• About
  • Contact
  • Submit News
Monday, July 7, 2025
No Result
View All Result
NEWSLETTER
TGE NEWS
  • Home
  • World
    • Business
    • Economy
    • Politics
    • Geo-Engineering
    • Environment
    • Police State
    • Foreign Policy
  • U.S.
    • Federal Reserve
  • Globalist Agenda
    • Secret Societies
    • World Order
    • The Globalists
  • Health
    • Big Pharma
    • Fluoride
    • Food
    • Gmo’s
    • Vaccines
  • Sci/Tech
    • Space
    • Trans-Humanism
  • Media
    • Documentaries
    • Interviews
    • Talks/Lectures
  • More+
    • Ancient Civilizations
    • Astrology
    • Astrotheology
    • Awareness
    • DIY
    • Esoteric
    • Free Energy
    • Hidden History
    • Infographics
    • Knowledge
    • Religion
    • Spirituality
    • Submit News
  • Home
  • World
    • Business
    • Economy
    • Politics
    • Geo-Engineering
    • Environment
    • Police State
    • Foreign Policy
  • U.S.
    • Federal Reserve
  • Globalist Agenda
    • Secret Societies
    • World Order
    • The Globalists
  • Health
    • Big Pharma
    • Fluoride
    • Food
    • Gmo’s
    • Vaccines
  • Sci/Tech
    • Space
    • Trans-Humanism
  • Media
    • Documentaries
    • Interviews
    • Talks/Lectures
  • More+
    • Ancient Civilizations
    • Astrology
    • Astrotheology
    • Awareness
    • DIY
    • Esoteric
    • Free Energy
    • Hidden History
    • Infographics
    • Knowledge
    • Religion
    • Spirituality
    • Submit News
No Result
View All Result
TGE NEWS

How The NSA Deploys Malware: An In-Depth Look at the New Revelations

by TGE News
12 years ago
19.8k
A A
How The NSA Deploys Malware: An In-Depth Look at the New Revelations
20.6k
SHARES
41.3k
VIEWS
FacebookTwitter

We’ve long suspected that the NSA, the world’s premiere spy agency, was pretty good at breaking into computers. But now, thanks to an article by security expert Bruce Schneier—who is working with the Guardian to go through the Snowden documents—we have a much more detailed view of how the NSA uses exploits in order to infect the computers of targeted users. The template for attacking people with malware used by the NSA is in widespread use by criminals and fraudsters, as well as foreign intelligence agencies, so it’s important to understand and defend against this threat to avoid being a victim to the plethora of attackers out there.

How Does Malware Work Exactly?

Deploying malware over the web generally involves two steps. First, as an attacker, you have to get your victim to visit a website under your control. Second, you have to get software—known as malware—installed on the victim’s computer in order to gain control of that machine. This formula isn’t universal, but is often how web-based malware attacks proceed.

In order to accomplish the first step of getting a user to visit a site under your control, an attacker might email the victim text that contains a link to the website in question, in a so-called phishing attack. The NSA reportedly uses phishing attacks sometimes, but we’ve learned that this step usually proceeds via a so-called “man-in-the-middle” attack.1 The NSA controls a set of servers codenamed “Quantum” that sit on the Internet backbone, and these servers are used to redirect targets away from their intended destinations to still other NSA-controlled servers that are responsible for the injection of malware. So, for example, if a targeted user visits “yahoo.com”, the target’s browser will display the ordinary Yahoo! landing page but will actually be communicating with a server controlled by the NSA. This malicious version of Yahoo!’s website will tell the victim’s browser to make a request in a background to another server controlled by the NSA which is used to deploy malware.

Once a victim visits a malicious website, how does the attacker actually infect the computer? Perhaps the most straightforward method is to trick the user into downloading and running software. A cleverly designed pop-up advertisement may convince a user to download and install the attacker’s malware, for example.

But this method does not always work, and relies on a user taking action to download and run software. Instead, attackers can exploit software vulnerabilities in the browser that the victim is using in order to gain access to her computer. When a victim’s browser loads a website, the software has to perform tasks like parsing text given to it by the server, and will often load browser plugins like Flash that run code given to it by the server, in addition to executing Javascript code given to it by the server. But browser software—which is becoming increasingly complex as the web gains more functionality—doesn’t work perfectly. Like all software, it has bugs, and sometimes those bugs are exploitable security vulnerabilities that allow an attacker to gain access to a victim’s computer just because a particular website was visited. Once browser vendors discover vulnerabilities, they are generally patched, but sometimes a user has out of date software that is still vulnerable to known attack. Other times, the vulnerabilities are known only to the attacker and not to the browser vendor; these are called zero-day vulnerabilities.

The NSA has a set of servers on the public Internet with the code name “FoxAcid” used to deploy malware. Once their Quantum servers redirect targets to a specially crafted URL hosted on a FoxAcid server, software on that FoxAcid server selects from a toolkit of exploits in order to gain access to the user’s computer. Presumably this toolkit has both known public exploits that rely on a user’s software being out of date, as well as zero-day exploits which are generally saved for high value targets.2 The agency then reportedly uses this initial malware to install longer lasting malware.

Once an attacker has successfully infected a victim with malware, the attacker generally has full access to the user’s machines: she can record key strokes (which will reveal passwords and other sensitive information), turn on a web cam, or read any data on the victim’s computer.

What Can Users Do To Protect Themselves?

We hope that these revelations spur browser vendors to action, both to harden their systems against exploits, and to attempt to detect and block the malware URLs used by the FoxAcid servers.

