Damian75 wrote in post #7572487
I am sorry but if it takes an action buy the end user then it is not a solid hack that is like saying that if I convince you to let me into your house I have successfully broken in to your house. I have successfully gained access but I did not break in just as if I trick you into downloading a file and installing it and that file then gives me access to your computer I have not hacked your computer all I have proved is that you have an id10T problem. This does not count as a hack on any platform.
As I read the attack, the way that it worked is that a user goes to a webpage that they believe to be 100% legit. Hidden, inserted, injected, hacked into -- whatever you want to call it -- the legitimate webpage was malicious code. The malicious code then executed and gained access without any additional user intervention beyond browsing a website that they would ordinarily trust. The user did not have to directly execute the malicious code.
This sort of drive-by attack has been used successfully against Windows machines for some time starting with attackers inserting code into servers from all OSes. There have been attacks where hundreds of thousands of hosts serving up advertisements and the like have had evil code injected that, when browsed as part of an otherwise completely legitimate and believed to be safe site, executed malware. Photobucket was recently targeted with this very sort of attack (https://photography-on-the.net/forum/showthread.php?t=648519 was related to this very sort of attack.)
This was not a "click this EXE" or "download this file" sort of attack. This represents a very real, and very common way that attackers spread malware these days. Attack a database that serves up ads, get the database to serve up evil code instead of the legit ad, and when users go to their regular, everyday sites that happen to use ads ordinarily hosted by that server, they get the malware instead.
I don't take sides in this debate (I don't care). I just want people to be aware that this sort of attack is extremely common, and is the very same sort of passive attack that has been victimizing Windows users for a while.