• Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
  • Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!

GCHQ Used Fake LinkedIn Pages to Target Engineers

Collapse
X
  •  
  • Filter
  • Time
  • Show
Clear All
new posts

    GCHQ Used Fake LinkedIn Pages to Target Engineers

    Passive hacking communications is one thing, actively planting Trojans to infiltrate and disrupt centrifuges in Iran, okay I can see that. But when you start the policy on doorstep we're really going to piss people off.


    GHCQ Targets Engineers with Fake LinkedIn Pages - SPIEGEL ONLINE


    GHCQ Targets Engineers with Fake LinkedIn Pages - SPIEGEL ONLINE

    The Belgacom employees probably thought nothing was amiss when they pulled up their profiles on LinkedIn, the professional networking site. The pages looked the way they always did, and they didn't take any longer than usual to load.

    The victims didn't notice that what they were looking at wasn't the original site but a fake profile with one invisible added feature: a small piece of malware that turned their computers into tools for Britain's GCHQ intelligence service.
    The British intelligence workers had already thoroughly researched the engineers. According to a "top secret" GCHQ presentation disclosed by NSA whistleblower Edward Snowden, they began by identifying employees who worked in network maintenance and security for the partly government-owned Belgian telecommunications company Belgacom.

    Then they determined which of the potential targets used LinkedIn or Slashdot.org, a popular news website in the IT community.

    'Quantum Insert'

    The computers of these "candidates" were then infected with computer malware that had been placed using infiltration technology the intelligence agency refers to as "Quantum Insert," which enabled the GCHQ spies to deeply infiltrate the Belgacom internal network and that of its subsidiary BICS, which operates a so-called GRX router system. This type of router is required when users make calls or go online with their mobile phones while abroad.

    SPIEGEL's initial reporting on "Operation Socialist," a GCHQ program that targeted Belgacom, triggered an investigation by Belgian public prosecutors. In addition, two committees of the European Parliament are investigating an attack by a European Union country on the leading telecommunications provider in another EU member state.

    The operation is not an isolated case, but in fact is only one of the signature projects of an elite British Internet intelligence hacking unit working under the auspices of a group called MyNOC, or "My Network Operations Centre." MyNOCs bring together employees from various GCHQ divisions to cooperate on especially tricky operations. In essence, a MyNOC is a unit that specializes in infiltrating foreign networks. Call it Her Majesty's hacking service, if you like.

    When GCHQ Director Iain Lobban appeared before the British parliament last Thursday, he made an effort to reassure lawmakers alarmed by recent revelations. British intelligence couldn't exactly stand back and watch the United Kingdom be targeted for industrial espionage, Lobban said. But, he noted, only those whose activities pose a threat to the national or economic security of the United Kingdom could in fact be monitored by his agency.

    A Visit from Charles and Camilla

    Even members of the royal family occasionally stop by to see what British intelligence is up to. In one photo that appears in a secret document, Charles, the Prince of Wales, and his wife Camilla, the Duchess of Cornwall, are shown listening to a presentation at a MyNOC workstation called "A Space." The tongue-in-cheek caption reads "Interlopers in A Space."

    The presentation does not indicate the extent to which the royal family is kept abreast of current espionage operations. Their last visit was reportedly about Afghanistan, not Belgium. But the visit had been to the same location where what the secret document described as the "very successful" operation against Belgacom as well as "Operation Wylekey," also run by a MyNOC unit, had been conducted.

    This also relates to an issue that the British have made a focal point of their intelligence-gathering activities: the most comprehensive access possible to worldwide mobile networks, the critical infrastructures for the digital age.

    Mobile networks are a blessing and a curse for spies worldwide. Because each major wireless communications company operates its own networks, tapping into them becomes more complex. On the other hand, the mobile multi-use devices in our pockets are a blessing, because they often reveal more personal information than stationary computers, such as the user's lifestyle habits and location. They can also be transformed into bugging devices that can be activated remotely at any time to listen in on the user's conversations.

    Mobile Phones Become Monitoring Tools

    "We can locate, collect, exploit (in real time where appropriate) high value mobile devices & services in a fully converged target centric manner," a GCHQ document from 2011 states. For years, the British spies have aspired to potentially transform every mobile phone on the planet into a monitoring tool that could be activated at any time.

