gutui Posted January 22, 2018 Report Posted January 22, 2018 The EFF and Lookout are reporting on a new piece of spyware operating out of Lebanon. It primarily targets mobile devices compromised by fake secure messaging clients like Signal and WhatsApp. From the Lookout announcement: Dark Caracal has operated a series of multi-platform campaigns starting from at least January 2012, according to our research. The campaigns span across 21+ countries and thousands of victims. Types of data stolen include documents, call records, audio recordings, secure messaging client content, contact information, text messages, photos, and account data. We believe this actor is operating their campaigns from a building belonging to the Lebanese General Security Directorate (GDGS) in Beirut. It looks like a complex infrastructure that's been well-developed, and continually upgraded and maintained. It appears that a cyberweapons arms manufacturer is selling this tool to different countries. From the full report: Dark Caracal is using the same infrastructure as was previously seen in the Operation Manul campaign, which targeted journalists, lawyers, and dissidents critical of the government of Kazakhstan. There's a lot in the full report. It's worth reading. via Bruce Schneier Quote
QuoVadis Posted January 22, 2018 Report Posted January 22, 2018 repost. am postat mai jos cu 2 1 Quote
eubest Posted January 22, 2018 Report Posted January 22, 2018 (edited) Dark Caracal you say? Fucking Africans Edited January 22, 2018 by eubest Quote
gutui Posted January 22, 2018 Author Report Posted January 22, 2018 1 hour ago, QuoVadis said: repost. am postat mai jos cu 2 mea culpa. Quote