How The NSA Deploys Malware: An In-Depth Look at the New Revelations

By Dan Auerbach

How The NSA Deploys Malware: An In-Depth Look at the New Revelations

We've long suspected that the NSA, the world's premiere spy agency, was pretty good at breaking into computers. But now, thanks to an article by security expert Bruce Schneier—who is working with the Guardian to go through the Snowden documents—we have a much more detailed view of how the NSA uses exploits in order to infect the computers of targeted users. The template for attacking people with malware used by the NSA is in widespread use by criminals and fraudsters, as well as foreign intelligence agencies, so it's important to understand and defend against this threat to avoid being a victim to the plethora of attackers out there.

How Does Malware Work Exactly?

Deploying malware over the web generally involves two steps. First, as an attacker, you have to get your victim to visit a website under your control. Second, you have to get software—known as malware—installed on the victim's computer in order to gain control of that machine. This formula isn't universal, but is often how web-based malware attacks proceed.

In order to accomplish the first step of getting a user to visit a site under your control, an attacker might email the victim text that contains a link to the website in question, in a so-called phishing attack. The NSA reportedly uses phishing attacks sometimes, but we've learned that this step usually proceeds via a so-called “man-in-the-middle” attack.1 The NSA controls a set of servers codenamed “Quantum” that sit on the Internet backbone, and these servers are used to redirect targets away from their intended destinations to still other NSA-controlled servers that are responsible for the injection of malware. So, for example, if a targeted user visits “yahoo.com”, the target's browser will display the ordinary Yahoo! landing page but will actually be communicating with a server controlled by the NSA. This malicious version of Yahoo!'s website will tell the victim's browser to make a request in a background to another server controlled by the NSA which is used to deploy malware.

Once a victim visits a malicious website, how does the attacker actually infect the computer? Perhaps the most straightforward method is to trick the user into downloading and running software. A cleverly designed pop-up advertisement may convince a user to download and install the attacker's malware, for example.

But this method does not always work, and relies on a user taking action to download and run software.

more @ https://www.eff.org/deeplinks/2013/10/how-nsa-deploys-malware-new-revelations

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega posted a blog post

STRANGE THINGS HAPPENING IN YELLOWSTONE

It’s not the fact that Yellowstone National Park sits atop a super volcano that hasn’t erupted in…See More
4 hours ago
tjdavis posted a video

Austrian police raid house of man who leaked Israeli ambassador video making genocidal comments

In a new ITV documentary, Breaking Ranks: Inside Israel’s War, former Israeli soldiers describe how Gaza civilians were killed, often without warning, in an ...
20 hours ago
Burbia posted a video

WARHAMMER 40,000 | 1980's GRIMDARK MOVIE

WARHAMMER 40,000 | 1980's GRIMDARK MOVIEThis is a Concept Movie Trailer made with the help of AI. This video is created purely for fun and out of curiosity a...
20 hours ago
tjdavis favorited Sandy's discussion Sick sci-fi sex fantasy written by Epstein's first benefactor people say inspired his twisted island... before author's SON ended up arresting him
23 hours ago
tjdavis favorited Sandy's discussion Sick sci-fi sex fantasy written by Epstein's first benefactor people say inspired his twisted island... before author's SON ended up arresting him
23 hours ago
tjdavis commented on tjdavis's blog post THE ORIGINS OF THE WORLD ASSOCIATION OF SOCIAL PSYCHIATRY IN LONDON, UK IN 1964
"Tavistock Timing"
23 hours ago
tjdavis posted a blog post
23 hours ago
Doc Vega posted a blog post

The Ringside View

Down in the streets where the animals meetWhere tear gas flies and people get beatWhere…See More
yesterday
tjdavis posted videos
yesterday
tjdavis posted blog posts
Tuesday
Doc Vega posted a blog post

Is America on the brink of a Dire Emergency

 You might know if you have remained informed that America has been under asymmetric warfare for…See More
Saturday
tjdavis favorited Burbia's video
Nov 13
tjdavis posted videos
Nov 13
rlionhearted_3 commented on Sandy's photo
Nov 11
cheeki kea posted a photo
Nov 11
cheeki kea favorited tjdavis's blog post Propaganda,Cognitive Warfare Europes Self Destruction
Nov 11
cheeki kea commented on tjdavis's photo
Thumbnail

Sustenance

"Bacon health to the nation for one and all and stealth for operations elsewhere in the war. Yip a…"
Nov 11
Doc Vega posted a blog post

The Consequence of Loneliness: Another Missing Person Case

Chapter I“Unit 7, Unit 7. Do you read? This is dispatch!”“This is Unit 7, over!” Deputy Patterson…See More
Nov 10
Cora is now a member of 12160 Social Network
Nov 10
tjdavis's 3 blog posts were featured
Nov 10

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted