Quantcast
Channel: Cyberwarzone - hacking
Viewing all 151 articles
Browse latest View live

Dutch city Eindhoven asks Hackers to hack the city in 'Hack me Please' contest

$
0
0

The city Eindhoven has called upon Dutch hackers to hack the municipality of Eindhoven on the 15th of February. This contest has been initiated to proof that hackers are able to find vulnerabilities in systems which were identified as safe. This contest is named "Hack me Please" and if you want to participate you will need to sign up first by sending a e-mail to hackmeplease@eindhoven.nl

Eindhoven wants to be hacked

The hackers that are participating are allowed to hack the target but are not allowed to exploit it any further. They will have to make use of a responsible disclosure policy which will enable the city of Eindhoven to repair the vulnerabilities. 

We will keep you posted on the results of the hack that are initiated on the City of Eindhoven.


Facebook malware: Who will be your Valentine? 2014

$
0
0

It is almost 14th of February that means that people are making plans for Valentine and some are looking for their valentine of 2014. Hackers are using this to hack unaware users with a fake Facebook Valentine application. The malware on Facebook will share itself will all the friends from the Facebook user that clicked on the fake valentine application. 

Facebook Valentine Virus

This is just one method hackers will use to infect people with malware. Valentine is a golden day for hackers to hack unaware users that are searching for a good Valentine day. The hackers might send Fake Facebook messages that someone has found you as their valentine and that you need to click on a link to view who it was. 

It is also possible that the hackers will try to create a Valentine Facebook theme that will serve malware to the users. Everything is possible. The last time we checked, hackers were building a massive social media 'shocking' videos website to trick users. So they are viewing multiple videos instead of just one. 

Fake videos

Keep yourself safe with the fo​llowing steps:

  1. Do not open unsolicited emails form unknown sources.

  2. Do not click on any links included in email messages. Instead, type the link in the address bar.

  3. Do not open attached files that claim to be Valentine's greeting cards, e-cards, etc.

  4. Buy products from authentic websites that are protected by SSL certificates.

  5. Install effective antivirus and antispam solution software.

Valentine day hackers use these scams to earn money

$
0
0

Each year people celebrate Valentine day, it involves buying a lot of stuff that people then will give to their Valentine lover on 14th of February. Shops and online webstores will focus on providing the right mood so that people will buy more stuff. This is a sales method that guarantees the shop owners to earn a little extra. There is nothing bad at this, but the hackers in the world know that these type of days people will be spending more money, and that means that there is more money for them to be cashed in.  Hackers will try various methods to steal your money or personal information on Valentine day.

Valentine Day Malware

It could be real love or it could be 'socially engineered' 

Above we see a typical prankster that is making some innocent fun, but as you can see, finding the right words will get you some personal information.

Scams on Social media

A perfect example of a Valentine social media scam can be viewed from a screenshot we took that provides a view of how hackers will try to manipulate unaware users. The example below shows how a Dutch user got tricked into clicking on the malicious application. The user is now worried if there is something wrong with the computer of the social media account the user was using. 

Facebook Valentine Scam

Most of the times the malware on social media targets the user to a external malicious website which forces the user to download a malicious application. We have made a massive list of malware that we found on Facebook. We are sure that you will be able to identify one.

Valentine Scam Facebook

Phishing scams to steal financial information

Another method the hackers might use to trick unaware internet users is the 'phishing' or 'spear-phishing' method. The hackers create a fake page of a famous website and then they will post discounts on the website, that are to good too leave alone.Once the unaware user wants to purchase the item the user will be forced to leave a incredibly amount of personal information on the website. This information will be used by the hacker for future hacks. 

Phishing scam bank of America

Amazon phishing scam

View your secret love malware

Hackers will also use the famous method of tricking users into believing that they can view who has viewed their profile. The hackers will use a malicious application that will take a picture of a friend that has been infected and then it will serve the picture of the infected friend to you as a possible 'secret love'. This scam has been used multiple times and it uses the network of the victim to spread itself on various social media networks. 

