Lebanon caught amidst act of international cyber espionage, highlights growing trend of attacks on mobile systems.

in #story7 years ago (edited)

In 1/17/2018, the Electronics Frontiers Foundation and the Lookout traced an international data phishing operation, known as the Dark Caracal, back to the General Directorate of General Security in Beirut, Lebanon. (the headquarter for the Lebanese intelligence agency).

(Major General Abbas Ibraham)
(No comment has been issues thus far by the Lebanese government)

The Dark Caracal has been recognized as being active as early as 2011, although it was only until now that researchers were able to identify the attackers. The state-backed operation targeted a wide range of people, from military personnel, journalists, to regular, everyday people. The information they were able to retrieve was just about everything, every text, email, photos, banking information, etc. This malware reached over 21 countries, affecting an yet unknown amount of people.

So how exactly did they do it? Surprisingly, no high tech equipment, or hacking software was used. No intricate pieces of coding, no zero-day exploits. All they needed was some cleverly designed social engineering, and a few fake apps that look like the real deal.


(Always beware of fake apps before downloading)

Now, its not surprise that a government is in the business of mass data collection, no doubt every government in the world with the appropriate level of technology and funding is doing it. But this just serves to highlight the fact that hacking was come a long way since we all watched WarGames. Now, its save to assume that just about every click has a malware behind it, even within trusted sources.

Coin Marketplace

STEEM 0.25
TRX 0.20
JST 0.037
BTC 96295.92
ETH 3577.12
USDT 1.00
SBD 3.74