British, US Spies Use Fake Sites to Spread Spyware

Status
Not open for further replies.

cruelsister

Level 42
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 13, 2013
3,141
British security staff used bogus copies of the LinkedIn and Slashdot websites to install spyware on tech firm networks, according to leaked documents. They were able to pull off the hacker-like attacks with the help of the National Security Agency.

The claims come from what appears to be a secret presentation from Government Communications Headquarters (GCHQ), the British equivalent to the National Security Agency (NSA). It seems the documents were made available to the NSA and then leaked by former contractor Edward Snowden.

According to the leaked documents, GCHQ security staff were attempting to gain access to Belgium's largest telecommunications firm, Belgacom, which is partly state-owned.

They decided to target staff who worked on maintaining the company's network, which they did by tracking down those staff who had accounts on business networking site LinkedIn or tech news site Slashdot.

GCHQ then used a technique developed by the NSA known as Quantum Insert. The technique takes advantage of the fact that the NSA has been able to place its own servers at key points of the Internet.

When activated, these servers can pose as a legitimate website and, because of their physical placement, respond to a request before the genuine site can do so.

The spies then simply sat back and waited until the staff members tried to visit LinkedIn or Slashdot but unwittingly wound up visiting the bogus copy sites and were exposed to spyware.

The goal for GCHQ staff was to install monitoring tools onto GRX routers, devices used for routing cellular data around the world. A Belgacom subsidiary is one of the main operators of GRX routers.

The presentation also revealed that GCHQ used similar tactics to target several "clearinghouse" companies which administer billing for multiple cellphone service providers. The idea here was to get access to call records and related data.

LinkedIn stresses that it knew nothing about the attacks and has not cooperated with government agencies to leak user data. Speaking to the media, it added that, "to date, we have not detected any of the spoofing activity that is being reported." Of course, if GCHQ staff are using the tactic correctly, there's no reason LinkedIn should be able to detect it.
 

Gnosis

Level 5
Apr 26, 2011
2,779
All of this social cyber tech is making spies very lazy. Spies used to actually have to work to draw a government check.
 

Prorootect

Level 69
Verified
Nov 5, 2011
5,855
If British or US spies spy, it's for good reasons, I think.

It's NOT comparable with similar activity of lone hackers - or China Russia Ukraine spy activity.
 

cruelsister

Level 42
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 13, 2013
3,141
And the Chinese are good. Unit 61398 is among the best in the world.
 

Gnosis

Level 5
Apr 26, 2011
2,779
Governments envy the hackers that spy on them, so that explains a lot. When governments are disgruntled, they mess with lawful citizens as a way to exercise their frustration. IMHO
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top