How The NSA Deploys Malware: An In-Depth Look at the New Revelations

By Dan Auerbach

How The NSA Deploys Malware: An In-Depth Look at the New Revelations

We've long suspected that the NSA, the world's premiere spy agency, was pretty good at breaking into computers. But now, thanks to an article by security expert Bruce Schneier—who is working with the Guardian to go through the Snowden documents—we have a much more detailed view of how the NSA uses exploits in order to infect the computers of targeted users. The template for attacking people with malware used by the NSA is in widespread use by criminals and fraudsters, as well as foreign intelligence agencies, so it's important to understand and defend against this threat to avoid being a victim to the plethora of attackers out there.

How Does Malware Work Exactly?

Deploying malware over the web generally involves two steps. First, as an attacker, you have to get your victim to visit a website under your control. Second, you have to get software—known as malware—installed on the victim's computer in order to gain control of that machine. This formula isn't universal, but is often how web-based malware attacks proceed.

In order to accomplish the first step of getting a user to visit a site under your control, an attacker might email the victim text that contains a link to the website in question, in a so-called phishing attack. The NSA reportedly uses phishing attacks sometimes, but we've learned that this step usually proceeds via a so-called “man-in-the-middle” attack.1 The NSA controls a set of servers codenamed “Quantum” that sit on the Internet backbone, and these servers are used to redirect targets away from their intended destinations to still other NSA-controlled servers that are responsible for the injection of malware. So, for example, if a targeted user visits “yahoo.com”, the target's browser will display the ordinary Yahoo! landing page but will actually be communicating with a server controlled by the NSA. This malicious version of Yahoo!'s website will tell the victim's browser to make a request in a background to another server controlled by the NSA which is used to deploy malware.

Once a victim visits a malicious website, how does the attacker actually infect the computer? Perhaps the most straightforward method is to trick the user into downloading and running software. A cleverly designed pop-up advertisement may convince a user to download and install the attacker's malware, for example.

But this method does not always work, and relies on a user taking action to download and run software.

more @ https://www.eff.org/deeplinks/2013/10/how-nsa-deploys-malware-new-revelations

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega posted a photo
1 hour ago
Doc Vega commented on Doc Vega's blog post Are the End Times Drawing Near?
"cheeki kea, You might want to see predictions made by Robert Welch in 1957 and 1974 stating that…"
3 hours ago
Doc Vega commented on Doc Vega's blog post Are the End Times Drawing Near?
"cheeki kea, good points. We have a world full of twisted allied agendas that seem contradictory,…"
3 hours ago
Sandy posted a video

Ghislaine Maxwell & The Secret "Shadow" 9/11 Commission? | John Kiriakou

In this gripping excerpt from the Julien Dorey podcast, former CIA officer and whistleblower John Kiriakou reacts to a leaked email from 2003. The document r...
yesterday
cheeki kea left a comment for Holyroller
"Greetings to you Holyroller very awesome you've joined up with us all. I know you'll find…"
yesterday
cheeki kea commented on Doc Vega's blog post Are the End Times Drawing Near?
"Yes it's a sad and sorry situation we see evolving here. On one front and it's a large…"
yesterday
Doc Vega commented on tjdavis's video
Thumbnail

When the Communists Take Over America!...Famous 1957 Anti-Communist Movie

"I remember this when I was a little seeing it on TV years after it was filmed and it scared me even…"
yesterday
tjdavis posted a video

When the Communists Take Over America!...Famous 1957 Anti-Communist Movie

Starring Jack Webb and Robert Conrad, this 1957 movie by the United States Armed Forces Information Agency is perhaps the best known anti-communist movie eve...
yesterday
Doc Vega posted a blog post

Are the End Times Drawing Near?

Are we seeing the gradual fulfillment of the Battle of Armageddon? Think of it. The US and Israel…See More
yesterday
Holyroller is now a member of 12160 Social Network
Monday
tjdavis posted a blog post
Monday
Sandy posted photos
Sunday
Burbia posted a video

Catherine Fitts: Epstein, CIA Black Budget, the Control Grid, and the Banks’ Role in War

Programmable digital currency is the final piece of the global control grid that’s finally snapping into place. Catherine Austin Fitts on how to defeat it. C...
Saturday
Евеліна posted a status
"цікаво, воно цитатами виділяє, як моє особливе "я""
Friday
Евеліна posted a status
"на роботі, сонце світить, потрібно перепочити."
Friday
Евеліна posted a blog post

Ключові слова в тексті: як органічно їх вписати в статтю

Що таке ключові слова і чому вони важливіКлючові слова — це слова або фрази, які користувачі…See More
Friday
Евеліна is now a member of 12160 Social Network
Friday
Burbia left a comment for pohonemas33 team
"Quit promoting gambling on another site"
Friday
tjdavis posted a photo
Friday
pohonemas33 team commented on DTOM's photo
Thumbnail

Orwell - Football, Beer & Gambling

"kalau kamu cari tentang trik dan tips main slot online biar gampang menang, coba cek di situs…"
Feb 25

© 2026   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted