Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

NSA Infected 50,000 Computer Networks for Surveillance

The National Security Agency infected more than 50,000 networks across the globe with malware as part of a massive surveillance effort.

The National Security Agency infected more than 50,000 networks across the globe with malware as part of a massive surveillance effort.

The information was another leak from materials taken from former NSA contractor Edward Snowden. According to Dutch newspaper NRC Handelsblad, documents leaked by Snowden showed that the NSA hacked the networks and installed malware. The attacks are orchestrated by a department known as TAO (Tailored Access Operations).

The paper reported that the information came from a management presentation from last year that outlined how the NSA collects information. The malware attacks are referred to as Computer Network Exploitation (CNE).

“One example of this type of hacking was discovered in September 2013 at the Belgium telecom provider Belgacom,” according to the paper. “For a number of years the British intelligence service – GCHQ – has been installing this malicious software in the Belgacom network in order to tap their customers’ telephone and data traffic. The Belgacom network was infiltrated by GCHQ through a process of luring employees to a false Linkedin page.”

Advertisement. Scroll to continue reading.

The leaked material also said that the NSA has access to Internet cables at 20 separate locations around the world.  The NSA declined to comment to NRC Handelsblad on the report.

The Snowden leaks have touched off talk of reforms in regards to how the NSA conducts electronic surveillance. The agency’s critics have been calling for the NSA’s ability to collect data such as phone and email records to be curtailed.  It has also spurred many organizations such as Yahoo and Google to expand their use of encryption to protect communications.

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.

Cyberwarfare

Several hacker groups have joined in on the Israel-Hamas war that started over the weekend after the militant group launched a major attack.

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cyberwarfare

The war in Ukraine is the first major conflagration between two technologically advanced powers in the age of cyber. It prompts us to question...