Intelligence

Pierluigi Paganini March 23, 2014
IntelCrawler profiled Syrian Electronic Army group

The intelligence firm IntelCrawler has published a report on the activities of the Syrian Electronic Army. Are they hacktivists or cyber spies? IntelCrawler, a cyber-threat intelligence company has recently issued an interesting report on the activities of the Syrian Electronic Army (SEA), the experts analyzed a series of event since since its first appearance in […]

Pierluigi Paganini March 22, 2014
Orange Telecom company grants full data access to French intelligence

The Orange telecom company is providing its data to France intelligence agency, the Direction Générale de la Sécurité Extérieure. The name of Orange Telecom operator is again under discussion after the giant has threatened to sue the NSA for hacking into the underwater cable. Last revelations are not on the NSA operations, instead the leaked documents report […]

Pierluigi Paganini March 21, 2014
SEA has stolen invoices that shows Microsoft charges FBI for user data

A collection of emails hacked by the group Syrian Electronic Army shows that Microsoft charges the FBI’s Digital Intercept Technology Unit for user data. No more than a week ago hackers of the group Syrian Electronic Army (SEA) published online documents leaked from US CENTCOM repository, now the pro President Bashar al-Assad sad hacking team successfully penetrated […]

Pierluigi Paganini March 19, 2014
NSA programs MYSTIC and RETRO spies phone calls on global scale, also on past conversations

Documents leaked by Snowden reveals that NSA has built a surveillance system capable of recording all the phone calls of a foreign country. The information on the surveillance capabilities of the National Security Agency is updated on a daily base and last news is that the agency has the necessary technology to record all the […]

Pierluigi Paganini March 17, 2014
QUANTUMHAND – NSA impersonates Facebook to inject malware

Recent revelations on TURBINE platform include also a disturbing truth, NSA used QUANTUMHAND exploits to implant malware in Facebook users’ machines. Last Week Ryan Gallagher and Glenn Greenwald revealed the existence of TURBINE platform, a sophisticated hacking architecture used to take control of botnet C&C servers managed by cybercrime. One of the details revealed by the journalists raised a heated […]

Pierluigi Paganini March 14, 2014
TURBINE, how NSA has plundered botnets to the cybercrime

TURBINE is the codename for a sophisticated hacking platform to take control of C&C servers managed by cybercrime. The NSA has been hijacking the botnets managed by cybercrime to its own purpose, this is the last revelation on questionable activities of the agency. Also this last revelation is based on documents leaked by Snowden, the news was […]

Pierluigi Paganini March 13, 2014
Is the Agent.btz malware the link between Snake and Red October?

The agent.btz malware may have served as starting point for malware Turla and the malicious code used in the Red October campaign. In the last weeks we have discussed about the Snake platform used in a large-scale cyber espionage campaign that targeted highly secured systems belonging to Governments and Military all over the world. Experts […]

Pierluigi Paganini March 08, 2014
SNAKE – The last cyber espionage campaign on a large scale

BAE Systems Applied Intelligence has disclosed a Russian cyber espionage campaign codenamed as SNAKE that targeted Governments and Military Networks. The British cyber specialist BAE Systems Applied Intelligence has disclosed a Russian cyber espionage campaign codenamed as SNAKE that remained undetected for a log time, at least for eight years. The malware can infiltrate Windows XP, Vista, 7 […]

Pierluigi Paganini March 04, 2014
Africa Security & Counter-Terrorism Summit in London Chaired by President of European Centre for Information Policy and Security ECIPS

Africa Security & Counter-Terrorism Summit in London Chaired by President of European Centre for Information Policy and Security ECIPS The Africa Security & Counter-Terrorism Summit held in London last Friday had some few hundred attendees consisting of ministers and government officials from over 28 countries. The Summit was well attended and certainly reached it goals, to find consensus among governments […]

Pierluigi Paganini March 04, 2014
Soghoian on government surveillance through service update process

Chris Soghoian, principal technologist with the American Civil Liberties Union, explained that government surveillance could exploit service update process. Chris Soghoian, principal technologist with the American Civil Liberties Union, during the recent TrustyCon conference highlighted the possibility that the government will exploit automated update services to serve malware and spy on users. Is this the next […]