How The NSA Deploys Malware: An In-Depth Look at the New Revelations

By Dan Auerbach

How The NSA Deploys Malware: An In-Depth Look at the New Revelations

We've long suspected that the NSA, the world's premiere spy agency, was pretty good at breaking into computers. But now, thanks to an article by security expert Bruce Schneier—who is working with the Guardian to go through the Snowden documents—we have a much more detailed view of how the NSA uses exploits in order to infect the computers of targeted users. The template for attacking people with malware used by the NSA is in widespread use by criminals and fraudsters, as well as foreign intelligence agencies, so it's important to understand and defend against this threat to avoid being a victim to the plethora of attackers out there.

How Does Malware Work Exactly?

Deploying malware over the web generally involves two steps. First, as an attacker, you have to get your victim to visit a website under your control. Second, you have to get software—known as malware—installed on the victim's computer in order to gain control of that machine. This formula isn't universal, but is often how web-based malware attacks proceed.

In order to accomplish the first step of getting a user to visit a site under your control, an attacker might email the victim text that contains a link to the website in question, in a so-called phishing attack. The NSA reportedly uses phishing attacks sometimes, but we've learned that this step usually proceeds via a so-called “man-in-the-middle” attack.1 The NSA controls a set of servers codenamed “Quantum” that sit on the Internet backbone, and these servers are used to redirect targets away from their intended destinations to still other NSA-controlled servers that are responsible for the injection of malware. So, for example, if a targeted user visits “yahoo.com”, the target's browser will display the ordinary Yahoo! landing page but will actually be communicating with a server controlled by the NSA. This malicious version of Yahoo!'s website will tell the victim's browser to make a request in a background to another server controlled by the NSA which is used to deploy malware.

Once a victim visits a malicious website, how does the attacker actually infect the computer? Perhaps the most straightforward method is to trick the user into downloading and running software. A cleverly designed pop-up advertisement may convince a user to download and install the attacker's malware, for example.

But this method does not always work, and relies on a user taking action to download and run software.

more @ https://www.eff.org/deeplinks/2013/10/how-nsa-deploys-malware-new-revelations

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

honeygirl posted a video

This Isn’t a Theory Anymore — The Thiel/Epstein Power Network Is Being Built Now | Whitney Webb

What if the system people keep warning about isn’t some future plan?What if it’s already here — being built in plain sight through defense contracts, digital...
3 hours ago
Doc Vega posted blog posts
3 hours ago
Doc Vega posted blog posts
Saturday
Sandy posted a video

Dan Bilzerian believes Palestinians are real Semites and he explained why

#danbilzerian #shorts #israel #palestine #gaza #british #piersmorgan #politics #uk
Saturday
Doc Vega commented on honeygirl's video
Saturday
honeygirl posted videos
Friday
Doc Vega posted a blog post

Where I've Been

Your mouth is moving but your eyes can’t lieLong ago you were compromisedRelying heavily on your…See More
Friday
Doc Vega's 2 blog posts were featured
Thursday
Less Prone commented on Sandy's photo
Thumbnail

FB_IMG_1775463256193

"Then they had the same old photo edited. Very stupid!"
Thursday
Less Prone favorited Sandy's photo
Thursday
Doc Vega posted a blog post

The Escape

The dreamland comes as I close my eyesTake me from the forbidden lands that I despiseWhere all…See More
Wednesday
cheeki kea commented on Sandy's photo
Thumbnail

FB_IMG_1775463256193

"ahh yes but one must be well  practised in the art of double think for such occasions as these…"
Wednesday
honeygirl posted videos
Apr 14
Doc Vega posted a blog post

You’ve Heard of Champ, right? This Aint it!

 CHAMP, you might be thinking of is a legendary cryptid supposedly existing in the waters of Lake…See More
Apr 13
Less Prone favorited Sandy's photo
Apr 13
Less Prone favorited Sandy's photo
Apr 13
Doc Vega posted a blog post

Truth or Fiction? You Figure it Out

 Working for the federal government, specifically, the Pentagon. I was, what you might call a…See More
Apr 11
tjdavis posted a video

GOLDSPHINCTER - Donald J Trump is Acrid Goldsphincter (James Bond Music Parody)

In this James Bond parody, Donald J Trump is Acrid Goldsphincter in our version of the classic Bond "Goldfinger" theme song. All voices and singing performed...
Apr 11
Doc Vega posted a blog post

How Long does Destabilization Take?

How long does it take to topple a society targeted by the left? What ingredients go into this toxic…See More
Apr 9
tjdavis posted a photo
Apr 9

© 2026   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted