Bitcoin Forum
November 16, 2024, 03:38:05 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1] 2 »  All
  Print  
Author Topic: The NSA reportedly poses as Facebook to spread malware (Not just Facebook)  (Read 4316 times)
Wilikon (OP)
Legendary
*
Offline Offline

Activity: 1176
Merit: 1001


minds.com/Wilikon


View Profile
March 12, 2014, 06:18:43 PM
Last edit: March 12, 2014, 08:00:58 PM by Wilikon
 #1






After failing to infect targets with malware in spam emails, the U.S. National Security Agency has reportedly turned to Facebook.

According to a report by The Intercept, the NSA “disguises itself as a fake Facebook server” to perform “man-in-the-middle” and “man-on-the-side” attacks and spread malware. The Intercept is the first in a series of publications created by Pierre Omidyar‘s First Look Media.

Journalists Ryan Gallagher and Glenn Greenwald claim that Facebook users are tricked into visiting “what looks like an ordinary Facebook page.” From there, they claim, “the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive.”

A Facebook spokesperson provided VentureBeat with the following statement:

“We have no evidence of this alleged activity. In any case, this method of network level disruption does not work for traffic carried over HTTPS, which Facebook finished integrating by default last year. If government agencies indeed have privileged access to network service providers, any site running only HTTP could conceivably have its traffic misdirected.”


A purportedly official animation, uploaded on Vimeo, reveals how the NSA conducts the Facebook hack:

https://vimeo.com/88822483

NSA’s Facebook targeting is reportedly a response to the declining success of other malware injection techniques. Previous techniques include the use of “spam emails that trick targets into clicking a malicious link.”

It’s noteworthy that the NSA has also allegedly posed as Google to gain access to user data.

This news follows NSA leaker Edward Snowden’s appearance at SXSW. During his talk, Snowden stated that the U.S. “needs a watchdog that watches Congress.” When asked if he was satisfied with the current NSA debate, Snowden made clear that he would serve again as a whistleblower if he had a second chance.

http://venturebeat.com/2014/03/12/the-nsa-reportedly-poses-as-facebook-to-spread-malware/


------------------------------------------------------
watching the vimeo link quick before it "disappears"...

Wilikon (OP)
Legendary
*
Offline Offline

Activity: 1176
Merit: 1001


minds.com/Wilikon


View Profile
March 12, 2014, 07:59:54 PM
 #2





With Turbine, no humans are required to exploit phones, PCs, routers, VPNs.

Since 2010, the National Security Agency has kept a push-button hacking system called Turbine that allows the agency to scale up the number of networks it has access to from hundreds to potentially millions. The news comes from new Edward Snowden documents published by Ryan Gallagher and Glenn Greenwald in The Intercept today. The leaked information details how the NSA has used Turbine to ramp up its hacking capacity to “industrial scale,” plant malware that breaks the security on virtual private networks (VPNs) and digital voice communications, and collect data and subvert targeted networks on a once-unimaginable scale.

Turbine is part of Turbulence, the collection of systems that also includes the Turmoil network surveillance system that feeds the NSA’s XKeyscore surveillance database. While it is controlled from NSA and GCHQ headquarters, it is a distributed set of attack systems equipped with packaged “exploits” that take advantage of the ability the NSA and GCHQ have to insert themselves as a “man in the middle” at Internet chokepoints. Using that position of power, Turbine can automate functions of Turbulence systems to corrupt data in transit between two Internet addresses, adding malware to webpages being viewed or otherwise attacking the communications stream.

Since Turbine went online in 2010, it has allowed the NSA to scale up from managing hundreds of hacking operations each day to handling millions of them. It does so by taking people out of the loop of managing attacks, instead using software to identify, target, and attack Internet-connected devices by installing malware referred to as “implants.” According to the documents, NSA analysts can simply specify the type of information required and let the system figure out how to get to it without having to know the details of the application being attacked.

The “selectors” that analysts can use to target victims through Turbine are significant. Using Turmoil as a targeting system, Turbine can look for identifying cookies from a number of Web services, including Google, Yahoo, Twitter, Facebook, Hotmail, and DoubleClick, as well as those from the Russian services Mail.ru, Rambler, and Yandex. Those cookies are all available for targeting purposes, as is user account information from a whole host of services.



Turmoil can also key in on Windows Update identifiers, software serial numbers passed over the Internet, and signatures from physical devices such as phones’ International Mobile Station Equipment Identity (IMEI) numbers and Wi-Fi MAC addresses. All of these things can be indexed as metadata by Turmoil and tied by other metadata to a specific target.

Once installed, implants give the NSA and GCHQ a way to extract data from the target, monitor its communications, or launch attacks against the network the target resides on. Turbine implants have even allowed the NSA and GCHQ to hack IPSec VPN connections by inserting an implant on routers that break VPNs’ key exchange process, opening virtually any VPN to direct surveillance.

Hammer time

The documents published today include slides from the NSA’s Turbulence team detailing the “phases” of the NSA’s capabilities to monitor VPN and Voice over IP (VoIP) traffic using a set of attacks known as Hammerstein and Hammerchant. Previously, it was known that the NSA could exploit the older Point to Point Tunneling Protocol (PPTP) for VPNs. But the new documents show how Turbine and Turbulence can be used to attack VPNs using the more secure Internet Protocol Security (IPSec) standard.

At the most basic level, Turbulence simply captures metadata from Internet Key Exchange (IKE) messages between systems connecting over an IPSec VPN. The NSA can apparently perform a “static tasking” against an IPSec VPN based on its IP addresses using the Hammerstein implant. (Hammerstein is a piece of malware injected into a router sitting in the path of the VPN traffic, which forwards key exchanges and encrypted data to a Turbulence system.)

Hammerstein allows the NSA and GCHQ to tap into networks that don’t pass through the Turbulence checkpoint. The data can then be pushed through a specialized VPN-cracking “blade” in the Turmoil server hardware to decrypt the content.



The Hammerchant implant does roughly the same thing with digital voice calls and video conferences that Hammerstein does with VPNs. It can intercept call traffic based on the SIP and H.323 protocols, allowing “call surveys” that collect metadata or capture the actual voice content.

Turbine added the capability of “dynamic tasking” to these attacks. It can send identifying information on the fly to Hammerstein or Hammerchant automatically based on a set of parameters set by an NSA operator with a few mouse clicks.




Search and destroy

Other man-in-the-middle and “man on the side” attack systems are also tied into Turbine. Quantum Insert, the attack tool used to hack the networks of OPEC and the Belgian telecommunications company Belgacom, can also be controlled by Turbine by using webpage request data collected by Turmoil to automatically trigger an attack. Turbine can push an HTML request posing as a response from a visited site back through a Quantum Insert implant on a server or router closer to the server the request is sent to. It does this because of a microseconds-long response time advantage to convince the target’s browser that it’s the response being sought out. It then delivers malware that allows the NSA (or GCHQ) to poke around the target’s computer and network.



These capabilities give the NSA’s Tailored Access Operations (TAO) unit the ability to conduct not just tailored attacks, but multilayered, massive operations that can scoop up vast amounts of data not accessible via XKeyscore. As if that’s not enough, there’s also an attack tool designed for wholesale exploits of traffic passing through a specific Internet “choke point”—a peering point for a specific Internet Service Provider, an Internet exchange at a national border or at a submarine cable meeting point, or any other routing point on the Internet that could host an implant.

Called SecondDate, the capability was described in a 2012 NSA document as a tool “to influence real-time communications between client and server.” It has the ability to redirect Web browsers to the NSA’s FoxAcid malware servers, and it may have been used as part of an attack on Tor users. SecondDate can serve as part of a targeted attack, but it can also be used, according to NSA documents, for “mass exploitation potential for clients passing through network choke points.” In other words, SecondDate can be used in concert with the NSA’s other systems to attack whole swaths of the Internet, infecting systems with surveillance malware.

All of these capabilities give the NSA and GCHQ considerable reach. But they also run the risk of allowing others to stand on the agencies’ shoulders and take advantage of the exploits the NSA has already seeded into parts of the Internet’s infrastructure. Regardless of the scope of the NSA’s ongoing surveillance, the chance that someone else could hijack or repackage a capability like Hammerstein or SecondDate for criminal or other malicious means poses a risk to the entire Internet.

http://arstechnica.com/information-technology/2014/03/nsas-automated-hacking-engine-offers-hands-free-pwning-of-the-world/
TheButterZone
Legendary
*
Offline Offline

Activity: 3080
Merit: 1032


RIP Mommy


View Profile WWW
March 13, 2014, 12:30:07 AM
 #3

HTTPS?

