Freely available tool derives password used to corrupt master boot record.
Tag: passwords
“Active attacker community” often emptied accounts minutes after they went live.
Potential compromises appear to be unrelated.
Surreptitious attacks often prey on people visiting legitimate sites.