Hackers take a page (literally) from Jane Austen

It remains a mystery who is behind the literary hacking or why "Sense and Sensibility" was the novel of choice
It remains a mystery who is behind the literary hacking or why "Sense and Sensibility" was the novel of choice

It would be a shock, a terrible shock, to Elinor Dashwood and the other characters in "Sense and Sensibility," to see this happening.

Unbeknownst to her or author Jane Austen, it seems that from the 21st century are appropriating from the 19th century classic novel to spread .

Researchers from Cisco Security said in a report released Tuesday that literary passages are becoming a new way to hide that allow hackers unlawful entry into computers and networks.

"Adding passages of classic text to an exploit kit landing page is a more effective obfuscation technique than the traditional approach of using random text," said researchers in their mid-year security report.

"The use of text from more contemporary works such as magazines and blogs is another effective strategy. Antivirus and other security solutions are more likely to categorize the webpage as legitimate after 'reading' such text."

Cisco researchers said encountering references to Austen characters on a webpage "may be perplexing but not a cause for immediate concern."

Jason Brvenik, a Cisco engineer, said it remains a mystery about who is behind the literary hacking or why that novel was chosen over others.

"It is a seemingly random selection but it always from that book," he told AFP.

Still, the technique opens the door for dastardly exploits from , according to Cisco.

Hackers can deliver a variety of malicious "payloads" through these tools, according to Cisco, including "ransomware," a growing technique that locks a user's files unless a ransom is paid.

The researchers said this is just one example about how hackers are innovating to find ways around computer protection.

"Hackers, being unencumbered, have the upper hand in agility, innovation and brazenness," Brvenik said.

"We see this time and again, whether it is nation-state actors, malware, exploit kits or ransomware."

© 2015 AFP

Citation: Hackers take a page (literally) from Jane Austen (2015, July 28) retrieved 10 May 2024 from https://phys.org/news/2015-07-hackers-page-literally-jane-austen.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.

Explore further

A Q&A about the malicious software known as ransomware

64 shares

Feedback to editors