Saying that you don't trust someone because of their behavior is completely valid.
tkbx
Sr. Member
****
Offline Offline

Activity: 350
Merit: 251



View Profile
March 13, 2014, 01:06:00 AM
 #4

This is why we need Meshnet, people.
- ALL connections encrypted by protocol mandate
- Pseudo-anonymous in the same way as Bitcoin (when on a non-internet network, which is the end goal)
- Un-censorable
- Resistant to all disasters (the original intention of the Internet, now deemed "unimportant" because "there will never be a nuclear war, like, ever")
- Instead of sending your traffic to a routing center, then indirectly to the destination, your software router determines the best route to take.
- Because of the above point, if there are ever fiber cables for meshnets, inter-continental data transfer will be just as fast as it is now, while connections to people near you will be much faster.
- Meshnet access will be "freemium", with all users being able to access for free as long as they have a connection to their house already. Users could also pay faster peers to get high-end cable or fiber speeds.
https://projectmeshnet.org/

HTTPS?
Ahaha
Bit_Happy
Legendary
*
Offline Offline

Activity: 2114
Merit: 1040


A Great Time to Start Something!


View Profile
March 13, 2014, 03:48:09 AM
Last edit: March 18, 2014, 09:22:24 PM by Bit_Happy
 #5

I thought they already had access to almost everything?   Huh

Wilikon (OP)
Legendary
*
Offline Offline

Activity: 1176
Merit: 1001


minds.com/Wilikon


View Profile
March 18, 2014, 08:52:28 PM
 #6






The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden.

A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance.

The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for “retrospective retrieval,” and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere.

In the initial deployment, collection systems are recording “every single” conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary.

The call buffer opens a door “into the past,” the summary says, enabling users to “retrieve audio of interest that was not tasked at the time of the original call.” Analysts listen to only a fraction of 1 percent of the calls, but the absolute numbers are high. Each month, they send millions of voice clippings, or “cuts,” for processing and long-term storage.

At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.

No other NSA program disclosed to date has swallowed a nation’s telephone network whole. Outside experts have sometimes described that prospect as disquieting but remote, with notable implications for a growing debate over the NSA’s practice of “bulk collection” abroad.

Bulk methods capture massive data flows “without the use of discriminants,” as President Obama put it in January. By design, they vacuum up all the data they touch — meaning that most of the conversations collected by RETRO would be irrelevant to U.S. national security interests.

In the view of U.S. officials, however, the capability is highly valuable.

In a statement, Caitlin Hayden, spokeswoman for the National Security Council, declined to comment on “specific alleged intelligence activities.” Speaking generally, she said “new or emerging threats” are “often hidden within the large and complex system of modern global communications, and the United States must consequently collect signals intelligence in bulk in certain circumstances in order to identify these threats.”

NSA spokeswoman Vanee Vines, in an e-mailed statement, said that “continuous and selective reporting of specific techniques and tools used for legitimate U.S. foreign intelligence activities is highly detrimental to the national security of the United States and of our allies, and places at risk those we are sworn to protect.

http://apps.washingtonpost.com/g/page/world/nsa-symbolizes-data-collection-program-with-wizard/880/


http://www.washingtonpost.com/world/national-security/nsa-surveillance-program-reaches-into-the-past-to-retrieve-replay-phone-calls/2014/03/18/226d2646-ade9-11e3-a49e-76adc9210f19_story.html



Bit_Happy
Legendary
*
Offline Offline

Activity: 2114
Merit: 1040


A Great Time to Start Something!


View Profile
March 18, 2014, 09:25:18 PM
 #7






The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden.

A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance.

The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for “retrospective retrieval,” and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere.

In the initial deployment, collection systems are recording “every single” conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary.

The call buffer opens a door “into the past,” the summary says, enabling users to “retrieve audio of interest that was not tasked at the time of the original call.” Analysts listen to only a fraction of 1 percent of the calls, but the absolute numbers are high. Each month, they send millions of voice clippings, or “cuts,” for processing and long-term storage.

At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.

No other NSA program disclosed to date has swallowed a nation’s telephone network whole. Outside experts have sometimes described that prospect as disquieting but remote, with notable implications for a growing debate over the NSA’s practice of “bulk collection” abroad.

Bulk methods capture massive data flows “without the use of discriminants,” as President Obama put it in January. By design, they vacuum up all the data they touch — meaning that most of the conversations collected by RETRO would be irrelevant to U.S. national security interests.

In the view of U.S. officials, however, the capability is highly valuable.

In a statement, Caitlin Hayden, spokeswoman for the National Security Council, declined to comment on “specific alleged intelligence activities.” Speaking generally, she said “new or emerging threats” are “often hidden within the large and complex system of modern global communications, and the United States must consequently collect signals intelligence in bulk in certain circumstances in order to identify these threats.”

NSA spokeswoman Vanee Vines, in an e-mailed statement, said that “continuous and selective reporting of specific techniques and tools used for legitimate U.S. foreign intelligence activities is highly detrimental to the national security of the United States and of our allies, and places at risk those we are sworn to protect.

http://apps.washingtonpost.com/g/page/world/nsa-symbolizes-data-collection-program-with-wizard/880/


http://www.washingtonpost.com/world/national-security/nsa-surveillance-program-reaches-into-the-past-to-retrieve-replay-phone-calls/2014/03/18/226d2646-ade9-11e3-a49e-76adc9210f19_story.html


Almost looks like a clever parody, like onion.com.
This isn't real.....No it cannot be real.  
We live in a free country.  Roll Eyes

okaynow
Hero Member
*****
Offline Offline

Activity: 546
Merit: 500


PGP 9CB0902E


View Profile
March 18, 2014, 11:22:47 PM
 #8

@Bit_happy: we live in a free-for-all fairy tale. With dragons and whales, cyberalchemists & trolls man XD
it;s like 1984 minus the poetry.

1PeecNu1J8VNKpgR13nasMZWLcMZrwNJfc
AnonyMint
Hero Member
*****
Offline Offline

Activity: 518
Merit: 521


View Profile
March 18, 2014, 11:40:23 PM
 #9

We must redesign some of the protocol infrastructure of the internet.

When I say this, I am not talking about working through the W3.org (although I am listed as a contributor there to the design of CSS2.1).

No we need something more market based and immediate, analogous to how Netscape was setting de facto HTML standards in the 1990s.

I do have a specific action in plan. Something analogous to PirateBay's efforts but I think better and more general.

unheresy.com - Prodigiously Elucidating the Profoundly ObtuseTHIS FORUM ACCOUNT IS NO LONGER ACTIVE
Luno
Sr. Member
****
Offline Offline

Activity: 504
Merit: 250


View Profile
March 19, 2014, 08:31:42 AM
 #10

The NSA knows my score in Candy Crush? (It's my wife's profile, because FB is too ridiculous for me to have  profile on)
Wilikon (OP)
Legendary
*
Offline Offline

Activity: 1176
Merit: 1001


minds.com/Wilikon


View Profile
March 19, 2014, 05:36:37 PM
 #11






The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden.

A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance.

The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for “retrospective retrieval,” and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere.

In the initial deployment, collection systems are recording “every single” conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary.

The call buffer opens a door “into the past,” the summary says, enabling users to “retrieve audio of interest that was not tasked at the time of the original call.” Analysts listen to only a fraction of 1 percent of the calls, but the absolute numbers are high. Each month, they send millions of voice clippings, or “cuts,” for processing and long-term storage.

At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.

No other NSA program disclosed to date has swallowed a nation’s telephone network whole. Outside experts have sometimes described that prospect as disquieting but remote, with notable implications for a growing debate over the NSA’s practice of “bulk collection” abroad.

Bulk methods capture massive data flows “without the use of discriminants,” as President Obama put it in January. By design, they vacuum up all the data they touch — meaning that most of the conversations collected by RETRO would be irrelevant to U.S. national security interests.

In the view of U.S. officials, however, the capability is highly valuable.

In a statement, Caitlin Hayden, spokeswoman for the National Security Council, declined to comment on “specific alleged intelligence activities.” Speaking generally, she said “new or emerging threats” are “often hidden within the large and complex system of modern global communications, and the United States must consequently collect signals intelligence in bulk in certain circumstances in order to identify these threats.”

