The National Security Agency infected more than 50,000 networks across the globe with malware as part of a massive surveillance effort.
The information was another leak from materials taken from former NSA contractor Edward Snowden. According to Dutch newspaper NRC Handelsblad, documents leaked by Snowden showed that the NSA hacked the networks and installed malware. The attacks are orchestrated by a department known as TAO (Tailored Access Operations).
The paper reported that the information came from a management presentation from last year that outlined how the NSA collects information. The malware attacks are referred to as Computer Network Exploitation (CNE).
“One example of this type of hacking was discovered in September 2013 at the Belgium telecom provider Belgacom,” according to the paper. “For a number of years the British intelligence service – GCHQ – has been installing this malicious software in the Belgacom network in order to tap their customers’ telephone and data traffic. The Belgacom network was infiltrated by GCHQ through a process of luring employees to a false Linkedin page.”
The leaked material also said that the NSA has access to Internet cables at 20 separate locations around the world. The NSA declined to comment to NRC Handelsblad on the report.
The Snowden leaks have touched off talk of reforms in regards to how the NSA conducts electronic surveillance. The agency’s critics have been calling for the NSA’s ability to collect data such as phone and email records to be curtailed. It has also spurred many organizations such as Yahoo and Google to expand their use of encryption to protect communications.
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
- UK Car Retailer Arnold Clark Hit by Ransomware
- Dealing With the Carcinization of Security
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Cyber Insights 2023 | Supply Chain Security
- Cyber Insights 2023 | Regulations
