System Reconfiguration Attacks Explained

System reconfiguration attacks modify settings on a user’s PC for malicious purposes. For example: URLs in a favorites file might be modified to direct users to look-alike websites: e.g., a bank website URL may be changed from “bankofabc.com”to “bancofabc.com”.[1]

References

  1. Book: Ahmed, Syed R. . Preventing Identity Crime: Identity Theft and Identity Fraud: An Identity Crime Model and Legislative Analysis with Recommendations for Preventing Identity Crime . 2020-04-14 . BRILL . 978-90-04-39597-8 . en.