Ïðîåêò PCAD.Ru
Ãëàâíàÿ / Ôîðóì / Îáúÿâëåíèÿ / Êíèãè / Ïðîèçâîäñòâî / Ïðîåêòèðîâàíèå
Êàòàëîã ïðîèçâîäèòåëåé ïå÷àòíûõ ïëàò


Ôîðóì PCAD.RU ïåðååõàë â Telegram - t.me/pcbtalks

2022---sharpext-malware-can-access-gmail-by-bypassing-all-security-measures Now

Îãëàâëåíèå ôîðóìà | Ïîèñê

SuperStas Ïðîñìîòðîâ òåìû: 2615       16.03.2005 10:38 [Îòâåòèòü]
íàøåë ëè êòî íèáóäü ýòî? âðîäå ñîâñåì ñâåæèé ñòàíäàðòèê...


2022---SHARPEXT-malware-can-access-Gmail-by-bypassing-all-security-measures Äà,  Àëåêñ  [16.03.05 13:06]
2022---SHARPEXT-malware-can-access-Gmail-by-bypassing-all-security-measures

2022---sharpext-malware-can-access-gmail-by-bypassing-all-security-measures Now

In late 2022, the North Korean-linked group SharpTongue deployed SHARPEXT, a sophisticated, malicious browser extension designed to steal emails directly from active Gmail and AOL sessions. This malware bypasses Multi-Factor Authentication (MFA) by operating post-authentication within Chromium-based browsers to secretly exfiltrate data to a command-and-control server. You can read the full analysis at Volexity. AI responses may include mistakes. Learn more