3/14 Read this 12-page Mar 12 report from The Intercept- Revealed - TopicsExpress



          

3/14 Read this 12-page Mar 12 report from The Intercept- Revealed from NSA whistleblower Edward Snowden, NSA has developed to infect potentially millions of computers worldwide with malware “implants. Computer Network Attack (CNA) implants are to disrupt, damage or destroy target computers. The clandestine initiative enables the NSA to break into targeted computers to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.... In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server.In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites. The automated system – codenamed TURBINE – is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually...”The system manages the applications and functions of the implants and “decides” what tools they need to best extract data from infected machines. TURBINE “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.) When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. ROC is a remote operation center in TAO. One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session. A top-secret NSA presentation from 2012 reveals that the agency developed a man-in-the-middle capability called SECONDDATE to “influence real-time communications between client and server” and to “quietly redirect web-browsers” to NSA malware servers called FOXACID. It will covertly change the content of a message as it is being sent between two people, without either knowing that any change has been made by a third party. Top-secret documents show that the British base – referred to by the NSA as “MHS” for Menwith Hill Station – is an integral component of the TURBINE malware infrastructure and has been used to experiment with implant “exploitation” attacks against users of Yahoo and Hotmail. https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/
Posted on: Fri, 14 Mar 2014 10:23:41 +0000

Trending Topics



Recently Viewed Topics




© 2015