New threat called MarioNet
The article doesn't say if it affects Linux, etc. or not. all I found is it affects the browser.
https://www.zdnet.com/article/new-br...ve-a-web-page/ |
Using NoScript or similar will help mitigate this threat.
For more information on MarioNet, see the paper presented by its creators: https://www.ndss-symposium.org/wp-co...ulos_paper.pdf |
The problem with noscript is how often you need to temporarily allow access. Doing it manually often introduces more - so, the temptation is to set all to "temp trusted" on that page. Phttt - end of defenses to this sort of thing.
As it happens I never shutdown my browers, I "killall" them. But that is after the horse has bolted ... |
Quote:
Sandboxing would probably also be a mitigation. |
Quote:
even so, this is hardly news... javascript cryptominers... i close my browser, botnet gone :shrugs: edit: of course chrom/e/ium users have to uncheck "run background services even when closed" |
this is pretty old article (from Aug, 2018)
out of curiosity, one can always check what is installed: about:debugging#workers about:serviceworkers I have service workers disabled in FF |
The whole attack scenario is predicated on the end user leaving their browser open as well, no? Guessing these "service workers" require the parent browser process (internet exploder, firefox, chrome, etc) to remain running.
|
All times are GMT -5. The time now is 09:15 PM. |