RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Driving

Company

The magazine "Behind the Wheel" has been its history since 1928, then such famous authors as Vladimir Mayakovsky, Mikhail Koltsov, Boris Efimov, Nikolai Pogodin, Viktor Shklovsky and many others collaborated with the publication.

Content

Today, the holding "Driving" includes the management company of OJSC "Driving," a publishing house and two trading houses specializing in the sale of printed materials and spare parts under the brand name "Driving." The publishing house today is the national automobile monthly magazine "Behind the Wheel," the magazines "Moto," "Flight" and "Buy a Car," the newspaper "Behind the Wheel - Region," more than two hundred book titles, as well as ZR.RU.

Circulation

According to January 2019, the circulation of the most popular magazine in Russia - "Driving" - 320,000 copies per month.

The first issue was published in 1928, during which time the magazine became the most mass publication in the history of Russia.

History

2021: Site hacking and phishing content posting

In May 2021, it became known about the hacking of the Behind the Wheel website. Hackers posted phishing content disguised as a logistics company on it with the aim of stealing data from visitors' bank cards, Group-IB, a company specializing in information security, said.

According TASS to the statement, Group-IB the attackers got privileged access to the site "At the wheel," which provided them with complete control over the resource. Then the hackers posted phishing content in one of the directories of the resource. Users who got to this phishing page by link were offered to make a parcel and specify bank card data: name, expiration date, CVV code. With this data, attackers could themselves make unauthorized money transactions and purchases.

Unknown hacked the website of the magazine "Driving" and organized there the theft of money from bank cards

According to the deputy head of CERT-GIB Yaroslav Kargalev, the attackers posted phishing not related to the attacked brand, which may indicate the implementation of an "automated attack," as a result of which the exploitation of public vulnerabilities and the selection of site passwords are carried out according to a random list.

File:Aquote1.png
In case of successful gaining access phishing set (phishing whale) is automatically loaded and fraudulent content is published. Thus, attackers do not have a clear idea of ​ ​ which site they got access to, their task is to obtain user bank card data, the expert explained.
File:Aquote2.png

He added that hacking a legitimate site to place phishing on it is not the most common scheme among attackers. Typically, such a hack is used as an element of a target attack when attackers place malicious code with which to infect visitor devices - the target audience of the site.[1]

Notes