It ’s kind of the old magic in the book . Catfishing is where you pretend to be someone you ’re not online so that you’re able to pull a fast one on someone else into doing something . And based on a new reputation , this is exactly how pro - Assad hackers have been robbing intel from opposition forces : They ’ve beenposing as hot girls on Skypeand slip battle plan from the Syrian Johnny Reb United States Army .

The security research business firm FireEye just published the details of a years - tenacious investigation called “ Behind the Syrian Conflict ’s Digital Frontlines . ” The report trace how pro - Assad forces used catfishing method acting to establish malware on the phones and data processor of Syrian Johnny Reb , and then carry on to slip at least 7.7 G deserving of information from some 12,356 contacts in at least eight countries . That ’s a lot of information .

The operation voice almost surgical . The hackers would create faux profiles on Skype or Facebook that included a country - appropriate name and a “ femme fatale ” avatar . They ’d then initiate touch and rapidly find out if the victim was using a smartphone or a computer , bed this would enable them to send the right-hand malware .

Sonos Speaker Move 2

After developing a resonance with the victim through small talk , they ’d ask to swap photos :

HACKER : Are you opening it on your Mobile River ?

IMAN : Computer and mobile

Apple2025macbookairm4

IMAN : … What is your particular date of birth ?

HACKER : 10 - 3 - 88

IMAN : Lololol

Second Screen Portable 15 Monitor

IMAN : 10 - 3 - 89 …… .

TARGET : What a nice coincidence

TARGET : [ air File New-Imam-Picture.pif ]

Hp 17 Touchscreen Laptop

surprisal ! The hacker ’s photo is a fake , and it ’s full of malware that gave attacker full access to the victim ’s information processing system , including valuable military intelligence . ( Apparently , Syrian freedom fighter forces would keep pic of battle plans on their telephone and laptop . ) What kinds of intel ? All variety :

Sometimes , the menace group would take whole sets of files pertaining to approaching large - scale military operations . These included correspondence , rosters , comment artificial satellite double , conflict map , orders of battle , geographic co-ordinate for attacks , and lists of weapon from a reach of fighting group .

The New York Timesdetails at least one key battlethat appears to have been thrwarted by hacking - related activeness . fundamentally , the rebels had plan to take a reaching of highway , but they never convey out the attack . It was give away in the security research that pro - Assad hackers had stolen much of the Johnny ’ plans ahead of the battle . In a sensation , this is a peek into the time to come of warfare . [ FireEye , NYT , CNBC ]

How To Watch French Open Live On A Free Channel

Image via AP

CybersecurityCyberwarHackersHackingInfosecSecuritySkype

Daily Newsletter

Get the best technical school , skill , and acculturation news in your inbox daily .

News from the future , bear to your present .

You May Also Like

Hostinger Coupon Code 15% Off

Burning Blade Tavern Epic Universe

Ideapad3i

Sonos Speaker Move 2

Apple2025macbookairm4

Second Screen Portable 15 Monitor

Hp 17 Touchscreen Laptop

Polaroid Flip 09

Feno smart electric toothbrush

Govee Game Pixel Light 06

Motorbunny Buck motorized sex saddle review