{"id":175820,"date":"2015-01-20T06:01:24","date_gmt":"2015-01-20T11:01:24","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/report-nsa-not-only-creates-but-also-hijacks-malware.php"},"modified":"2015-01-20T06:01:24","modified_gmt":"2015-01-20T11:01:24","slug":"report-nsa-not-only-creates-but-also-hijacks-malware","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/report-nsa-not-only-creates-but-also-hijacks-malware.php","title":{"rendered":"Report: NSA not only creates, but also hijacks, malware"},"content":{"rendered":"<p><p>    In addition to having its own    arsenal of digital weapons, the U.S. National Security Agency    reportedly hijacks and repurposes third-party malware.  <\/p>\n<p>    The NSA is using its network    of servers around the world to monitor botnets made up of    thousands or millions of infected computers. When needed, the    agency can exploit features of those botnets to insert its own    malware on the already compromised computers, through a    technology codenamed Quantumbot, German new magazine Der    Spiegel     reported Sunday.  <\/p>\n<p>    One of the secret    documents leaked by former NSA contractor Edward Snowden    and published by Der Spiegel contains details about a covert    NSA program called DEFIANTWARRIOR thats used to hijack botnet    computers and use them as pervasive network analysis vantage    points and throw-away non-attributable CNA [computer network    attack] nodes.  <\/p>\n<p>    This means that if a users    computer is infected by cybercriminals with some malware, the    NSA might step in, deploy their own malware alongside it and    then use that computer to attack other interesting targets.    Those attacks couldnt then be traced back to the NSA.  <\/p>\n<p>    According to the leaked    document, this is only done for foreign computers. Bots that    are based in the U.S. are reported to the FBI Office of Victim    Assistance.  <\/p>\n<p>    The NSA also intercepts and    collects data that is stolen by third-party malware programs,    especially those deployed by other foreign intelligence    agencies, if it is valuable. It refers to this practice as    fourth party collection.  <\/p>\n<p>    In 2009, the NSA tracked a    Chinese cyberattack against the U.S. Department of Defense and    was eventually able to infiltrate the operation. It found that    the Chinese attackers were also stealing data from the United    Nations so it continued to monitor the attackers while they    were collecting internal UN data, Der Spiegel reported.  <\/p>\n<p>    It goes deeper than that. One    leaked secret document contains an NSA workers account of    a case of    fifth party collection. It describes how the NSA    infiltrated the South Korean CNE (computer network    exploitation) program that targeted North Korea.  <\/p>\n<p>    We found a few instances    where there were NK officials with SK implants on their boxes,    so we got on the exfil [data exfiltration] points, and sucked    back the data, the NSA staffer wrote in the document.    However, some of the individuals that SK was targeting were    also part of the NK CNE program. So I guess that would be the    fifth party collect you were talking about.  <\/p>\n<p>    In other words, the NSA spied    on a foreign intelligence agency that was spying on a different    foreign intelligence agency that had interesting data of its    own.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to see the original: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.pcworld.com\/article\/2872252\/report-nsa-not-only-creates-but-also-hijacks-malware.html\/RK=0\/RS=08Ua4zlfHkBmvK2moMT_wRFt4To-\" title=\"Report: NSA not only creates, but also hijacks, malware\">Report: NSA not only creates, but also hijacks, malware<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> In addition to having its own arsenal of digital weapons, the U.S. National Security Agency reportedly hijacks and repurposes third-party malware. The NSA is using its network of servers around the world to monitor botnets made up of thousands or millions of infected computers.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/report-nsa-not-only-creates-but-also-hijacks-malware.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-175820","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/175820"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=175820"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/175820\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=175820"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=175820"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=175820"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}