BreachExchange mailing list archives

NSA infected 50, 000 computer networks with malicious software


From: Lee J <lee () riskbasedsecurity com>
Date: Sun, 24 Nov 2013 10:16:06 +1100

http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/

The American intelligence service - NSA - infected more than 50,000
computer networks worldwide with malicious software designed to steal
sensitive information. Documents provided by former NSA-employee Edward
Snowden and seen by this newspaper, prove this.

A management presentation dating from 2012 explains how the NSA collects
information worldwide. In addition, the presentation shows that the
intelligence service uses ‘Computer Network Exploitation’ (CNE) in more
than 50,000 locations. CNE is the secret infiltration of computer systems
achieved by installing malware, malicious software.

One example of this type of hacking was discovered in September 2013 at the
Belgium telecom provider Belgacom. For a number of years the British
intelligence service - GCHQ – has been installing this malicious software
in the Belgacom network in order to tap their customers’ telephone and data
traffic. The Belgacom network was infiltrated by GCHQ through a process of
luring employees to a false Linkedin page
_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss
For inquiries regarding use or licensing of data, e-mail
        sales () riskbasedsecurity com 

Supporters:

# OWASP http://www.appsecusa.org
# Builders, Breakers and Defenders
# Time Square, NYC 20-21 Nov
o()xxxx[{::::::::::::::::::::::::::::::::::::::::>

Risk Based Security (http://www.riskbasedsecurity.com/)
Risk Based Security offers security intelligence, risk management services and customized security solutions. The 
YourCISO portal gives decision makers access to tools for evaluating their security posture and prioritizing risk 
mitigation strategies. Cyber Risk Analytics offers actionable threat information and breach analysis.

Current thread: