- Twitter lifts ‘permanent’ suspension of activist Barrett Brown Monday 5:52 PM
- Billie Eilish fans fend off objectifying comments on tank top photo Monday 5:32 PM
- Groom’s mother sabotages wedding by tricking guests into wearing jorts and hoodies Monday 4:39 PM
- No one believes Bill de Blasio’s son sent him these debate prep texts Monday 3:26 PM
- Meek Mill, Jay-Z to release ‘Free Meek’ documentary on Amazon Prime Monday 3:20 PM
- 3 ways to secure your Nest cameras Monday 3:15 PM
- This Pokémon generator site is creating hilarious monsters Monday 2:48 PM
- MrBeast impersonator tricks kid into destroying his XBox Monday 12:50 PM
- This mom has the perfect nickname for her nonbinary kid Monday 12:25 PM
- Netflix tests pop-out player that will allow viewers to multitask Monday 11:44 AM
- Man allowed to sue media publishers over readers’ Facebook comments Monday 11:42 AM
- Republicans slammed for joke about ‘heavily armed militia’ at Oregon statehouse Monday 11:30 AM
- New bill wants tech companies to tell you how much your data is worth Monday 10:53 AM
- AOC has the best response to Steve King’s ‘concentration camp’ criticism Monday 10:19 AM
- Did Jake Paul and Tana Mongeau just get engaged? Monday 9:26 AM
And they’re using U.S. companies to do it.
Pro-Assad hackers in civil war–torn Syria are targeting military opponents using increasingly sophisticated malware and social engineering attacks, a new report from the Electronic Frontier Foundation and Citizen Lab revealed.
Internet-based attacks by supporters of Syrian president Bashar al-Assad were observed as early as 2011. According to the report’s findings, the hackers used a combination of social media manipulation, malware, and remote-access devices in order to trick opposition fighters into giving them access to their computers. With this access they can surveil and manipulate the opposition forces.
Here is one telling example: In an email-based attack, the hackers sent out a message with the subject line “Serious video – It shows the malice of al-Assad’s military.” Appearing to have been sent from militant opposition group, this particular email contained a link accompanied by the message “Leaked and very, very, very serious footage. See what happened to a civilian and what the civilian said.” At the other end of the link was graphic video of man “having his throat cut and bleeding to death,” as the EFF described it.
The video, however, turned out to be a decoy. As the user watched it, an executable file installed malware on their computer that allows pro-Assad hackers spy on them by to logging their keystrokes and take screenshots of their computers.
The EFF traced the malware from this and similar emails back to a Mexican company apparently hacked by the attackers.
In another similar attack, Syrian opposition received a message claiming to know the location of pro-Assad troops:
“Very important. For dissemination. [Information about] the military locations which civilians must avoid for their safety. The locations are also where the Islamic Army leadership decided to intensify its attacks with all kinds of weapons because the troops and leaders of al-Assad’s army gather there. [Information about] the important military barricades in the roads used for the [military] supply and where explosions targeting Shabiha barricades might take place. All places are illustrated using photos from Google Earth.”
The report does not specify whether the opposition forces in Syria are using the same tactics. Nevertheless, it gives insight into the increasingly powerful tactics of cyber warfare in Syria, and how those tactics exploit the decentralized, global, anonymous nature of the Internet. Even in this brief summary of the report, notice how major American technology companies like Facebook, YouTube, and even Google play an important (yet unknowing) role in the attacks.
“We urge Syrians to be wary of opening email attachments containing documents or PDFs and to be especially careful when clicking on links in pro-opposition Facebook groups and YouTube pages,” the report concludes.
Photo by Freedom House/Flickr
Joe Kloc is a former Daily Dot contributor who covered technology and policy. He's contributed to Newsweek and Mother Jones, discussed his reporting on air with WNYC, and written Weekly Reviews for Harper's Magazine.