    But the government hackers apparently have to employ workarounds in order to infiltrate the relatively inaccessible mobile phone networks.

    According to the presentation, in the case of Belgacom this involved the "exploitation of GRX routers," from which so-called man-in-the-middle attacks could be launched against the subjects' smartphones. "This way, an intelligence service could read the entire Internet communications of the target and even track their location or implant spying software on their device," mobile networks expert Philippe Langlois says of the development. It is an effective approach, Langlois explains, since there are several hundred wireless companies, but only about two dozen GRX providers worldwide.

    But this isn't the only portal into the world of global mobile communications that GCHQ has exploited. Another MyNOC operation, "Wylekey," targets "international mobile billing clearinghouses."

    These clearinghouses, which are relatively unknown to the general public, process international payment transactions among wireless companies, giving them access to massive amounts of connection data.

    The GCHQ presentation, which SPIEGEL was able to view, contains a list of the billing companies that are on the radar of the British. At the top of the list are Comfone, a company based in Bern, Switzerland, and Mach, which has since been split into two companies, one owned by another firm called Syniverse and another called Starhome Mach. Syniverse was also on the list of companies to monitor. Together, these companies dominate the industry worldwide. In the case of Mach, the GCHQ personnel had "identified three network engineers" to target. Once again, the Quantum Insert method was deployed.

    The spies first determine who works for a company identified as a target, using open source data like the LinkedIn professional social networking site. IT personnel and network administrators are apparently of particular interest to the GCHQ attackers, because their computers can provide extensive access privileges to protected corporate infrastructures.

    Targeting an Innocent Employee

    In the case of Mach, for example, the GCHQ spies came across a computer expert working for the company's branch in India. The top-secret document shows how extensively the British intelligence agents investigated the life of the innocent employee, who is listed as a "target" after that.

    A complex graph of his digital life depicts the man's name in red crosshairs and lists his work computers and those he uses privately ("suspected tablet PC"). His Skype username is listed, as are his Gmail account and his profile on a social networking site. The British government hackers even gained access to the cookies on the unsuspecting victim's computers, as well as identifying the IP addresses he uses to surf the web for work or personal use.
    In short, GCHQ knew everything about the man's digital life, making him an open book for its spies. SPIEGEL has contacted the man, but to protect his privacy is not publishing his name.

    But that was only the preparatory stage. After mapping the man's personal data, now it was time for the attack department to take over. On the basis of this initial information, the spies developed digital attack weapons for six Mach employees, described in the document as "six targeting packs for key individuals," customized for the victims' computers.
    "Never argue with stupid people, they will drag you down to their level and beat you with experience". Mark Twain

    #2
    Originally posted by scooterscot View Post
    Passive hacking communications is one thing, actively planting Trojans to infiltrate and disrupt centrifuges in Iran, okay I can see that. But when you start the policy on doorstep we're really going to piss people off.
    And what are they going to do about it? Cease trading with what now is the most dynamic economy in Europe?
    Hard Brexit now!
    #prayfornodeal

    Comment


      #3
      Oil Espionage: How the NSA and GCHQ Spied on OPEC

      It just keeps coming. Any dynamic economy will soon seize up when the opec oil taps are turned off.

      How the NSA and GCHQ Spied on OPEC - SPIEGEL ONLINE

      How the NSA and GCHQ Spied on OPEC - SPIEGEL ONLINE

      Documents disclosed by whistleblower Edward Snowden reveal that both America's National Security Agency (NSA) and Britain's Government Communications Headquarters (GCHQ) have infiltrated the computer network of the the Organization of the Petroleum Exporting Countries (OPEC).

      In January 2008, the NSA department in charge of energy issues reported it had accomplished its mission. Intelligence information about individual petroleum-exporting countries had existed before then, but now the NSA had managed, for the first time, to infiltrate OPEC in its entirety.
      OPEC, founded in 1960, has its headquarters in a box-like building in Vienna. Its main objective is to control the global oil market, and to keep prices high. The 12 member states include Saudi Arabia, Venezuela, Iran and Iraq.

