTube to other hackers. Those software used for phishing (obtaining personal and banking data fraudulently - the substitution of forms on websites,<br> mobile applications,<br> etc.). However,<br> these are not only they,<br> but also the creators of the hacking tools - the last left in the backdoor software for yourself.\n\n## In fact,<br> some hackers break into other\n\nExperts said that deciphered the code sample phishing program. In it they found an immutable e-mail address of the author tool for breaking the resource Gmail and one additional address. Each time you use the software data obtained using purchased tools for hacking,<br> went on these boxes.\nExperts emphasize that the video,<br> through which the sale of software for hacking,<br> still available on YouTube. Here is one example:\nhttps:\/\/youtu.be\/lBhqwQMB8-A\nGoogle employees is not removed them,<br> and this is not an isolated case,<br> when video hosting used to sell tools for committing crimes. This means that YouTube is no system that would automatically delete these videos.",<br>"json_metadata":" \"tags\":[\"hackers\",<br>\"hacker\",<br>\"youtube\",<br>\"software\",<br>\"backdoor\" ,<br>\"image\":[\"https:\/\/img.youtube.com\/vi\/lBhqwQMB8-A\/0.jpg\" ,<br>\"links\":[\"https:\/\/youtu.be\/lBhqwQMB8-A\" ,<br>\"app\":\"steemit\/0.1\",<br>\"format\":\"markdown\" "
vote
"voter":"jlove",
"author":"jlove",
"permlink":"hackers-selling-malicious-software-with-backdoors-via-youtube",
"weight":10000
* The API used to generate this page is provided by @steemchiller.