MacNN Forums (
-   Tech News (
-   -   Snowden: NSA used false Facebook servers for malware implantation (

NewsPoster Mar 12, 2014 02:05 PM
Snowden: NSA used false Facebook servers for malware implantation
Recently-examined <a href=" need.for.privacy/" rel='nofollow'>Snowden-leaked</a> documents have shown that the NSA is looking at significantly growing its ability to install malware on a large scale, using automated systems and falsified websites. The documents detail efforts to fake a Facebook server, with the targeted population infected upon visitation of the spoof site.<br />
<br />
The delivered payload has been used to record video and audio from an infected computer, and covertly deliver it to NSA servers. Additionally, remote attacks are possible -- such as corrupting files, or redirecting the infected computer to other spoofed sites run by intelligence services.<br />
<br />
The proposed large-scale system, dating back to 2009, has been named "Turbine" by the NSA and is designed for "industrial-scale exploitation." The documents claim that it allows "the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually."<br />
<br />
Another Snowden document declares the Turbine program's intent to "increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants." It is believed by <a href="" rel='nofollow'><em>Firstlook</em></a> to have infected between 80,000 and 100,000 devices.<br />
<br />
Also part of the NSA's offensive hacking initiative is the targeting of system operators. In an internal document released by Snowden, an operative claims that "sysadmins are a means to an end" with a compromised administrator making it easier to get to other persons of interest on the managed system.<br />
<br />
<em>Firstlook</em> spoke with a Facebook spokesman about the allegations of false servers masquerading as the social media powerhouse. Spokesman Jay Nancarrow stated that there was "no evidence of this alleged activity" but noted that any site could be susceptible to the reported NSA tactics. Nancarrow noted that "if government agencies indeed have privileged access to network service providers, any site running only HTTP could conceivably have its traffic misdirected."<br />
<br />
<iframe src="//" width="500" height="375" frameborder="0" webkitallowfullscreen mozallowfullscreen allowfullscreen></iframe> <p><a href="" rel='nofollow'>How the NSA Secretly Masqueraded as Facebook to Hack Computers for Surveillance</a> from <a href="" rel='nofollow'>First Look Media</a> on <a href="" rel='nofollow'>Vimeo</a>.</p><br />
All times are GMT -4. The time now is 03:32 AM.

Copyright © 2005-2007 MacNN. All rights reserved.
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2017, vBulletin Solutions, Inc.

Content Relevant URLs by vBSEO 3.3.2