Wu learned that, AdsPower tweeted that its security team disclosed an intrusion on January 24: A Hacker spread malicious code, tampering with some third-party şifrelemeCüzdan plugins in the AdsPower fingerprint browser. AdsPower has fixed the vulnerability and strengthened system security, while also alerting the authorities in Singapore and cooperating with the police investigation. An internal investigation revealed that the attacker exploited vulnerabilities in the third-party technical service system to upload and distribute a malicious version of the MetaMask plugin, potentially exposing users' Cüzdan plugin cache information. Currently, AdsPower has upgraded the application center plugin download mode.
View Original
The content is for reference only, not a solicitation or offer. No investment, tax, or legal advice provided. See Disclaimer for more risks disclosure.
AdsPower'ın Ocak Hacker olayıyla ilgili soruşturmanın sonuçları
Wu learned that, AdsPower tweeted that its security team disclosed an intrusion on January 24: A Hacker spread malicious code, tampering with some third-party şifrelemeCüzdan plugins in the AdsPower fingerprint browser. AdsPower has fixed the vulnerability and strengthened system security, while also alerting the authorities in Singapore and cooperating with the police investigation. An internal investigation revealed that the attacker exploited vulnerabilities in the third-party technical service system to upload and distribute a malicious version of the MetaMask plugin, potentially exposing users' Cüzdan plugin cache information. Currently, AdsPower has upgraded the application center plugin download mode.