Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Russian blows lid on NSA linked trojan spying group
#1
Quote:Equation Group: NSA-linked spying team have software to hack into any computer

[Image: 96263974.jpg]

Attacks linked to the National Security Agency have been going on for up to 15 years, and targeted Islamic scholars and encryption firms as well as governments and high-profile companies

ANDREW GRIFFIN

Tuesday 17 February 2015

The US security services have developed software that has enabled it to spy on home computers almost anywhere in the world.

Russian researchers at Kaspersky Lab have claimed that the software gave those behind it, thought to be the US National Security Agency, the power to listen in on the majority of the world's computers.
It could be installed on practically any of the world's most common hard drives and spy on the computer while going undetected.
It was used to break in to government and other important institutions in 30 countries across the world, they claim.
[Image: kaspersky.jpg]Employees work at the headquarters of Kaspersky Labs, a company which specialises in the production of antivirus and internet security software
Kaspersky Lab, the computer security firm that discovered the software, refused to name the country that the spying came from. But it said that it was closely related to Stuxnet, an NSA-led cyberweapon that was used in an attack on an Iranian nuclear facility.
The group was using some of the same exploits to get into computers that were used in the Stuxnet attack, even before they had been publicly exposed. That has led to many in the information security community to assume that the group behind it are either part of the NSA, or linked to the US intelligence agencies.
Instead, Kaspersky referred to the group behind the attack as the Equation group, because of the encryption used in its attacks. The group has been active since at least 2001, experts said, and "is probably one of the most sophisticated cyber attack groups in the world", Kaspersky said in its report.
The only way to remove nls_933w.dll #TheSAS2015#EquationAPT pic.twitter.com/zfVE1kKyha
Fabio Assolini (@assolini) February 16, 2015
The group's tools are complicated and expensive to develop, the report said. They are used to infect victims and steal their data, and are developed to go unnoticed.
Most of the tools are Trojans, which are implanted secretly on users' computers and then give the group access to them.
Once a drive is infected, the only way to remove it is to destroy the drive physically.
[Image: kasperskymap.jpg]
The group has used the software to infect thousands, or perhaps tens of thousands, of victims, Kaspersky said. It was used on computers in the US, UK, Italy, Germany, the Netherlands and many other countries.
As well as governments, the software was used to attack Islamic scholars and activists, media organisations and aerospace, energy and nuclear research companies. It was also used on companies that are developing encryption software that can keep users from similar attacks.

The software uses an infrastructure built out of 100 servers and 300 domains, distributed across the world.
Kaspersky published the details of its research last night, in the hope of allowing institutions to guard against the attacks in future.
.
The shadow is a moral problem that challenges the whole ego-personality, for no one can become conscious of the shadow without considerable moral effort. To become conscious of it involves recognizing the dark aspects of the personality as present and real. This act is the essential condition for any kind of self-knowledge.
Carl Jung - Aion (1951). CW 9, Part II: P.14
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  The Dubious Case of Russian Hacking David Guyatt 6 18,497 05-02-2017, 05:45 PM
Last Post: Peter Lemkin
  Pentagon admits domestic spying with drones Tracy Riddle 0 5,177 10-03-2016, 09:58 PM
Last Post: Tracy Riddle
  US spying on Israel Tracy Riddle 1 6,094 05-01-2016, 03:30 PM
Last Post: Dawn Meredith
  Is your printer spying on you? Magda Hassan 0 5,092 01-03-2015, 02:07 PM
Last Post: Magda Hassan
  NSA level iof electronic spying is "stunning" says Europe's top human rights body David Guyatt 0 3,961 27-01-2015, 10:54 AM
Last Post: David Guyatt
  New Electronic Spying Discovered In Central Oslo Government District Peter Lemkin 0 3,969 17-12-2014, 08:19 AM
Last Post: Peter Lemkin
  The ‘Primary Source’ Of NSA’s Spying Power Is A 33-Year-Old Executive Order By Ronald Reagan Magda Hassan 0 3,779 04-10-2014, 01:19 AM
Last Post: Magda Hassan
  Carlyle Group. How cash secretly rules surveillance policy Magda Hassan 0 3,808 20-10-2013, 04:19 AM
Last Post: Magda Hassan

Forum Jump:


Users browsing this thread: 1 Guest(s)