Spyware - search results
UK selling spyware technologies to autocrat rulers: Report
US military shifting to cheaper spyware to counter Russian, Chinese capabilities — RT US...
Apple upgrades security after alleged Israeli group’s spyware attack on Arab activist
University of California installs secret spyware system
Video: Das Spyware! Germany approves ‘Trojan Horse’ to monitor suspects
NSA chief declines comment on hard drive spyware reports – but insists programs lawful
‘Resist Surveillance’: Human Rights Groups Launch Tool to Detect Spyware
Spyware phone app CEO indicted for conspiracy
No! Your data is not safe!: Hackers Used Government Spyware to Data-rob iCloud
Leaked Docs Show Spyware Used to Snoop on U.S. Computers
Implanted Eyes: NSA Puts Radio Spyware Inside Computers
Dell’s Twitter Account Apologizes For The ‘Inconvenience’ Of Helping NSA Install Spyware
UK spyware used against Bahraini activists — court witness
Google engineer finds British spyware on PCs and smartphones
Spyware on your phone?
FBI sought approval to use spyware
US Academics and Civic Leaders Call on Congress to Ensure Neutrality and Support for...
Bugs & hacking software sold online for £20 — RT UK News
Disable location access? Google collects data from Android users anyway – report — RT...
Were US journalists paid to peddle ‘Russiagate’? — RT US News
‘Not the Russians’: John McAfee talks hacking allegations, cybersecurity with Larry King (VIDEO)
Ethiopia’s Invisible Crisis
Defending Against Overreaching Surveillance in Ethiopia: Surveillance Self-Defense now Available in Amharic
Surveillance Company Hacking Team Exposed
Israel Spied on Hotels Used for Iran Nuclear Talks
‘Weaponizing Vulnerabilities’: New Snowden Doc Reveals Spy Agencies Targeted Smartphones
5 Ways Mass Surveillance Is Destroying the US Economy
Edward Snowden shuns iPhones due to secret software that can be remotely activated to...
Obama calls for more cybersecurity information sharing
Is Barack Obama Attempting To Harass And Intimidate Media Personalities On His ‘Enemies List’?
FBI says agent impersonated AP journalist in 2007 sting op
The Dubious ‘Internet Safety Software’ That Hundreds of Police Agencies Have Distributed to Families
Illegal Wiretapping Is Illegal, Even for Governments
NSA partnering with Saudi regime ‒ Snowden leak
White House tracking website visitors with online ‘fingerprinting’
Cybersecurity bill will expand surveillance powers of US military and intelligence agencies
Video: NH Republican Gubernatorial Candidate Called Tea Party Members “Teabaggers”
UK tax office unlawfully hid export data of cyber-espionage tech to dictatorships
Judicial Watch Played Into The Government’s Hands – Americans Are Blinded By Agendas
Judicial Watch Played Into The Government’s Hands Americans Are Blinded By Agendas Paul Craig Roberts Disinformation succeeds because so many people and interest groups across the political spectrum find that it serves their agendas as well as the agenda of…
The post Judicial Watch Played Into The Government’s Hands — Americans Are Blinded By Agendas appeared first on PaulCraigRoberts.org.
Surveillance Valley Has Put a Billion Bugs in a Billion Pockets
Snowden reveals Massive National Security Agency Hacking Uunit
The NSA can hijack your Wi-Fi from 8 miles away
Is The NSA Quartering “Digital” Troops Within Our Homes?
iSpy? Apple Denies Assisting NSA with iPhone “Back Door”
Apple Says It Knows Nothing About Your iPhone Spying On You
NSA has complete control of your iPhone, can activate your microphone and camera without...
Snowden reveals massive National Security Agency hacking unit
New Snowden document reveals NSA’s international malware operation
32 Privacy Destroying Technologies That Are Systematically Transforming America Into A Giant Prison
If you live in the United States, you live in a high tech surveillance grid that is becoming more oppressive with each passing day. In America today, the control freaks that run things are completely obsessed with watching, tracking, monitoring and recording virtually everything that we do. If we continue on the path that [...]
Security at the JFK Thing in Dealey Plaza Was “Piss-Poor.” That’s Because It...
Stupid Government Policy Is More Dangerous than Terrorism
Stupid Government Policy Is More Dangerous than Terrorism
The Shocking Reasons that Americans Are Right to Be More Afraid of Bad Government Policy than Terrorism Preface: I am not so much anti-government as anti-stupid policy. (Moreover, the problem is not solely “bad government” or “corrupt corporations”. The deeper … Continue reading →
Stupid Government Policy Is More Dangerous than Terrorism was originally published on Washington's Blog
Nokia and Samsung say they can’t track powered-down phones despite NSA claims
Made-in-China kitchen appliances found to contain hidden Wi-Fi circuitry that installs malware on your...
NSA’s Path to Totalitarianism
Dark Mail Alliance ‘fighting to bring privacy back’ by reinventing email encryption
RINFORMATION
Computer retailer settles charges of spying through webcams
Welcome to Post-Constitution America: The Weapons of War Come Home
Welcome to Post-Constitution America
FBI let informants commit 5,600 crimes
FBI Taps Hacker Tactics to Spy on Suspects
FBI using hacker tactics for spying
You Selling to Me?
Bin Laden's AK-47 displayed in CIA museum
Is the Government Spying On You Through Your Own Computer’s Webcam Or Microphone?
Is the Government Spying On You Through Your Own Computer’s Webcam Or Microphone?
Cell Phone Users Beware: How to Protect Yourself from Government Spying
Cell Phone Users Beware: How to Protect Yourself from Government Spying
The SINGLE Most Important Step to Protect Yourself from Government Spying
“Conspiracy of Secrecy”: System Failure, Cyber Threats and Corporate Denial
Terms & Conditions
The Obama Regime: What the NSA Revelations Tell Us about America’s Police State
Spies Without Borders: Using Domestic Networks to Spy on the World
Spies Without Borders: Using Domestic Networks to Spy on the World
‘NetTraveler’ cyber-spy network compromised over 350 high-profile victims — Kaspersky report
‘Iran ready to counter US cyber threats’
US claims Chinese military is on new cyber offensive against America
US claims Chinese military is on new cyber offensive against America
The US Government Might Be the Biggest Hacker in the World
'Iran N-sites immune to quake, cyber raid'
MiniDuke: New cyber-attack ‘hacks governments’ for political secrets
Published time: February 27, 2013 21:35

The governments of at least 20 countries may have fallen victim to a sophisticated new cyber-attack. Security experts believe the hackers are attempting to steal political intelligence.
The governments of at least 20 countries may have fallen victim to a sophisticated new cyber-attack. Security experts believe the hackers are attempting to steal political intelligence.
Computer security firms Kaspersky Lab and CrySyS Lab discovered that the malware, dubbed "MiniDuke," targeted government computers in the Czech Republic, Ireland, Portugal and Romania along with think tanks, research institutes and healthcare providers in the United States.
“The technical indicators from our analysis show this is a new type of threat actor that hasn't been seen before,” Kurt Baumgartner, a senior security researcher with Kaspersky Lab, told RT.
Although experts avoid speculating on who the attackers may be, Baumgartner clarified that “based on the target victims and the functionality of the malware” the objective of MiniDuke’s authors is “to collect geopolitical intelligence.”
The threat operates on low-level code to stay hidden, and uses Twitter and Google to get instructions and updates. It allegedly infected PCs when ‘victims’ opened a cleverly disguised Adobe PDF attachment to an email.
“The high level of encryption in the malware and the flexible system it used to communicate with the C2 via Twitter and Google indicates this was a strategically planned operation,” Baumgartner said.
The PDF documents were specifically tailored to their targets, according to the researchers. The attachments referred to highly relevant topics subjects like “foreign policy,” a “human rights seminar,” or “NATO membership plans."
When the files were opened, MiniDuke would install itself on the user's computer.
So far it is only known that the malware then connects to two servers, one in Panama and one in Turkey, but security researchers say there are no clear indications of who was behind the online attacks.
According to Karpersky Lab the spyware was written in “assembler language,” a low-level code where each statement corresponds to a specific command, and is very small in size, only 20 kilobytes. Assembler language codes are written specifically for each system they are meant to attack, as opposed to higher-level codes, which can infect multiple types of technologies.
The way the malware was created and used indicates that the attackers “have knowledge from the elite, ‘old school’ type of malicious programmers who were extremely effective at creating highly complex viruses in the past,” Baumgartner says. “MiniDuke’s attackers have combined these skills with the newly advanced sandbox-evading exploits to target high-profile victims, which is unique and something we haven’t seen before.”
MiniDuke is a three-stage attack, technology news and information website, Arstechnica, explains. First it tricks a victim into opening an authentic-looking PDF document, and then infected machines start using Twitter or Google “to retrieve encrypted instructions showing them where to report for additional backdoors.”
"These accounts were created by MiniDuke’s Command and Control (C2) operators and the tweets maintain specific tags labeling encrypted URLs for the backdoors,” Kaspersky Lab said in a statement. “Based on the analysis, it appears that the MiniDuke’s creators provide a dynamic backup system that also can fly under the radar - if Twitter isn’t working or the accounts are down, the malware can use Google Search to find the encrypted strings to the next C2.”
Stages two and three are hidden inside a GIF image file which is downloaded from the command server and “disguised as pictures that appear on a victim’s machine.”
Eugene Kaspersky, founder and chief executive of Kaspersky Lab, compared the highly-advanced MiniDuke to “malicious programming from the end of the 1990s and the beginning of the 2000s”, saying it has the potential to be "extremely dangerous" because it was an "elite, old-school" attack.
"This is a very unusual cyber-attack," the statement emailed to RT read.
"I remember this style of malicious programming from the end of the 1990s and the beginning of the 2000s. I wonder if these types of malware writers, who have been in hibernation for more than a decade, have suddenly awoken and joined the sophisticated group of threat actors active in the cyber world. These elite, “old school” malware writers were extremely effective in the past at creating highly complex viruses," Kaspersky's CEO added.
Neither Kaspersky nor CrySyS is disclosing what the malware does once it takes hold of a victim until they have had a chance to privately warn infected organizations, Arstechnica reported.
According to the technology news and information website, at least 60 victims have been affected. Kaspersky has identified at least 23 affected countries, including the US, Hungary, Ukraine, Belgium, Portugal, Romania, the Czech Republic, Brazil, Germany, Israel, Japan, Russia, Spain, the UK, and Ireland.
Revelations about the new malware come two weeks after Silicon Valley security firm FireEye discovered security flaws in Reader and Acrobat software.

29 Signs That The Elite Are Transforming Society Into A Total Domination Control Grid
Dutch gov can break in and destroy computers
FTC admits laptop firms spied on users, stole private data & took photos
Exposed: Government-Distributed Cyber-Spy Trojans
Why App Stores Work
It seems everyone wants an app store now. You cannot turn on the TV or the web and not see or hear someone talking about apps and app stores. A lot of the app store popularity...
High-Tech Technology — Are You Safe?
The Smartphone craze has gotten to the point where Smartphones are outselling conventional PCs. It is OK to be crazy about your Smartphone or to want to own one – after all, jumping on the bandwagon is...