{"id":57687,"date":"2015-02-18T00:47:48","date_gmt":"2015-02-18T05:47:48","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/how-omnipotent-hackers-tied-to-nsa-hid-for-14-years\/"},"modified":"2015-02-18T00:47:48","modified_gmt":"2015-02-18T05:47:48","slug":"how-omnipotent-hackers-tied-to-nsa-hid-for-14-years","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/how-omnipotent-hackers-tied-to-nsa-hid-for-14-years\/","title":{"rendered":"How omnipotent hackers tied to NSA hid for 14 years &#8230;"},"content":{"rendered":"<p><p>    Aurich Lawson  <\/p>\n<p>    CANCUN, Mexico In 2009, one or more prestigious    researchers received a CD by mail that contained pictures and    other materials from a recent scientific conference they    attended in Houston. The scientists didn't know it then, but    the disc also delivered a malicious payload developed by a    highly advanced hacking operation that had been active since at    least 2001. The CD, it seems, was tampered with on its way    through the mail.  <\/p>\n<p>    It wasn't the first time the operatorsdubbed the \"Equation    Group\" by researchers from Moscow-based Kaspersky Labhad    secretly intercepted a package in transit, booby-trapped its    contents, and sent it to its intended destination. In 2002 or    2003, Equation Group members did something similar with an    Oracle database installation CD in order to infect a different    target with malware from the group's extensive library.    (Kaspersky settled on the name Equation Group because of    members' strong affinity for encryption algorithms, advanced    obfuscation methods, and sophisticated techniques.)  <\/p>\n<p>    Kaspersky researchers have documented 500 infections by    Equation Group inat least 42 countries, with Iran,    Russia, Pakistan, Afghanistan, India, Syria, and Mali topping    the list. Because of a self-destruct mechanism built into the    malware, the researchers suspect that this is just a tiny    percentage of the total; the actual number of victims likely    reaches into the tens of thousands.  <\/p>\n<p>    A long list of almost superhuman technical feats    illustrateEquation Group's extraordinary skill,    painstaking work, and unlimited resources. Theyinclude:  <\/p>\n<p>    Taken together, the accomplishments led Kaspersky researchers    to conclude that Equation Group is probably the most    sophisticated computer attack group in the world, with    technical skill and resources that rival the groups that    developed     Stuxnet and theFlame    espionage malware.  <\/p>\n<p>    \"It seems to me Equation Group are the ones with the coolest    toys,\" Costin Raiu, director of Kaspersky Lab's global research    and analysis team, told Ars. \"Every now and then they share    them with the Stuxnet group and the Flame group, but they are    originally available only to the Equation Group people.    Equation Group are definitely the masters, and they are giving    the others, maybe, bread crumbs. From time to time they are    giving them some goodies to integrate into Stuxnet and Flame.\"  <\/p>\n<p>    In an     exhaustive report published Monday at the Kaspersky Security Analyst    Summit here, researchers stopped short of saying Equation    Group was the handiwork of the NSAbut they provided detailed    evidence that strongly implicates the US spy agency.  <\/p>\n<p>    First is the group's known aptitude for conducting interdictions,    such as     installing covert implant firmware in a Cisco Systems    router as it moved through the mail.  <\/p>\n<p>    Second, a highly advanced keylogger in the Equation Group    library refers to itself as \"Grok\" in its source code. The    reference seems eerily similar to a line published last March    in an Intercept article headlined \"How    the NSA Plans to Infect 'Millions' of Computers with    Malware.\" The article, which was based on Snowden-leaked    documents, discussed an NSA-developed keylogger called Grok.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original:<br \/>\n<a target=\"_blank\" href=\"http:\/\/arstechnica.com\/security\/2015\/02\/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last\/\" title=\"How omnipotent hackers tied to NSA hid for 14 years ...\">How omnipotent hackers tied to NSA hid for 14 years ...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Aurich Lawson CANCUN, Mexico In 2009, one or more prestigious researchers received a CD by mail that contained pictures and other materials from a recent scientific conference they attended in Houston. The scientists didn't know it then, but the disc also delivered a malicious payload developed by a highly advanced hacking operation that had been active since at least 2001.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/how-omnipotent-hackers-tied-to-nsa-hid-for-14-years\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-57687","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/57687"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=57687"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/57687\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=57687"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=57687"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=57687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}