Find a Question:
Nile Fish” attacks to penetrate the Egyptian
Security report reveals “Nile Fish” attacks to penetrate the Egyptian civil society
The range of security researchers report reveals a set of malicious phishing attacks that have been Tugiyea in an orderly fashion to penetrate the members of civil society and human rights in Egypt, technically.
And included a group of researchers that revealed the attack members of the Citizen Lab’s technical research laboratory in the University of Toronto, and the Egyptian Initiative for Personal Rights, and team Open Web Foundation’s Mozilla.
The researchers released the name of “Nile Fish” Nile Phish attacks on the group, which reached 92 attack on the Organization of individuals working in civil society organizations and activists Alhakoukan accounts over a period of about two months only.
Security team analyzed data for malicious attacks against civil society and human rights in Egypt during the period between November 24, 2016 to January 31, 2017, the attacks by the open source software especially Ptsammam those types of phishing messages called “Jovic.”
The pirates used social engineering techniques as a major means intended to deceive, where he assumed the identity of individuals and large companies such as Google, cloud service lanes Box storage, shipping company FedEx to convince members of civil society activists and enter personal data and sensitive.
And posing as pirates recipe big companies a range of deceptive links names, which included the names of well-known services such as “Google Drive” and “Google Mail”, as well as messages containing misleading names such as Dropbox sign to convince the target that they log on to their accounts via the already belonging to the Service Storage Gateway Cloud .
And it included data that pirates sought to be obtained, passwords and personal accounts of users on the Gmail service paths of Books, in addition to their attempts to penetrate users’ personal devices to send addresses of malicious files associated with events of interest to this group.
And sent the pirates e-mail messages to targeted include documents booby-trapped links to malicious, titles such as “Top Secret: the report of the National Security recruiting organizations 2015/2016,” and “an arrest warrant on Azza Suleiman,” a human rights activist was arrested on 7 December last year, the same message time malignant.
He claimed the report there was a link between the Egyptian authorities and attacks “Nile Fish,” which coincided some of the attacks with the arrest of the land targeted for the members of civil society and activists Alhakoukan campaigns, the report pointed out that Google posted the target of these letters confirm the existence of attempts subsidized to penetrate their accounts.
The report emphasized that the pirates who carried out attacks “Nile Fish” them from the Egyptians, which included the code’s code letters phishing guidance notes they wrote colloquial Egyptian language and using Latin characters, in a way, “Franco Arabic.”
The targeted individuals working in the Egyptian organizations attacks, including: the Egyptian Initiative for Personal Rights and the Cairo Institute for Human Rights Studies, and look for Feminist Studies, and the Nadim Center for Rehabilitation of Victims of Violence and Torture, and the Association for Freedom of Thought and Expression, the Egyptian Commission for Rights and Freedoms, in addition to a number of individuals who have a connection indirect civil society in Egypt.
The Seekurity security company revealed that she noticed during roughly the same period, similar attacks to penetrate the jurists and military people as preparing a research paper to be published in the next period about these attacks, said security researcher at the company, Mohamed Abdel Basset Nubian, in a special statement to the gate Arab Technology News, that these attacks targeted people from around the world, but that the initial analysis of the data obtained by the company confirm the existence of the Egyptians within the target, an analysis that is not enough to aver the existence of an actual link between these attacks and the “Nile Phish attacks.”
Google + Linked Facebook TwitterViewing:-69
Answer this Question
You must be Logged In to post an Answer.
Not a member yet? Sign Up Now »
Star Points Scale
Earn points for Asking and Answering Questions!