How The NSA Deploys Malware: An In-Depth Look at the New Revelations

By Dan Auerbach

How The NSA Deploys Malware: An In-Depth Look at the New Revelations

We've long suspected that the NSA, the world's premiere spy agency, was pretty good at breaking into computers. But now, thanks to an article by security expert Bruce Schneier—who is working with the Guardian to go through the Snowden documents—we have a much more detailed view of how the NSA uses exploits in order to infect the computers of targeted users. The template for attacking people with malware used by the NSA is in widespread use by criminals and fraudsters, as well as foreign intelligence agencies, so it's important to understand and defend against this threat to avoid being a victim to the plethora of attackers out there.

How Does Malware Work Exactly?

Deploying malware over the web generally involves two steps. First, as an attacker, you have to get your victim to visit a website under your control. Second, you have to get software—known as malware—installed on the victim's computer in order to gain control of that machine. This formula isn't universal, but is often how web-based malware attacks proceed.

In order to accomplish the first step of getting a user to visit a site under your control, an attacker might email the victim text that contains a link to the website in question, in a so-called phishing attack. The NSA reportedly uses phishing attacks sometimes, but we've learned that this step usually proceeds via a so-called “man-in-the-middle” attack.1 The NSA controls a set of servers codenamed “Quantum” that sit on the Internet backbone, and these servers are used to redirect targets away from their intended destinations to still other NSA-controlled servers that are responsible for the injection of malware. So, for example, if a targeted user visits “yahoo.com”, the target's browser will display the ordinary Yahoo! landing page but will actually be communicating with a server controlled by the NSA. This malicious version of Yahoo!'s website will tell the victim's browser to make a request in a background to another server controlled by the NSA which is used to deploy malware.

Once a victim visits a malicious website, how does the attacker actually infect the computer? Perhaps the most straightforward method is to trick the user into downloading and running software. A cleverly designed pop-up advertisement may convince a user to download and install the attacker's malware, for example.

But this method does not always work, and relies on a user taking action to download and run software.

more @ https://www.eff.org/deeplinks/2013/10/how-nsa-deploys-malware-new-revelations

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

james will posted a blog post

how to doanload mp3 online?

An MP3 downloader is a useful online tool that allows users to convert and download their favorite…See More
6 hours ago
Doc Vega commented on rlionhearted_3's photo
Thumbnail

Another incredibly Stupid!! What, no mirrors?

"Personally , I go for the more classic forms of cosmetic surgery! "
19 hours ago
Doc Vega posted blog posts
19 hours ago
Less Prone favorited tjdavis's video
23 hours ago
Less Prone commented on rlionhearted_3's photo
Thumbnail

Another incredibly Stupid!! What, no mirrors?

"When the problem is inside, it causes transformations like this. I like the original better. Maybe…"
23 hours ago
Less Prone favorited james will's blog post YouTube Downloader Tools You Never Knew Existed
yesterday
james will posted a blog post

YouTube Downloader Tools You Never Knew Existed

A YouTube downloader is an online tool or software that helps convert YouTube videos into…See More
yesterday
tjdavis posted a video

Experimenter - Official Trailer

Like on Facebook: https://www.facebook.com/experimenterfilmYale University, 1961. Stanley Milgram (Peter Sarsgaard) designs a psychology experiment that stil...
yesterday
Doc Vega posted a blog post

How Did the Soviets First Discover the SR-71 Blackbird?

Although President Lydon Johnson announced the development of the Lockheed SR-71 in 1964 which…See More
Sunday
Doc Vega commented on Burbia's blog post Disgraced Former CNN Anchor Don Lemon Arrested
"Personally, I don't consider Don Lemon or people like him to be journalists at all. They are…"
Sunday
tjdavis posted photos
Sunday
tjdavis favorited Doc Vega's blog post The Forbidden Canyon and It’s Residents
Sunday
tjdavis posted a video

The Farmer vs the Billionaire — Jeremy Clarkson Says NO to Bill Gates’ £100 Million Deal | UK News

OFFICIAL NOTICE: This channel is NOT Jeremy Clarkson, is not affiliated with him, and does not represent his official views or Diddly Squat Farm. This is an ...
Sunday
Doc Vega posted a blog post

The Forbidden Canyon and It’s Residents

 Chapter OneSituated 10 miles from Mount Jefferson in the Oregon wilderness a forest researcher…See More
Saturday
Less Prone commented on Doc Vega's photo
Thumbnail

G_LrzqtXMAAhT7w

"He would never do that. Mosques and Synagogues are out of the question, only Christianity is free…"
Saturday
Less Prone favorited Doc Vega's photo
Saturday
Less Prone favorited Burbia's blog post Disgraced Former CNN Anchor Don Lemon Arrested
Saturday
Burbia posted a blog post

Disgraced Former CNN Anchor Don Lemon Arrested

No longer an employed journalist, Don Lemon had been seen with far left agitator, Nekima Levy…See More
Friday
Burbia's blog post was featured

The Illusion of Fuck You Money

The United States use to have this idea that once you make enough money, you.can do as you want.…See More
Friday
tjdavis's blog post was featured
Friday

© 2026   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted