How The NSA Deploys Malware: An In-Depth Look at the New Revelations

By Dan Auerbach

How The NSA Deploys Malware: An In-Depth Look at the New Revelations

We've long suspected that the NSA, the world's premiere spy agency, was pretty good at breaking into computers. But now, thanks to an article by security expert Bruce Schneier—who is working with the Guardian to go through the Snowden documents—we have a much more detailed view of how the NSA uses exploits in order to infect the computers of targeted users. The template for attacking people with malware used by the NSA is in widespread use by criminals and fraudsters, as well as foreign intelligence agencies, so it's important to understand and defend against this threat to avoid being a victim to the plethora of attackers out there.

How Does Malware Work Exactly?

Deploying malware over the web generally involves two steps. First, as an attacker, you have to get your victim to visit a website under your control. Second, you have to get software—known as malware—installed on the victim's computer in order to gain control of that machine. This formula isn't universal, but is often how web-based malware attacks proceed.

In order to accomplish the first step of getting a user to visit a site under your control, an attacker might email the victim text that contains a link to the website in question, in a so-called phishing attack. The NSA reportedly uses phishing attacks sometimes, but we've learned that this step usually proceeds via a so-called “man-in-the-middle” attack.1 The NSA controls a set of servers codenamed “Quantum” that sit on the Internet backbone, and these servers are used to redirect targets away from their intended destinations to still other NSA-controlled servers that are responsible for the injection of malware. So, for example, if a targeted user visits “yahoo.com”, the target's browser will display the ordinary Yahoo! landing page but will actually be communicating with a server controlled by the NSA. This malicious version of Yahoo!'s website will tell the victim's browser to make a request in a background to another server controlled by the NSA which is used to deploy malware.

Once a victim visits a malicious website, how does the attacker actually infect the computer? Perhaps the most straightforward method is to trick the user into downloading and running software. A cleverly designed pop-up advertisement may convince a user to download and install the attacker's malware, for example.

But this method does not always work, and relies on a user taking action to download and run software.

more @ https://www.eff.org/deeplinks/2013/10/how-nsa-deploys-malware-new-revelations

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

tjdavis favorited Burbia's blog post The Illusion of Fuck You Money
12 hours ago
tjdavis posted a video

Hi-Rez & Jimmy Levy - This Is A War (Official Video)

Disclaimer: The views, information, opinions and/or activities expressed in this video are solely those of the individuals appearing in the video, and do no...
12 hours ago
Doc Vega posted photos
yesterday
tjdavis posted a video

Berlin 1945: Waiting for the End | Diary of a Metropolis UNCENSORED FOOTAGE

At the beginning of 1945, Berlin is under the illusion that they will survive the war. Every day there are bombing attacks, fires to be extinguished, and cor...
Friday
Burbia posted a blog post

The Illusion of Fuck You Money

The United States use to have this idea that once you make enough money, you.can do as you want.…See More
Thursday
tjdavis posted videos
Thursday
tjdavis posted a blog post
Thursday
Less Prone favorited cheeki kea's photo
Wednesday
cheeki kea posted a photo
Tuesday
Less Prone favorited tjdavis's video
Jan 19
Less Prone posted a video

“I Helped Build It!” A WEF-Davos Insider EXPOSES The Great Reset

Former investment banker and ESG “whistleblower” Desiree Fixler joins The Winston Marshall Show to expose what she says is one of the biggest financial scams...
Jan 19
Doc Vega posted a blog post

One Step Too Far Weighs in on Current Events

We now bring you this week's program on One Step Too Far. Bear with us as more BS floats to the…See More
Jan 18
Burbia's blog post was featured

A Masterclass Is Being Played Out For Those Who Have The Eyes To See

A question can be asked, why do Jews want a multicultural community in a host society? It is to…See More
Jan 18
Doc Vega's 4 blog posts were featured
Jan 18
tjdavis's blog post was featured
Jan 18
cheeki kea commented on Burbia's video
Thumbnail

the WITCH language of MYSTERY BABYLON (DOCUMENTARY)

"Great video to watch, and it turns out english is a bizarre and formidable language in its…"
Jan 17
cheeki kea favorited Burbia's video
Jan 17
Less Prone left a comment for Roberto Castorena
"Welcome to a revolutionary concept in public communication, the truth."
Jan 15
Less Prone posted a blog post

Reiner Füllmich imprisoned for investigating the Covid scandal

Rainer Füllmich, a lawyer investigating the Covid scandal was illegally captured in Mexico in…See More
Jan 15
Burbia posted a video
Jan 15

© 2026   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted