Hackers Steal Info From Syrian Rebels Via Skype

Hackers Steal Info From Syrian Rebels Via Skype
bykst / Pixabay

Hackers thought to be linked to the Syrian regime stole valuable military intelligence from rebels by posing as attractive women online.

The method, known as catfishing, seems to have led to a tangible military advantage for the regime, writes Lorenzo Franceschi-Bicchiera of Mashable. Security firm FireEye has published a detailed report on the operation, which seems to have lasted for months towards the end of 2013.

Hackers tricked victims by sending photos laced with malware

The hackers tricked their victims into installing malware onto their machines by sending what were supposed to be photos of beautiful women. Once the malware was installed it gave the hackers access to huge amounts of sensitive data. FireEye claims that although there is no conclusive evidence as to the identity of the attackers, their interest in specific battle plans seems to point to links with Bashar al-Assad’s regime.

This Top Value Hedge Fund Is Killing It This Year So Far

Stone House Capital PartnersStone House Capital Partners returned 4.1% for September, bringing its year-to-date return to 72% net. The S&P 500 is up 14.3% for the first nine months of the year. Q3 2021 hedge fund letters, conferences and more Stone House follows a value-based, long-long term and concentrated investment approach focusing on companies rather than the market Read More

“The attackers were interested in the kind of information that could yield a military edge to the regime,” John Scott-Railton, an independent security researcher who contributed to the report, told Mashable.

Interestingly the victims did not become suspicious when the “women” thought it necessary to ask them whether they were using a computer or a phone. The hackers had access to malware developed specifically for Android devices, and were obviously intent on maximizing their results.

As well as gaining access via Skype, the attackers also utilized fake Facebook profiles, encouraging victims to click on links containing Virtual Private Networks (VPNs), or other documents containing malware.

Who was responsible?

The cyber war in Syria has taken some interesting twists and turns, with some operations attributed to hackers linked to the Syrian Regime, such as the Syrian Electronic Army. However the group has denied any involvement in the Skype honeytrap attack.

Security experts think that the attack was carried out by a new group, given differences in hacking tactics and software. A leaked document would appear to show similarities between training given to Hezbollah members by the Syrian intelligence services in Lebanon and the latest hack, but there is no proof that Hezbollah was involved.

Updated on

While studying economics, Brendan found himself comfortably falling down the rabbit hole of restaurant work, ultimately opening a consulting business and working as a private wine buyer. On a whim, he moved to China, and in his first week following a triumphant pub quiz victory, he found himself bleeding on the floor based on his arrogance. The same man who put him there offered him a job lecturing for the University of Wales in various sister universities throughout the Middle Kingdom. While primarily lecturing in descriptive and comparative statistics, Brendan simultaneously earned an Msc in Banking and International Finance from the University of Wales-Bangor. He's presently doing something he hates, respecting French people. Well, two, his wife and her mother in the lovely town of Antigua, Guatemala. <i>To contact Brendan or give him an exclusive, please contact him at [email protected]</i>
Previous article Russia Plans Joint Military Exercises With North Korea
Next article Decades Of Swiss Banking Secrecy Have Left Their Mark

No posts to display