The Spiegel reports that the cyber-attack against the half-state owned telecommunications provider Belgacom was an operation executed by the UK’s GCHQ, based on documents leaked from Edward Snowden.
According to a “Top Secret” Presentation by GCHQ, the project has the codename “Operation Socialist” with the mission to enable “improved surveillance of Belgacom” and to better understand the providers infrastructure.
While the Presentation is undated, another document states that GCHQ has had access since at least 2010.
Belgacom became aware of the attack after initiating an internal review after the NSA Spying revelations. The EU Commission, the Council of Europe and the European Parliament are Belgacom customers.
Initially, the NSA was suspected, but the presentation shows that it was a British operation using surveillance technology developed by the NSA.
According to the presentation, the attack was executed by an attack technique named “Quantum Insertion” (QI), where several Belgacom employees were redirected without their knowledge to malicious websites where the surveillance malware was installed. Several of these victims had “good access” to important parts of the Belgacom infrastructure, according to the Spiegel report.
From there, GCHQ was able to further infiltrate the providers network, and the presentation indicates that one target were the “Roaming routers” which are responsible for international traffic, where a man-in-the-middle attack was intended to be used to spy on smartphone users.
According to the Spiegel, GCHQ’s Network Analysis Center considered “Operation Socialist” a success.
More from Oliver Rochford
- Cyber War and the Compromise of Reliable Full Disclosure
- Cryptocurrencies and the Revolution in Cybercrime Economics
- Cybersecurity’s Marketing Dilemma
- The Myth of Security Enabling Your Business
- The Three Pillars of Hypothesis-Driven Threat Defense
- What Does Your Machine Actually Learn?
- Security Automation is About Trust, Not Technology
- Solving Cyberwar the Old Fashioned Way – Via Diplomacy
Latest News
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
