请输入您要查询的百科知识:

 

词条 Dark Caracal
释义

  1. References

  2. External links

Dark Caracal is a spyware campaign[1][2] that has been conducted by an unknown group of hackers since at least 2012.[3] The campaign was discovered by the Electronic Frontier Foundation and the mobile security firm Lookout,[1] who published their findings on January 18, 2018.[2] The campaign has mainly used phishing attacks (and in some cases physical access to victims systems[2]) in order to install malicious Android applications, including ones that imitate the look and feel of popular instant messaging applications, on victims systems to gain full control over the devices.[3] No evidence was found that iPhone users have been targeted, and according to Google, none of the malicious applications were found on the Google Play Store.[3] The data allegedly stolen includes documents, call records, text messages, audio recordings, secure messaging client content, browsing history, contact information, photos, location data, and other information that allows the group to identify their targets and have a look at their personal lives.{{cn|date=June 2018}} The component used to monitor Android devices is known as Pallas; the component used to monitor Windows devices is a variant of the Bandook trojan.[9]

The campaign is suspected to be state-sponsored[2] and linked to the Lebanese government's General Directorate of General Security.[2][3][4] According to Reuters, "the researchers found technical evidence linking servers used to control the attacks to a GDGS office in Beirut by locating wi-fi networks and internet protocol address in or near the building."[3] The researchers have said that they are not certain "whether the evidence proves GDGS is responsible or is the work of a rogue employee."[3] The reporting was denied by Major General Abbas Ibrahim.[5]

References

1. ^{{cite web|last1=Newman|first1=Lily Hay|title=Security News This Week: Hacking Group's Mobile Malware Spies on Thousands Worldwide|url=https://www.wired.com/story/hacking-groups-mobile-malware-spies-on-thousands-worldwide/|website=Wired|publisher=Condé Nast|accessdate=21 January 2018|date=20 January 2018}}
2. ^{{Cite news|url=https://www.theregister.co.uk/2018/01/18/dark_caracal_malware/|title=Someone is touting a mobile, PC spyware platform called Dark Caracal to governments|last=Thomson|first=Iain|date=18 January 2018|work=The Register|access-date=2018-01-19|archive-url=|archive-date=|dead-url=|language=en}}
3. ^{{Cite news|url=https://www.theverge.com/2018/1/18/16905464/spyware-lebanon-government-research-dark-caracal-gdgs|title=Researchers have discovered a new kind of government spyware for hire|last=Brandom|first=Russell|date=January 18, 2018|work=The Verge|access-date=2018-01-19|archive-url=|archive-date=|dead-url=}}
4. ^{{Cite news|url=https://www.washingtonpost.com/business/technology/researchers-hacking-campaign-linked-to-lebanese-spy-agency/2018/01/18/1fb36142-fc62-11e7-9b5d-bbf0da31214d_story.html|title=Report links hacking campaign to Lebanese security agency|last=Satter|first=Raphael|date=2018-01-18|work=Washington Post|access-date=2018-01-19|archive-url=|archive-date=|dead-url=|language=en-US|issn=0190-8286}}
5. ^{{cite web|last1=Auchard|first1=Eric|title=Lebanese security agency turns smartphone into selfie spycam: researchers|url=https://www.reuters.com/article/us-lebanon-cyber/lebanese-security-agency-turns-smartphone-into-selfie-spycam-researchers-idUSKBN1F726S|website=Reuters|date=18 January 2018|accessdate=23 January 2018}}

External links

  • [https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf "Dark Caracal; Cyber-espionage at a Global Scale"], technical report by Lookout and the Electronic Frontier Foundation
{{Malware-stub}}{{Espionage-stub}}

1 : Spyware

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/12 3:01:44