A security researcher has spotted a new malware sample that uses an interesting technique to find out the potential victim’s location, without making use of the various GeoIP API services.
Hackers normally use GeoIP API services for determining the location of a target, but it turns out there are other ways to do that without having access to those APIs.
The new malware sample first queries for the victim’s public IP address with the help of icanhazip.com, and then uses another free service ‘api.mylnikov.org’ to find geolocation data for WIFI Mac addresses or BSSID…
Read full article here
We can help you prevent these kinds of malware from infecting your computer. Find out more about our security services here.