Secret love scam

View this shocking video of a couple on 'Valentine Day' getting stabbed (or w/e)

Hackers will always try to social engineer their victim in such a way that the user will be unaware of what just happened. There are various schemes on the internet which promises users a shocking or viral video that will change their view on certain aspects. Most of the times the users are redirected to a external website which demands that the video needs to be shared first, once the video has been shared the user is prompted to install a malicious application which will infect the computer of the victim. 

Shocking Valentine video

Downloading the wrong video will serve you a virus

A lot of people will choose to spend their valentine day at home with their loved ones, it is possible that people will use a Torrent website to download a video that has the Valentine mood. Hackers are aware of this and will make sure that they serve videos that need a 'plugin' or a 'codec' which has not been installed on the computer yet. Hackers will leave malware in the files or they will trick the user to follow certain steps to play the video (Download a virus). Below you can view a screenshot of how hackers will try to manipulate unaware users. 

Download fake codec

And there is more

There are various ways to implement the methods that we have viewed above. Hackers are always a step ahead of security professionals as they are the attackers. Most of the times these hackers are open minded and have a lot of spare time to make sure that their malware is being spread. So there is not a real way that you can pinpoint a malware and say that it won't spread again. Hackers will keep modifying their malicious applications as it generates them money. You can view it as a 'illegal' full time job.

What can you do?

You can protect yourself against these kind of attacks by following a couple of rules, which will help you to identify malware. 

  • Do not open unsolicited emails form unknown sources.

  • Do not click on any links included in email messages. Instead, type the link in the address bar.

  • Do not open attached files that claim to be Valentine's greeting cards, e-cards, etc.

  • Buy products from authentic websites that are protected by SSL certificates.

  • Install effective antivirus and anti spam solution software.

SHARE AND INF​ORM YOUR NETWORK

Download: Check your last profile visitors on Facebook

$
0
0

Are you getting invited by a person to 'Check your last profil visitors? <3<3<3' Well, the sender is probably trying to trick you. The hackers on social media networks are using various scams that would allow you to view your last profile visitors. But the most of the times you will end up installing a malicious application or you will be asked to fill a survey. 

Check your last profile visitor

The link above will lead the victim to a malicious application which will install itself on the Facebook profile of the victim. The hacker then will be able to use the profile of the user to spread more malware on Facebook. 

Fake application on Facebook

Viewed your profile malware

Facebook has not yet published an application that makes it possible to give you a insight on who has watched your profile.

We made the title misleading on purpose as we know that Hackers will use SEO to get their malware rank high in search engines. Lets beat them by sharing this article. 

Facebook virus: Vídeo de un parto natural en casa, emocionante!

$
0
0

What can be more beautiful then to have a natural home birth, some couples make a decision to share their video with the internet, but as we know - nothing is safe on the internet. Hackers have used the video to share malware to unaware users. The video that is serving the malware has been titled 'Vídeo de un parto natural en casa, emocionante!' by the hackers. Once a user visits the website they will see the following content. 

Fake natural home birth video malware facebook

The user that wishes to view the video will be asked to share the video first on Facebook, once the user has shared the video, the user will be prompted to fill in a survey. This method is used by hackers to generate money, it is also used to collect personal information from tricked users. 

fake natural home birth video facebook malware

Facebook malware: [VIDEO] Tom Cruise fatal accident with his private airplane in Soldotna, Alaska

$
0
0

Oh my god, hackers are using the weirdest footage to create hoaxes. Now the hackers on Facebook are claiming that they have footage of how 'Tom Cruise crashes fatally crashes his private plane in Soldotna, Alaska.". Earlier this week, hackers released a HOAX that Vin Diesel would have been killed while recording the movie '2 Fast to Furious 7"

Tom Cruise dead plane crash video facebook malware

Celebrities are a easy target for Hackers to use as there is a lot of content available for them to use. So it is not a surprise that Tom cruise and Vin Diesel fans have been targeted by fake videos that will trick them to install malicious malware

 

New ‘TUMBLR’ virus steals login credentials

$
0
0

Dear TUMBLR users, do you love your TUMBLR page and network? Then you have to be aware of the new ‘TUMBLR virus’ that is trying to lure innocent TUMBLR users to download a malicious application which will grab the login information from the victimized user. The hackers have set up a fake page which looks identical to the official TUMBLR login page. Once you take a look at the details you will notice that there is something wrong.