      A Treasure Trove of Information

      When the NSA used the Internet to infiltrate OPEC's computers, its analysts discovered an internal study in the OPEC Research Division. It stated that OPEC officials were trying to cast the blame for high oil prices on speculators. A look at files in the OPEC legal department revealed how the organization was preparing itself for an antitrust suit in the United States. And a review of the section reserved for the OPEC secretary general documented that the Saudis were using underhanded tactics, even within the organization. According to the NSA analysts, Riyadh had tried to keep an increase in oil production a secret for as long as possible.

      Saudi Arabia's OPEC governor is also on the list of individuals targeted for surveillance, for which the NSA had secured approval from the secret Foreign Intelligence Surveillance Court. The documents show how careful the Americans were to suspend their surveillance when the Saudi visited the United States. But as soon as he had returned to Riyadh, the NSA analysts began infiltrating his communications once again.

      Praise from Department of Energy

      According to a 2010 report, one of the analysts' conclusions was that the Saudis had released incorrect oil production figures. The typical "customers" for such information were the CIA, the US State Department and the Department of Energy, which promptly praised the NSA for confirming what it had suspected for years.
      The British, who also targeted OPEC's Vienna headquarters, were at least as successful as the NSA. A secret GCHQ document dating from 2010 states that the agency had traditionally had "poor access" to OPEC. But that year, after a long period of meticulous work, it had managed to infiltrate the computers of nine OPEC employees by using the "Quantum Insert" method, which then creates a gateway to gain access into OPEC's computer system. GCHQ analysts were even able to acquire administrator privileges for the OPEC network and gain access to two secret servers containing "many documents of interest."

      OPEC appears in the "National Intelligence Priorities Framework," which the White House issues to the US intelligence community. Although the organization is still listed as an intelligence target in the April 2013 list, it is no longer a high-priority target. Now that the United States is less dependent on Saudi petroleum, thanks to fracking and new oil discoveries, the fact that OPEC is not identified as a top priority anymore indicates that interest in the organization has declined.
      "Never argue with stupid people, they will drag you down to their level and beat you with experience". Mark Twain

      Comment


        #4
        Originally posted by scooterscot View Post
        It just keeps coming. Any dynamic economy will soon seize up when the opec oil taps are turned off.
        Particularly one that exports loads of gas guzzling cars ?

        FFS Spys spy in spying spys shocker, you naïf.
        Hard Brexit now!
        #prayfornodeal

        Comment


          #5
          Originally posted by scooterscot View Post
          It just keeps coming. Any dynamic economy will soon seize up when the opec oil taps are turned off.
          Yep, OPEC will turn off what is by far the largest income earner most of them have, that they would be derelict without.

          Comment


            #6
            Originally posted by Ticktock View Post
            Yep, OPEC will turn off what is by far the largest income earner most of them have, that they would be derelict without.
            Yes, would you still be laughing if they decided to charge twice as much just because they could?
            "Never argue with stupid people, they will drag you down to their level and beat you with experience". Mark Twain

            Comment


              #7
              Originally posted by scooterscot View Post
              Yes, would you still be laughing if they decided to charge twice as much just because they could?
              They can't. As soon as the frog in the pan starts kicking like ***** you'll find some pretty quick regime changes within OPEC.

              The Yanks won't pay $6 per gallon.

              That said, we will.

              However, we(Joe Public) don't have access to the same firepower that the yanks have.

              Something to do with the creation of the NHS to appease the masses after the wars.
              Last edited by Churchill; 11 November 2013, 21:07.

              Comment


                #8
                Originally posted by scooterscot View Post
                Yes, would you still be laughing if they decided to charge twice as much just because they could?
                Yeah, not going to happen. If it were then Venezuela would already have done so to piss off the US. OPEC control supply in order to control price. Every time prices have started jumping up they've agreed to increase supply.

                With electric and hybrid cars starting to (albeit slowly) pick up, bio-fuel, and development of more and more efficient cars they're starting to run scared of losing a major source of demand, and who knows what the future will bring in terms of other fuels.
                At the moment demand is still driven by power and industry. Nuclear is obviously looked at differently in different countries, wind, solar and hydro are not all that major yet, but gas is big and coal still common, whereas oil fired powerstations are starting to disappear. Industry needs plastics, but I have no idea how big a share of oil goes to this (and can't be arsed to look it up).

                As prices for oil rise it makes other technologies more attractive.

                Not forgetting the US have proven to be a little bit tetchy when it comes to shortages of oil.

                Comment

                Working...
                X