NSA spokeswoman Vanee Vines, in an e-mailed statement, said that “continuous and selective reporting of specific techniques and tools used for legitimate U.S. foreign intelligence activities is highly detrimental to the national security of the United States and of our allies, and places at risk those we are sworn to protect.

http://apps.washingtonpost.com/g/page/world/nsa-symbolizes-data-collection-program-with-wizard/880/


http://www.washingtonpost.com/world/national-security/nsa-surveillance-program-reaches-into-the-past-to-retrieve-replay-phone-calls/2014/03/18/226d2646-ade9-11e3-a49e-76adc9210f19_story.html


Almost looks like a clever parody, like onion.com.
This isn't real.....No it cannot be real.  
We live in a free country.  Roll Eyes

First of all what are you going to do with all those talented jobless graphic artists? I have to admit: the NSA has a good sense of humor (at least the Design & Marketing dept. does). Don't forget the logo on the their spy satellite launched a while back

U.S. Spy Rocket Has Octopus-Themed 'Nothing Is Beyond Our Reach' Logo. Seriously.
http://www.forbes.com/sites/kashmirhill/2013/12/05/u-s-spy-rocket-launching-today-has-octopus-themed-nothing-is-beyond-our-reach-logo-seriously/

Luno
Sr. Member
****
Offline Offline

Activity: 504
Merit: 250


View Profile
March 19, 2014, 05:59:02 PM
 #12

Magic the gathering! NSA, Mark Karpeles, everything is a blur  Shocked
Wilikon (OP)
Legendary
*
Offline Offline

Activity: 1176
Merit: 1001


minds.com/Wilikon


View Profile
March 20, 2014, 01:00:49 AM
 #13

Magic the gathering! NSA, Mark Karpeles, everything is a blur  Shocked

If the NSA reads this forum and wants to punk Bitcoin it should have a giant Bitcoin logo + wallet address on its next spy satellite...
Luno
Sr. Member
****
Offline Offline

Activity: 504
Merit: 250


View Profile
March 20, 2014, 08:40:17 AM
 #14

They do read this forum, or a scraper is.

NSA employees are quite intelligent people, so they must have a highly sophisticated sense of humour. i would imagine that the "Bitcoin intel office" is the branch to be in, if you want to enjoy working for NSA.

They must be rolling around the floor laughing, short of breath, every hour of the day as they try to keep up with the massive amount of genuinely funny jokes on this forum.

As NSA also do industrial espionage, expect hearing Jimmy Fallon using your jokes on the tonight show too.
bryant.coleman
Legendary
*
Offline Offline

Activity: 3766
Merit: 1217


View Profile
March 20, 2014, 09:52:42 AM
 #15

I just hope that someone will just nuke the Whitehouse. Enough with this.
Luno
Sr. Member
****
Offline Offline

Activity: 504
Merit: 250


View Profile
March 20, 2014, 10:22:22 AM
 #16

I just hope that someone will just nuke the Whitehouse. Enough with this.
All doubt aside; they are reading this thread now!
mexxer
Full Member
***
Offline Offline

Activity: 126
Merit: 100



View Profile
March 20, 2014, 01:26:46 PM
 #17

are you surprised? I mean they do everything and i won't be surprised if every operation system send complete reports to NSA.

Wilikon (OP)
Legendary
*
Offline Offline

Activity: 1176
Merit: 1001


minds.com/Wilikon


View Profile
March 20, 2014, 05:12:51 PM
 #18

I just hope that someone will just nuke the Whitehouse. Enough with this.
All doubt aside; they are reading this thread now!


Nah. NSA bitcointalk office knows bitcoiners would not waste their precious BTC buying an old USSR suitcase nuke on the black market.

https://www.youtube.com/watch?v=kR2IarjjmxE

Luno
Sr. Member
****
Offline Offline

Activity: 504
Merit: 250


View Profile
March 22, 2014, 02:44:35 PM
 #19

are you surprised? I mean they do everything and i won't be surprised if every operation system send complete reports to NSA.

Always thought that the Suitcase Nuke's were a myth, thanks.
Wilikon (OP)
Legendary
*
Offline Offline

Activity: 1176
Merit: 1001


minds.com/Wilikon


View Profile
March 22, 2014, 05:41:20 PM
 #20

are you surprised? I mean they do everything and i won't be surprised if every operation system send complete reports to NSA.

Always thought that the Suitcase Nuke's were a myth, thanks.

Well, since no one will admit, first, to build something as stupid a suitcase nuke, then, to be stupid enough to lose them in the wild is technically still a myth.
Pages: [1] 2 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!