Tumblr Phishing

Once the user fills in the information that is requested above, they will be navigated to a malicious website which will prompt them to download a fake application. This application will hold the virus that will then be installed on the victimized computer. 

Malware Tumblr

We could provide you the link of the malicious page but that would only increase the chance that the hackers will change the template – and we will lose track of them :) , so instead we are going to provide you a list of rules which you can follow to stay safe from “TUMBLR Phishing pages”.

Follow these simple rules to stay safe

Hackers will always try to lead you to an external website, so make sure that you visit the following SAFE TUMBLR URL if you wish to login.

Tumblr Login page

If you want to download a ‘TUMBLR’ application make sure that you visit the official page before you download anything.

Tumblr About page

As you can see in the image above, the TUMBLR about page is now HTTPS secured, which means that hackers could ‘phish’ this website or use a ‘man in the middle attack ‘to gain information.

If you are using a public 'WiFi' hotspot then make sure that you are using a VPN or that you navigate through HTTPS secured websites. This will increase your security level and will make it harder (not impossible) for a hacker to gain personal information or data. 

SHARE & INFORM

MUST WATCH VIDEO:Anonymous reminds the UK who the people are

$
0
0

A new Anonymous video has been uploaded on Youtube today, and it has a direct message for the United Kingdom government and elites. The message unfolds that Anonymous, is the people that is building the current United Kingdom, the government must not forget that Anonymous are the doctors, the nurses and the soldiers that protect the United Kingdom. 

Anonymous message United Kingdom

This is announcement to people of the united kingdom and their government. Hello. We are anonymous.

to everyone, We will not go away. We will never be dead. You cannot silence an idea. Whilst there are those who choose to take off their masks, there are others to fill their places. If revolution does not come in the next 12 months, we will not give in. We will not loose hope in the people of the world, we will continue to resist the influences of government into our lives, untill society is ready to take back what is ours.

We are here.

We are not going away.

We are everywhere.

We are all around you.

We are your doctors

your soldiers.

your nurses and your policemen.

We are the man on the street corner and the politicians in the Capital.

we are the mothers, the fathers and the children of a system that has abused us and deprived us of the true essence of our existence.

We are not just pawns for the system to use as they will.

We are anonymous.

We are legion .

We do not forgive.

We do not forget.

Let them expect us.


Khamenei demands students to get ready for cyberwar

$
0
0

Expect a lot of cyber attacks that will be initiated by Iranian students that are trying out their skills. Last week a new account appeared on Twitter with the name '@Doctor_3v1l' which claims to be a Iranian hacker that is part of the Xploiter Team. In just a couple of days the hacker had hacked multiple websites. One amongst those was the Greenwolves official website. 

Future Cyberwar soldiers?

Iranian hackers

Today the Iranian Supreme leader Khamenei demanded all the students to work on their cyber security skills in a offensive and defensive way.  The radical cleric also referred to cyber-war as “a demanding field,” according to the report. “You are the cyber-war agents and such a war requires Ammar-like insight and Malik Ashtar-like (two Prophet’s Companions in early Islamic history) resistance; get yourselves ready for such war wholeheartedly,” his message said.

“Know all dimensions of the Dominance Power even go through its layers and learn about its goals to analyze its real strategies; to face it, exploit all of your capacities and rely upon Divine promises,” it added.

Must watch video: Israel on the front lines of global cyber war

$
0
0

Like many nations around the world, Israel is constantly faced with cyber threats and attacks. And so it has developed special expertise in the field, exhibited at a conference in Tel Aviv, which have made it one of the world's best in cyber defense.

Israel Cyberwar

Cyberwar: How the Internet Changes World Conflict

$
0
0

Cybersecurity and Cyberconflict is forcing the current security experts to take different paths in securing their information and data. On Youtube the next video can be viewed on cyberwar. It is a 30minutes presentation by Michael McNerney on Cyberwar. 

Cyberwar video

Michael McNerney, a national cybersecurity expert, is optimistic that businesses and government agencies can do a better job protecting electronic data. As he sees it, the challenge is a matter of collective resolve more than technological expertise.

 

Must Watch: Lecture on Justice and Cyberwar

$
0
0

On Youtube we have found a lecture on Justice in Cyberwar that has been recorded. The video is from good quality but the sound needs some adjustment. If you are going to watch the video make sure that you are in a silent area or that you can put the volume up. 

Justice in Cyberwar

Opening Lecture: "Justice in Cyberwar"
Prof. Dr. Klaus-Gerd Giesen -- Université d'Auvergne, Clermont-Ferrand
Respondent: Prof. Dr. Marcelo de Araujo -- UERJ / UFRJ
Moderator: Prof. Dr. Nythamar de Oliveira -- PUCRS

Short video: A 'cyber pearl harbor' cyber attack

$
0
0

The U.S. government on Wednesday released the final version of standards meant to help companies in nationally critical industries better defend against cyberattacks, and officials now face the challenge of getting the private sector to adopt the voluntary measures.

Criticized for being too vague and toothless, the so-called cybersecurity framework turned a vast amount of industry input into guidelines designed for 16 different sectors whose disruption could be devastating to the country.

The release from the National Institute of Standards and Technology comes exactly one year after President Barack Obama issued an executive order directing the agency to compile voluntary minimum cybersecurity standards as one step to counter the lack of progress on cybersecurity law in Congress.

In the fall of 2012, then-Defense Secretary Leon Panetta wsrned that the country faces a potential ``cyber Pearl Harbor.''

Flappybirdcheats.pw 'Survey scam' targets Android users

$
0
0

A Twitter account is spreading messages that there is a new hack available for Flappybird. It provides a unlimited lives cheat, and to get this cheat, you simply have to follow a couple of steps that will certainly get you hacked. The website is made in a very simple way so it will attract a lot of users, it clearly shows how the user only haves to take 5 steps to have the unlimited FlappyBird live cheat on their Android phone. 

FlappyBirdcheats.pw

The users will be tricked into filling a 20 questions survey which will generate the hacker some revenue. Please share and inform your friends that still play Flappy Bird that this scam is active. 

WorldStarHipHop hoax: Guy Decides To Get A Closer Look At A Safari And Gets Eaten By Lion Within Minutes

$
0
0

A video has been published on the HipHop website WorldStarHiphop which shows how a person decides to take a closer look at a lion and gets eaten within minutes. It's fake. The guy is a very famous lion trainer named Pit Dernitz. He has an IMDB on this clip. Looks very convincing, but it's fake.

Funny Comment


BREAKING: Facebook offline after massive DDoS attack?

$
0
0

People on the internet are unable to login to their Facebook profile! It is not just you, it seems that Facebook is having server issues as it is not possible to login at the Facebook page. The page does not load and people are getting various errors. We tried to login to our Facebook page and we were unable to connect to the server.

Facebook offline

Earlier Facebook has issues with their servers, it was reported world wide that people were having issues with login in to their Facebook account.

Mobile application

The mobile application from Facebook is still working, it seems that it is only affecting Desktop users. 

Why You Should Not Be Afraid

$
0
0

The odds of dying on a roller coaster are 1 in 300,000,000 (that's 300 million for those who stopped counting). The U.S. Consumer Product Safety Commission stated that there were approximately two deaths per year, attributed to a roller coaster accident.

:

Terrorist attacks: http://swampland.time.com/2013/05/06/...

Sharks: http://newswatch.nationalgeographic.c...

