1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Attackers deploy rogue proxies on computers to hijack HTTPS traffic

Discussion in 'Network World' started by RSS, Aug 30, 2016.

  1. RSS

    RSS New Member Member

    Security researchers have highlighted in recent months how the web proxy configuration in browsers and operating systems can be abused to steal sensitive user data. It seems that attackers are catching on.

    A new attack spotted and analyzed by malware researchers from Microsoft uses Word documents with malicious code that doesn't install traditional malware, but instead configures browsers to use a web proxy controlled by attackers.

    In addition to deploying rogue proxy settings, the attack also installs a self-signed root certificate on the system so that attackers can snoop on encrypted HTTPS traffic as it passes through their proxy servers.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page