How The NSA Deploys Malware: An In-Depth Look at the New Revelations

By Dan Auerbach

How The NSA Deploys Malware: An In-Depth Look at the New Revelations

We've long suspected that the NSA, the world's premiere spy agency, was pretty good at breaking into computers. But now, thanks to an article by security expert Bruce Schneier—who is working with the Guardian to go through the Snowden documents—we have a much more detailed view of how the NSA uses exploits in order to infect the computers of targeted users. The template for attacking people with malware used by the NSA is in widespread use by criminals and fraudsters, as well as foreign intelligence agencies, so it's important to understand and defend against this threat to avoid being a victim to the plethora of attackers out there.

How Does Malware Work Exactly?

Deploying malware over the web generally involves two steps. First, as an attacker, you have to get your victim to visit a website under your control. Second, you have to get software—known as malware—installed on the victim's computer in order to gain control of that machine. This formula isn't universal, but is often how web-based malware attacks proceed.

In order to accomplish the first step of getting a user to visit a site under your control, an attacker might email the victim text that contains a link to the website in question, in a so-called phishing attack. The NSA reportedly uses phishing attacks sometimes, but we've learned that this step usually proceeds via a so-called “man-in-the-middle” attack.1 The NSA controls a set of servers codenamed “Quantum” that sit on the Internet backbone, and these servers are used to redirect targets away from their intended destinations to still other NSA-controlled servers that are responsible for the injection of malware. So, for example, if a targeted user visits “yahoo.com”, the target's browser will display the ordinary Yahoo! landing page but will actually be communicating with a server controlled by the NSA. This malicious version of Yahoo!'s website will tell the victim's browser to make a request in a background to another server controlled by the NSA which is used to deploy malware.

Once a victim visits a malicious website, how does the attacker actually infect the computer? Perhaps the most straightforward method is to trick the user into downloading and running software. A cleverly designed pop-up advertisement may convince a user to download and install the attacker's malware, for example.

But this method does not always work, and relies on a user taking action to download and run software.

more @ https://www.eff.org/deeplinks/2013/10/how-nsa-deploys-malware-new-revelations

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega commented on Doc Vega's blog post Ashrams and Moonies Perfect Case for Mind Control
"less prone, Thanks for your support Buddy! "
50 minutes ago
Doc Vega posted a photo

main-thumb-ti-6724328-100-cnsgqkrgkrhyeyyerazynmuwoplecnbx

When will they put Trump on Mt. Rushmore?
53 minutes ago
Doc Vega's 4 blog posts were featured
10 hours ago
Burbia's blog post was featured

Charlie Kirk Assassination

September 10th 2025 in Utah Turning Point USA CEO has been assassinated. Coincidentally,  answering…See More
10 hours ago
Charles Magus's blog post was featured

FURTHER PROOF OF WALK-INS! Prisoners of the Dulce Base by Sherry Shriner

There is a real connection between the Cabal and what is happening at this Undergroung…See More
10 hours ago
Less Prone favorited Doc Vega's blog post Ashrams and Moonies Perfect Case for Mind Control
10 hours ago
Less Prone commented on tjdavis's blog post Sentient World Simulation
"Cannot open the link"
10 hours ago
Tina Sullivan is now a member of 12160 Social Network
15 hours ago
Doc Vega posted blog posts
yesterday
Sandy posted a video

We’re cooked

We’re cooked
yesterday
Sandy posted a photo
yesterday
tjdavis posted a video

Tom Horn discusses Masonic view of 2025

Startling perspective by Tom Horn of the upcoming year: 2025
yesterday
cheeki kea posted a photo
Tuesday
cheeki kea commented on Doc Vega's blog post Grooming the New Generation of Assassins
"It's a distressing state of affairs when evil leftists hardwire impressionable students and…"
Tuesday
Doc Vega commented on Doc Vega's blog post This Memorable Anthem Given by Nick Freitas Hit the Nail on the Head Please Listen!
"Burbia Charlie Kirk's wife is a real firebrand! God bless that poor woman! "
Monday
Doc Vega commented on Doc Vega's blog post This Memorable Anthem Given by Nick Freitas Hit the Nail on the Head Please Listen!
"Burbia thanks for the videos! "
Monday
Doc Vega posted blog posts
Monday
Burbia commented on tjdavis's video
Thumbnail

Charlie Kirk: Grief And Outrage From Turning Point USA in Phoenix

"Early reports said a.second shooter was there. Talk of Dischord chats. Peyton Gendron was coerced…"
Monday
tjdavis posted a video

America In Crisis: Illegals and Drug Smugglers Have Us Beat

An inside look at how bad the situation is at the Arizona/Mexico border. This exclusive tour with retired Arizona Sheriff Mark Lamb reveals just how bad thin...
Monday
Burbia posted a video

Sam Hyde Show: This is You

support the show: https://www.mde.tv/▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬🔥 BUY EXTREME PEACE on MDE.TV 🔥https://www.mde.tv/series/extreme-peace▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬...
Monday

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted