The webσελίδα The Intercept by Glenn Greenwald and Ryan Gallagher published more information from the files leaked by Edward Snowden from the US National Security Agency (NSA). The publication presents the technologies that allow the US intelligence agency to make automated exploits on vulnerabilities in industrial networks and systems.
It turns out that NSA has automated procedures that allow it to plant malware on millions of computers around the world. Documents provided by Snowden show that the UK GCHQ has played an important role in the development of these systems.
The NSA's tactics are similar to those used by cybercriminals. In some cases, they had created a fake server of Facebook and used the social networking site to distribute malware. Of course, they did this whole process to steal data from the infected computers.
The Secret Service has also conducted several spam campaigns to distribute audio-recording malware and λήψηof photos through the computer camera.
2004 had about 100-150 malware. However, after the creation of Tailored Access Operations (TAO) and recruiting hackers, new tools have been developed. So the number of malware today reaches tens of thousands.
Since it is impossible to manage malware automatically, NSA has developed a software called TURBINE. This system is capable of actively managing malware that allows the organization to exploit on an industrial scale.
Το TURBINE λέγεται ότι είναι μέρος μιας ευρείας πρωτοβουλίας επιτήρησης που η NSA ονόμασε: “Owning the Net” ή σε ελεύθερη μετάφραση "κάνοντας δικό μας το net." Και σε περίπτωση που αναρωτιέστε πόσα χρήματα χρησιμοποιούνται για αυτά τα projects, η NSA ζήτησε 67.600.000 δολάρια πέρυσι.
There is a wide range of malicious tools used by the NSA. For example, UNITEDRAKE is used to gain full control over the device.
UNITEDRAKE is a series of plug-ins, each designed for a specific purpose.
CAPTIVATEDAUDIENCE is for recording conversations through the computer microphone, GUMFISH is for exploiting the camera, FOGGYBOTTOM for leaking data on the Internet (like history browsing and the codes accesss), and Grok which copies and saves everything the victim types on their keyboard.
And if you think encryption tools can protect you from such malicious software, you are wrong. All of the above tools are designed to circumvent these protections as the information they collect has not been able to be encrypted.
All of the Edward Snowden records that prove the above are available at Intercept.