In the meantime, users concerned about their security should practice good security hygiene. Always keep your software up to date—especially browser plugins like Flash that require manual updates. Make sure you can distinguish between legitimate updates and pop-up ads that masquerade as software updates. Never click a suspicious looking link in an email.

For users who want to go an extra step towards being more secure—and we think everyone should be in this camp—consider making plugins like Flash and Java “click-to-play” so that they are not executed on any given web page until you affirmatively click them. For Chromium and Chrome, this option is available in Settings => Show Advanced Settings => Privacy => Content Settings => Plug-ins. For Firefox, this functionality is available by installing a browser Add-On like “Click to Play per-element”. Plugins can also be uninstalled or turned off completely. Users should also use ad blocking software to stop unnecessary web requests to third party advertisers and web trackers, and our HTTPS Everywhere add-on in order to encrypt connections to websites with HTTPS as much as possible.

Finally, for users who are willing to notice some more pain when browsing the web, consider using an add-on like NotScripts (Chrome) or NoScript (Firefox) to limit the execution of scripts. This means you will have to click to allow scripts to run, and since Javascript is very prevalent, you will have to click a lot. For Firefox users, RequestPolicy is another useful add-on that stops third-party resources from loading on a page by default. Once again, as third-party resources are popular, this will disrupt ordinary browsing a fair amount. Finally, for the ultra paranoid, HTTP Nowhere will disable all HTTP traffic completely, forcing your browsing experience to be entirely encrypted, and making it so that only websites that offer an HTTPS connection are available to browse.

Conclusion

The NSA’s system for deploying malware isn’t particularly novel, but getting some insight into how it works should help users and browser and software vendors better defend against these types of attacks, making us all safer against criminals, foreign intelligence agencies, and a host of attackers. That’s why we think it’s critical that the NSA come clean about its capabilities and where the common security holes are—our online security depends on it.

Source: Electronic Frontier Foundation

0 0 votes
Article Rating
Share8257Tweet5158
Previous Post

Home Remedies for High Blood Pressure

Next Post

‘March against Monsanto’: Global movement plans 2nd protest

TGE News

Your Source for Alternative News and Information.

Related Posts

Google-NSA Nexus: New Chromium Browser Installs Eavesdropping Tool on Your PC
NWO

Google-NSA Nexus: New Chromium Browser Installs Eavesdropping Tool on Your PC

06/25/2015
Russian Security Firm Reveals NSA Spyware in Hard Drives Around the World
Police State

Russian Security Firm Reveals NSA Spyware in Hard Drives Around the World

02/17/2015
How the NSA is Transforming Law Enforcement
Police State

How the NSA is Transforming Law Enforcement

02/27/2025
Former FBI Chief Comes Clean About Conspiracies And Corruption
Media

Former FBI Chief Comes Clean About Conspiracies And Corruption

02/27/2025
Rockefeller attaches cybersecurity bill to NDAA 2014
World News

Rockefeller attaches cybersecurity bill to NDAA 2014

02/27/2025
NSA hacked over 50,000 computer networks worldwide
World News

NSA hacked over 50,000 computer networks worldwide

02/27/2025
Load More
Next Post
‘March against Monsanto’: Global movement plans 2nd protest

‘March against Monsanto’: Global movement plans 2nd protest

Subscribe
Login
Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Most Read

  • A List of Banks Owned by the Rothschild Dynasty

    A List of Banks Owned by the Rothschild Dynasty

    28856 shares
    Share 11540 Tweet 7212
  • The History of the ‘House of Rothschild’ (Complete)

    27752 shares
    Share 11061 Tweet 6913
  • Wikileaks Is A Rothschild Operation

    25592 shares
    Share 10236 Tweet 6398
  • Secrets Of The Elite: Why Forbes’s Rich List Doesn’t Include The Wealthiest Families On The Planet

    24970 shares
    Share 9987 Tweet 6242
  • George Soros Exposed as a Rothschild Agent in the 1990’s

    23591 shares
    Share 9436 Tweet 5897

Newsletter

Enter your email address to subscribe to our newsletter and receive notifications of new posts by email.

Join 12.4K other subscribers

Latest Posts

  • Yes, A Small Cabal Of Elites Run The World Economy & Governments!
  • How the Geoengineers Make, Amp up and Aim Superstorms
  • Protocols of the Learned Robots of Artificial Intelligentsia
  • David Straight: Awakening Seminar

Site Links

  • Donate
  • Resources
  • Sitemap
  • The Globalists

About Us

Deep independent journalism and contributions about who really controls the world that you will not see in the corporate media.

No Result
View All Result
  • About
  • Contact
  • Privacy & Terms
  • Submit News

Circa 2012 TGE NEWS.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Translate »

Add New Playlist

No Result
View All Result
  • Home
  • World
    • Business
    • Economy
    • Politics
    • Geo-Engineering
    • Environment
    • Police State
    • Foreign Policy
  • U.S.
    • Federal Reserve
  • Globalist Agenda
    • Secret Societies
    • World Order
    • The Globalists
  • Health
    • Big Pharma
    • Fluoride
    • Food
    • Gmo’s
    • Vaccines
  • Sci/Tech
    • Space
    • Trans-Humanism
  • Media
    • Documentaries
    • Interviews
    • Talks/Lectures
  • More+
    • Ancient Civilizations
    • Astrology
    • Astrotheology
    • Awareness
    • DIY
    • Esoteric
    • Free Energy
    • Hidden History
    • Infographics
    • Knowledge
    • Religion
    • Spirituality
    • Submit News

Circa 2012 TGE NEWS.

Discover more from The Global Elite

Subscribe now to keep reading and get access to the full archive.

Continue reading