compatibility with all versions of Windows.
No comment.
Trustwave researcher Rodel Mendrez has gained access to the inbox of the criminal behind a commercial keylogger used to attack industries including finance, cloud services, logistics, foreign trade, and government. Mendrez's reverse engineering effort found credentials buried within the Hawkeye keylogger that lead through …
No, at worst they’re McAfee. At least (with some effort) you can
Paris, because she's also a technical talent...
The first line claims the researcher, "has gained access to the inbox", but later it says that the credentials found, "lead through redirection to the author's inbox", so that is just discovering the destination address. It might only be a throwaway account.
Is there a story here at all?
My thoughts as well. So he has the gmail email address which for all intents and purposes could be the final repository. Or... is this just another compromised account en route to else-where? If he couldn't log into it he doesn't know if it is actually just a next step.
>Trustwave researcher Rodel Mendrez has gained access to the inbox of the criminal behind a commercial keylogger
Is this NOT clear ? The other accounts were just forwarders to his account! Now, this might not have been his "private" account linked to his facebook et al, bust still, with logs, they will, hopefully, find the tor exit which he last used ... then, they will ask NSA for all details about the guy ... there, caught ... might have already happened, hence the revelation.
Sure, that's clear, but the later detail suggests otherwise. There doesn't seem to be a functional reason to have the final destination address and password in the keylogger, so did he get access to the inbox at all? Did he work out the destination address and ask law enforcement/google to get access? If it leads to the criminal being caught and prosecuted, that's good, but the article is deficient.
"
...find the tor exit which he last used ... then, they will ask NSA for all details about the guy ... there, caught ...
"
Um ... I hate to upset your belief in the omnipotence of the NSA, but there is as yet no way to trace an individual user's connection through the Tor network just by knowing the exit node.
You're better off going to the source or searching for information on the subject whenever Darren Pauli writes an article. His apparent need to write cute metaphors which often don't work, poor grammar, inability to put together a sentence correctly so a reader can identify the subject, verb and object... are just a few examples of his writing weaknesses.
Adding to this is how he doesn't seem to correctly grasp the technical aspects of the subject. This leaves readers having to go back over what is written more than once in order to make sense out of things.