|
. | . |
|
by Staff Writers Washington (AFP) Feb 2, 2015 Syrian opposition groups lost critical information when its members fell victim to a "femme fatale" scheme using Skype chats that injected computers and phones with malware, researchers said Monday. The security firm FireEye said it uncovered the hacking scheme that stole tactical battle plans, geographical coordinates, information on weapons and other key data in a period from November 2013 to January 2014, and possibly longer. The hackers lured victims into online chats with attractive female avatars, eventually delivering a malware-laden photo, that allowed the operators of the scheme to steal "scores of documents that shed valuable insight into military operations planned against President (Bashar al) Assad's forces," FireEye said in a report. "Sometimes, the threat group would take whole sets of files pertaining to upcoming large-scale military operations. These included correspondence, rosters, annotated satellite images, battle maps, orders of battle, geographic coordinates for attacks, and lists of weapons from a range of fighting groups." The group asked its targets about the device they used -- computer or Android phone -- probably to deploy malware specifically tailored to that device, FireEye said. In addition to the military and political documents stolen, the group also accessed the Skype databases of the victims to get contacts and real time communications, "providing the threat actors with an inside view into the opposition's relationships and plans." FireEye said it lacked sufficient information to determine the identity of the hackers or their ties to Assad's forces, but noted that "we have some indications that the group may be resourced and/or located outside of Syria." "We found the activity focused on the Syrian opposition that shows another innovative way threat groups have found to gain the advantage they seek," said Nart Villeneuve, a researcher at FireEye. "While we cannot positively identify who is behind these attacks, we know that they used social media to infiltrate victims' machines and steal military information that would provide an advantage to President Assad's forces on the battlefield."
Related Links Cyberwar - Internet Security News - Systems and Policy Issues
|
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service. |