Airplanes: http://www.pbs.org/wgbh/nova/space/ho...

Elevator: http://cityroom.blogs.nytimes.com/201...

Bugs: http://www.nsc.org/news_resources/inj...

Lightning: http://www.nsc.org/news_resources/inj...

Dogs: hhttp://www.nsc.org/news_resources/inj...

Rollercoaster; The odds of dying on a roller coaster are 1 in 300,000,000 (that's 300 million for those who stopped counting). The U.S. Consumer Product Safety Commission stated that there were approximately two deaths per year, attributed to a roller coaster accident.

Vending Machine: http://www.ibtimes.com/mega-millions-...

Credits:
Out Of Mind/ Amy Monaghan
http://vimeo.com/63536611

JFK/ Adam McDaid 
http://vimeo.com/36232548

time lapse cloudy sunset/ Jimmy Zwiebel 
https://vimeo.com/65392293

Lost City/ Kağan Kerimoğlu
https://vimeo.com/52235279

Lightning Strike/ GeorgeMaracineanu
https://vimeo.com/67500013

Grown Man Freaks Out on Intimidator 305 Roller Coaster/moreadko
http://www.youtube.com/watch?v=0Q7pTR...

How to get free pop from a vending machine/StarkySceneProject
http://www.youtube.com/watch?v=mNWLxL...

Wasp on Flowers 4/Mike Wiley
http://www.youtube.com/watch?v=DqkSNp...

Benny Bacteria/ blackishknight
http://www.youtube.com/watch?v=NN9EHZ...

How To Wash Your Hands/Nick Marek
http://www.youtube.com/watch?v=glbIDe...

Cody/ Jerry 
https://vimeo.com/53877873

Our dog, Mel Gibson, attacks the Sprinkler/Timothy Kulig
http://www.youtube.com/watch?v=qrH0j7...

Adventures in Vertical Transportation: Group Hug/KONEamericas·
http://www.youtube.com/watch?v=y7Qhf8...

Riding The Passenger Lift (PL4) - Doors Closing @ One Amber Tower 3/MistaSGW
http://www.youtube.com/watch?v=-gpPbj...

WE ARE THE CURIOUS/Brandon Mai 
https://vimeo.com/68032356

Sevengill shark dive - La Jolla Cove/Diver Jackie
https://vimeo.com/64974147

Breaking: Facebook, Google and various banks hacked with Fake SSL certificates

$
0
0

It is possible that you have been phished, a research that has done by the security company Netcraft have revealed that fake SSL certificates were used to imitate banks, Google and Facebook. So the chance that some people have been phished is not small. The fake certificates are used to trick the user so they will think that they are on a genuine website, as it will provide the 'Green lock' in the browser of the user. But when the user takes a look at the certificate that is being provided, the user will find out that it is a fake certificate that has not been granted by Google, Facebook or various banks. 

Fake  SSL used

The Security Analyst Paul Mutton explained the following:

The fake certificates bear common names which match the hostnames of their targets (e.g. www.facebook.com). As the certificates are not signed by trusted certificate authorities, none will be regarded as valid by mainstream web browser software; however, an increasing amount of online banking traffic now originates from apps and other non-browser software which may fail to adequately check the validity of SSL certificates.

Fake certificates alone are not enough to allow an attacker to carry out a man-in-the-middle attack. He would also need to be in a position to eavesdrop the network traffic flowing between the victim's mobile device and the servers it communicates with. In practice, this means that an attacker would need to share a network and internet connection with the victim, or would need to have access to some system on the internet between the victim and the server. Setting up a rogue wireless access point is one of the easiest ways for an individual to carry out such attacks, as the attacker can easily monitor all network traffic as well as influence the results of DNS lookups (for example, makingwww.examplebank.com resolve to an IP address under his control).

Among the fake SSL certificates they have discovered was one used to "legitimize" a Facebook phishing page served from a server in Ukraine; one "wildcard" certificate served from a machine in Romania and possibly used to impersonate a variety of Google services; one to impersonate a large Russian bank and one to mimic a Russian payment services provider; one to imitate Apple iTunes.

It's interesting to note that they have also found a phony certificate used to impersonate GoDaddy's POP mail server. "In this case, the opportunities could be criminal (capturing mail credentials, issuing password resets, stealing sensitive data) or even state spying, although it is unexpected to see such a certificate being offered via a website," Mutton pointed out.

50+ Most Famous Facebook Malware that went Viral

$
0
0

Do you think that you have seen it all? Test yourself with this massive list of Famous Malware that has gone viral on social media networks. We are sure that you will  be able to identify one of the malicious application, but will you be able to identify them all?! 

Massive Facebook Malware list

Lets start with the latest malware that hit Facebook their campaign '#Facebookis10' the 'A look back' malware was born, the hackers copied the template Facebook used on their official 'A look back' page and edited in such a way that the users that clicked on the link were forced to download a application that served malware to the victim. A lot of users were infected, but as the #infosec community responded quickly to the threat - a lot of people were informed. 

Facebook A Look Back Malware

Rapper Nicki Minaj malware

Earlier in 2013 the same Nicki Minaj *** tape got leaked on Facebook and it seems that the criminals are going to try the same trick again. Today we received an message that Nicki Manaj had leaked a new tape, the only thing you had to do to watch it - was to share the Facebook message and so it began. 

Nicki Minaj malware

Jay-Z and Beyonce leaked tape

Beyonce fans be careful, there is a new malware spreading on Facebook that provides a link to the leaked video of Beyonce and Jay-Z. Before you can watch the video the hackers prompts the user to take several steps before the video can be watched.The hacker demands that the user install an application which will make it possible to view the leaked tape of Beyonce and Jay-Z.

Beyonce and Jay-Z malware

Roller Coaster Accident in Orlando Park

We have had the Nicki Minaj malware and now it seems that the hackers are trying another scene. The facebook post claims that they have an video of the roller coaster accident in Orlando Park. The title says that the Orlando Park tried to keep the video hidden and that it has been leaked now for you to be watched. 

Once you click on the link you will be redirected to an website(remove --cyberwarzone from url) that is hosted in brazil. There you will find multiple images that try to trick you into believing that it is an video. You will see fake Facebook comments below the video and as you already thought - the video is fake.

Facebook Malware Roller Coaster accident Orlando Park

Facebook will not be accessible

There is a hoax going around on Facebook that is tricking the users into believing that the Facebook website will be offline on February 29, 30 and 31. This is fake as the dates do not exist in the year 2014.

Facebook shutdown malware

 

OMG guys we were robbed

Hackers on Facebook are trying to trick users by sending them a message which says that they got robbed and that they have footage of the thieves. They try to trick you by making you think that you are helping them to identify the thieves. Facebook is a heaven for hackers as there are millions of active users that have their close network connected on Facebook.

OMG guys we were robbed our house got broken intoo today!! We have pictures the theives on the security camera do you recognize

OMG Guys we were robbed

 

 

Facebook music theme

Hackers are trying to fool Facebook users by sending them an invite to upgrade their Facebook profile with music. They promise that the user is able to select music for each notification and they should be able to change their Facebook background with a picture they desire. 

The Facebook music malware can be recognized pretty fast, the picture that is used is made in such a way that it can't be work from Facebook or any designer that is serious with their product.

Facebook Music Theme

 

People can't watch this for more than 'X' seconds

Hackers have uploaded a new Facebook malware that focuses on tricking Facebook users. This time the hackers used an video of an crocodile or an alligator that has the hand of someone in his jaws. This is not the first malware that tries to infect people with shocking content. Last week we had the Facebook Rollercoaster accident malware that hit around 70 000 users.

Shocking people cant watch this

 

UFO spotted by robot on surface of Mars

Facebook hackers have uploaded a new malicious Facebook application that tries to trick users by promising them a video of a UFO that has been sighted on MARS. The hacker then makes sure that the Facebook user is redirected to an malicious website that then will trick the user to install the Facebook malware that then will have access to the personal information of the Facebook user. 

