How The NSA Deploys Malware: An In-Depth Look at the New Revelations

By Dan Auerbach

How The NSA Deploys Malware: An In-Depth Look at the New Revelations

We've long suspected that the NSA, the world's premiere spy agency, was pretty good at breaking into computers. But now, thanks to an article by security expert Bruce Schneier—who is working with the Guardian to go through the Snowden documents—we have a much more detailed view of how the NSA uses exploits in order to infect the computers of targeted users. The template for attacking people with malware used by the NSA is in widespread use by criminals and fraudsters, as well as foreign intelligence agencies, so it's important to understand and defend against this threat to avoid being a victim to the plethora of attackers out there.

How Does Malware Work Exactly?

Deploying malware over the web generally involves two steps. First, as an attacker, you have to get your victim to visit a website under your control. Second, you have to get software—known as malware—installed on the victim's computer in order to gain control of that machine. This formula isn't universal, but is often how web-based malware attacks proceed.

In order to accomplish the first step of getting a user to visit a site under your control, an attacker might email the victim text that contains a link to the website in question, in a so-called phishing attack. The NSA reportedly uses phishing attacks sometimes, but we've learned that this step usually proceeds via a so-called “man-in-the-middle” attack.1 The NSA controls a set of servers codenamed “Quantum” that sit on the Internet backbone, and these servers are used to redirect targets away from their intended destinations to still other NSA-controlled servers that are responsible for the injection of malware. So, for example, if a targeted user visits “yahoo.com”, the target's browser will display the ordinary Yahoo! landing page but will actually be communicating with a server controlled by the NSA. This malicious version of Yahoo!'s website will tell the victim's browser to make a request in a background to another server controlled by the NSA which is used to deploy malware.

Once a victim visits a malicious website, how does the attacker actually infect the computer? Perhaps the most straightforward method is to trick the user into downloading and running software. A cleverly designed pop-up advertisement may convince a user to download and install the attacker's malware, for example.

But this method does not always work, and relies on a user taking action to download and run software.

more @ https://www.eff.org/deeplinks/2013/10/how-nsa-deploys-malware-new-revelations

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega commented on Doc Vega's blog post So you Don't Think Communist China is Buying Off the Democrat Party?
"Tragically funny how easily patriotism dissolves when money is involved! "
11 hours ago
Doc Vega favorited tjdavis's blog post The Islamization of Texas and the Rest of the States
11 hours ago
Doc Vega commented on tjdavis's blog post The Islamization of Texas and the Rest of the States
"Yes and they are at this time allowing Epic City, a muslim wet dream to be constructed near Dallas…"
11 hours ago
Doc Vega posted a blog post
15 hours ago
Burbia commented on tjdavis's blog post The Islamization of Texas and the Rest of the States
"Muslim celebration at Grand Prairie water park canceled after Gov. Abbott threatens to pull city…"
yesterday
Burbia commented on tjdavis's blog post Reminder: The Bush Family purchased over 100,000 acres of land in Paraguay
"I guess with coming solar flares that sent societies underground before arrives in the near future…"
yesterday
Burbia posted a blog post

'Showbiz' Don to Release Xenu Upon the Public

 New York Post says the other files will be released Friday. If there ever was a Disclosure from…See More
yesterday
tjdavis posted a blog post
yesterday
tjdavis posted a blog post
Wednesday
tjdavis posted a video

Jerusalem Syndrome - Israel/Palestine

August 2006For some, visiting Jerusalem brings them a little too close to God. Dozens of tourists develop 'Jerusalem Syndrome', believing they have a messian...
Wednesday
tjdavis posted photos
Wednesday
Doc Vega posted a blog post

So you Don't Think Communist China is Buying Off the Democrat Party?

California Democrats Just Joined Hands With Communists Funded From ShanghaiPosted on …See More
Tuesday
cheeki kea commented on Doc Vega's photo
Thumbnail

681373888_994247376374814_9118727954735788138_n

"But Wait Folks... There's even more, even more than more in this ugly situation. A story of…"
Tuesday
Doc Vega posted a blog post
Monday
Less Prone left a comment for Aristo Kids
"Welcome aboard"
Sunday
Aristo Kids is now a member of 12160 Social Network
Sunday
Less Prone left a comment for Doc Vega
"Ning is working on theproblem. Their reply: "Hello, Thank you for notifying us.We are…"
Sunday
Sandy posted a video

The Day of the Dolphin (1973) Original Trailer [FHD]

Directed by Mike Nichols. With George C. Scott, Trish Van Devere and Paul Sorvino.The Day of the Dolphin Blu-ray : https://amzn.to/3W9bfbxThe Day of the Dolp...
Sunday
Sandy posted photos
Sunday
Less Prone left a comment for Doc Vega
"I issued a ticked concerning your report. "The rgeular format is not appearing on the…"
May 3

© 2026   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted