![]() NitroHack is also able to evade security software, which might recognize and address the malicious executable file, but is unlikely to register the modification of the Discord client. ![]() In a bid to steal credit card information, meanwhile, the malware hunts for saved payment details attached to the infected user’s account. The malware is also persistent, prompting Discord to deliver the victim’s login credentials to the hacker each time the client is booted up, and transmits itself to a victim’s friends via direct message. The NitroHack malware tweaks a piece of JavaScript (opens in new tab) code stored locally on the victim’s computer, and also attempts to introduce malicious code to the same file in alpha and public test builds of the client. However, this level of openness also means the client is susceptible to modification attacks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |