. | . |
Booby-trapped messaging apps used for spying: researchers by Staff Writers San Francisco (AFP) Jan 18, 2018 An espionage campaign using malware-infected messaging apps has been stealing smartphone data from activists, soldiers, lawyers, journalists and others in more than 20 countries, researchers said in a report Thursday. A report authored by digital rights group Electronic Frontier Foundation and mobile security firm Lookout detailed discovery of "a prolific actor" with nation-state capabilities "exploiting targets globally across multiple platforms." Desktop computers were also targeted, but getting into data-rich mobile devices was a primary objective, according to the report. With fake versions of secure messaging services like WhatsApp and Signal, the scheme has enabled attackers to take pictures, capture audio, pinpoint locations, and mine handsets for private data. EFF and Lookout researchers dubbed the threat "Dark Caracal." People in the US, Canada, Germany, Lebanon, and France have been hit by Dark Caracal, according to EFF director of cybersecurity Eva Galperin. "This is a very large, global campaign, focused on mobile devices," Galperin said. "Mobile is the future of spying, because phones are full of so much data about a person's day-to-day life." Hundreds of gigabytes of data have been taken from thousands of victims in more than 21 countries, according to Lookout and the EFF. There were indications that Dark Caracal might be an infrastructure hosting a number of widespread, global cyberespionage campaigns, some of which date back years, the report said. Because the apps fool people into thinking they are legitimate, users give them access to cameras, microphones and data. "All Dark Caracal needed was application permissions that users themselves granted when they downloaded the apps, not realizing that they contained malware," said EFF staff technologist Cooper Quintin. "This research shows it's not difficult to create a strategy allowing people and governments spy to on targets around the world." Researchers reported that they tracked Dark Caracal to a building in Beirut belonging to the Lebanese General Security Directorate. Analysis showed that devices of military personnel, businesses, journalists, lawyers, educators, and medical professionals have been compromised, according to the report. "Not only was Dark Caracal able to cast its net wide, it was also able to gain deep insight into each of the victim's lives," the report concluded. Cyber security professionals consistently warn people to be wary when downloading software, avoiding programs shared through links or email and instead relying on trusted sources.
Washington (AFP) Jan 18, 2018 The third arrest in one year of a US official suspected of helping Chinese spies has bared the tense battle between the two superpowers' intelligence agencies. The arrest late Monday by US authorities of former Central Intelligence Agency agent Jerry Chun Shing Lee was reportedly linked to Beijing's brutal dismantling five years ago of the CIA's network of undercover operatives and informant ... read more Related Links Cyberwar - Internet Security News - Systems and Policy Issues
|
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us. |