UFO Facebook malware

 

Facebook Shark attack malware

Hackers are using a new video that tricks the users by promising them a video that shows how a shark eats a teenage girl in the ocean. The hackers are spreading the malicious application on Facebook so they can gain personal information, which they can use or sell for criminal activities.

Shark Attack malware Facebook

 

Candy Crush malware

Hackers on the internet are targeting Candy Crush Saga players with a scheme that will only be profitable for the hacker. Candy Crush Saga players are often challenged by difficult levels which are hard to beat. Candy Crush Saga helps these players by giving them the chance to buy premium content which allows them to beat the level. Hackers have published a tool which acts like an trainer for the Candy Crush Saga game. 

Candy Crush malware

Fake Facebook 'Paper' app on Google Play store

Are you an Android user and do you wish to download the Facebook paper application? Well we have found a developer on Google Play that has developed a application that works just like the iPhone Facebook paper app. Well, that should be expected right?

Facebook 'Paper' Android app malware

Who watched your profile 

Facebook is a network that has millions of people on it and a lot of these people want to know who is watching their profile. This will help them identify people that should not be able to look at their profile for example or they can use this information to hook up with someone but the reality is still that Facebook has not yet published an application that makes it possible to give you a insight on who has watched your profile.

Viewed my profile on Facebook malware

Evil baby attack 

Hackers on Facebook are trying the 'Devil Baby Attack' video to trick users to install malware on their computer or Facebook account. The users are tricked by a big picture which shows a devilish baby.

Evil baby Facebook Malware

 

 

WE FOUND THE GENERATOR THAT SERVES THIS MALWARE

The hunt on exposing malicious applications on Facebook that are tricking users to share their personal information with criminals have led us to identify a list of malicious apps on Facebook. But now our quest has come to the application that creates these malicious applications. Yes, we found the Facebook viral script generator.

Facebook malware generator

And there is more: 

  1. [SHOCKING VIDEO] Mukesh Ambani's son killing 2 people - Aston Martin

  2. Diaboliczne dziecko atakuje: straszy niewinnych ludzi na ulicach

  3. Hand Of a Child Eaten By crocodile

  4. Worst roller coaster accident at Adventure World, Perth Australia

  5. Se denne sjokkerende videoen, er den uidentifiserte sjømonster fanget på Plage de Pampelonne, Saint-Tropez, Frankrike!

  6. Verify age to watch video

  7. Facebook Team Award Lottery Promotion Agency

  8. 'Tsunami' Insurance Policy Scam

  9. Turkish users: I watched the video. Disgrace!

  10. Someone made a profile named 'insert name' and she uploaded some of your photos! is that you?

  11. Plane Crash over the bridge!

  12. [SHOCKING VIDEO] The truth behind Mcdonald's food

  13. Justin Bieber killed a 7-year-old Boy HOAX

  14. [SHOCKING VIDEO] Another Shark attack in hawaii: Teen Surfer Attacked by Shark

