Find a Question:
Report: Pirates deceived Syrian opposition leaders for battle plans
Syrian opposition leaders lost gigabytes of confidential communications and battle plans for the pirates dragged malicious software being downloaded during Ghazlah Skype talks, according to a security report released Sunday that the company “FireEye” FireEye.
Last fall, the company “FireEye” found “server server” contains documents and files lost during his search for malicious software based on the “PDF” documents, PDF, according to what she said Laura Gallant, director of threat analysis company.
And included a cache of these documents annotated images satellites, and records of weapons, and Skype conversations, and personal information belonging to the Syrian opposition, which seeks to overthrow the rule of Syrian President Bashar al-Assad’s regime since mid-March / March 2011 leaders.
The “FireEye” company specialized in the field of information security scrutiny of these documents and wrote a report of 37 pages describing how the pirates carried out their attacks and their effects. Where it appears that the heavy reliance on Skype has led to the fall of the fighters in this trap, while the military does not rely on professionals dedicated originally to consumers Service, in sensitive communications.
“FireEye” Report explained that the pirates have used Skype to communicate with members of the opposition, and relied on social engineering techniques, such as creating fake profiles look like they belong to women Hassanoat sympathizers with the Syrian revolution, and the pirates were asking the victim to identify the type of device used for the use of malignant View most appropriate.
In the end, ask the victim pictures of the other party, which will be sent within a compressed RAR file containing a file malignant, according to the report, which stated that, when you open the zip file will be a malicious program of the type of “Trojan horse” Trojan known as “proven guilty of Darkness” DarkComet gives pirates complete control over the victim’s machine.
Gallant said that the pirates, who can also penetrate the smart devices operating Android operating system, developed a customized program of malignant DarkComet copy make its discovery more difficult.
He said, “FireEye” report also that after the rhythm of the victim in the trap pirates worked carefully on the search for relevance files, where they stole about 7.7 GB of material, including 64-Skype database, and 31.107 records talks, and 12 356 contact, and 240.381 message.
Gallant said that the number of devices that were slightly injured, but the fact that many members of the opposition share the same hardware, was to penetrate many accounts. She added that the injured were “certainly among the organizers and strategists behind the different battles.”
But in return, the company “FireEye” reported that the pirates made a mistake, as the server on which the company found the file it was not password protected, so it was stopped by the Internet service provider host shortly after the discovery of his command.Viewing:-220
Answer this Question
You must be Logged In to post an Answer.
Not a member yet? Sign Up Now »
Star Points Scale
Earn points for Asking and Answering Questions!