gutui Posted January 22, 2018 Report Share Posted January 22, 2018 The EFF and Lookout are reporting on a new piece of spyware operating out of Lebanon. It primarily targets mobile devices compromised by fake secure messaging clients like Signal and WhatsApp. From the Lookout announcement: Dark Caracal has operated a series of multi-platform campaigns starting from at least January 2012, according to our research. The campaigns span across 21+ countries and thousands of victims. Types of data stolen include documents, call records, audio recordings, secure messaging client content, contact information, text messages, photos, and account data. We believe this actor is operating their campaigns from a building belonging to the Lebanese General Security Directorate (GDGS) in Beirut. It looks like a complex infrastructure that's been well-developed, and continually upgraded and maintained. It appears that a cyberweapons arms manufacturer is selling this tool to different countries. From the full report: Dark Caracal is using the same infrastructure as was previously seen in the Operation Manul campaign, which targeted journalists, lawyers, and dissidents critical of the government of Kazakhstan. There's a lot in the full report. It's worth reading. via Bruce Schneier Quote Link to comment Share on other sites More sharing options...
QuoVadis Posted January 22, 2018 Report Share Posted January 22, 2018 repost. am postat mai jos cu 2 1 Quote Link to comment Share on other sites More sharing options...
eubest Posted January 22, 2018 Report Share Posted January 22, 2018 (edited) Dark Caracal you say? Fucking Africans Edited January 22, 2018 by eubest Quote Link to comment Share on other sites More sharing options...
gutui Posted January 22, 2018 Author Report Share Posted January 22, 2018 1 hour ago, QuoVadis said: repost. am postat mai jos cu 2 mea culpa. Quote Link to comment Share on other sites More sharing options...