  15. Utube-trends and Extreme videos are serving Facebook malware

  16. Facebook malware: Human Body parts found inside a crocodile

  17. Facebook malware: Baby Alien found by farmer in Mexico

  18. Facebook malware: After I saw this, I put down my phone and Didn't pick it up for the rest of the day 

  19. Facebook Malware: [FULL Video] Man Catches Wife in the acts of cheating and records it!

  20. Facebook Malware: [Shосkіng Vіdeо] Deαd Mermαіd Dіsсоνered іn Flоrіdα

  21. Facebook ma​lware: Giant Bat captured video

  22. Facebook virus: Vídeo de un parto natural en casa, emocionante!

  23. Facebook malware: [VIDEO] EL BAILE MÁS HOT QUE NUNCA HE VISTO

  24. Facebook virus: [VIDEO] Que sucede si una lata de coca cola se encuentra con lava?

  25. Facebook virus: [VIDEO] El PEOR ACCIDENTE de moto del mundo

  26. VIDEO: [Impactante] Accidente en la montaña rusa que trató de ser ocultado

  27. Shocking video: A bus with 37 people inside burned Facebook malware

  28. Shocking video must watch: Dead Mouse in Coca Cola malware

  29. Shocking Cannibalism video: Man Eats a man on a train in China! Facebook Malware

  30. Shocking video: Meet thai girl who is half human half snake Facebook hoax

  31. Facebook malware: @OffVinDiesel died while filming a deadly scene

  32. Facebook hoax: Poor Girl Ended Up in The Emergency Room After This

 

PLEASE SHARE THIS LIST TO INFORM AND RAISE AWARENESS AMONGST SOCIAL MEDIA USERS

Snowden leak: Spy agencies use sex and cyber attacks to descredit targets

$
0
0

Intelligence agents working for the United Kingdom have employed “dirty tricks” including sexual “honey traps” to ensnare rival agents, hackers, suspected terrorists, arms dealers, and other criminals, according to documents leaked by Edward Snowden.

Documents leaked by the US National Security Agency whistleblower and published by NBC news Friday detail strategies used by the Joint Threat Research and Intelligence Group (JTRIG), a spy unit whose existence has been classified, to “destroy, deny, degrade [and] disrupt” adversaries. The slides, which were used in 2010 and 2012, showed that the JTRIG completed their mission by “discrediting” them via misinformation and hacking their communications.

The leak details two primary methods of attack, cyber operations and propaganda efforts. The propaganda missions include mass messaging and the manipulation of stories on social media platforms like Twitter, Flickr, Facebook, YouTube.

The cyber-attacks primarily include distributed denial of service (DDoS) attacks, made famous by hackers who overtake millions of computers and direct all of their internet traffic to one site, overwhelming that URL and effectively shutting it down for an amount of time.

Eric King, an attorney who currently teaches IT law at the London School of Economics, told NBC it is “remarkable” that the GCHQ has become so adept at launching DDoS attacks without “clear lawful authority,” and even as the British government has criticized similar strategies used by other governments.

“GCHQ has no clear authority to send a virus or conduct cyber-attacks,” he said. “Hacking is one of the most invasive methods of surveillance.”

The slides also point out that the British were “slightly ahead” of US spies regarding offensive operations and that the GCHQ had absorbed many of the responsibilities formerly under the domain of the MI5 and MI6 spy agencies.

Yet the clandestine activities outlined in the Snowden documents also exit the digital world and enter one reminiscent of a John le Carre novel. The 2012 presentation describes the “honey trap” method of discrediting a target with the timeless art of seduction. The individual is lured “to go somewhere on the internet, or a physical location” where they are then “met by a friendly face.”

No specific instances where the “honey trap” was successfully employed is mentioned, but a so-called “Royal Concierge” program took advantage of hotel reservation systems to track the physical location of foreign diplomats and issue “daily alerts to analysts working on governmental hard targets.” Royal Concierge then attempts to manipulate the reservation so the diplomat in question stays at a hotel friendly to the GCHQ’s SIGINT (signal-intelligence) program. Others are tracked so they can be monitored in-person.

The slides encourage agents to monitor targets through “close access technical operations” and ask them to consider “Can we influence hotel choice? Can we cancel their visits?”

Also mentioned in the 2010 presentation is a technique known as “credential harvesting” that seeks to manipulate journalists into giving tainted information to an intelligence target. Whether or not the journalist would be aware of their role is unclear but the slides do indicate a reporter could be used to gain access to a target, perhaps through an interview, and then have their conversation monitored by the GCHQ.

Joel Simon, executive director of the Committee to Protect Journalists, told NBC the very notion of “credential harvesting” should be a “wake up call” to media personnel.

“All journalists generally are then vulnerable to the charge that they work at the behest of an intelligence agency,” he said.

Viewing all 151 articles
Browse latest View live