AAPL Stock: 109.5 ( -1.28 )

Printed from

Snowden: NSA used false Facebook servers for malware implantation

updated 02:04 pm EDT, Wed March 12, 2014

NSA shifting from personal hack to 'industrial scale' widespread attacks

Recently-examined Snowden-leaked documents have shown that the NSA is looking at significantly growing its ability to install malware on a large scale, using automated systems and falsified websites. The documents detail efforts to fake a Facebook server, with the targeted population infected upon visitation of the spoof site.

The delivered payload has been used to record video and audio from an infected computer, and covertly deliver it to NSA servers. Additionally, remote attacks are possible -- such as corrupting files, or redirecting the infected computer to other spoofed sites run by intelligence services.

The proposed large-scale system, dating back to 2009, has been named "Turbine" by the NSA and is designed for "industrial-scale exploitation." The documents claim that it allows "the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually."

Another Snowden document declares the Turbine program's intent to "increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants." It is believed by Firstlook to have infected between 80,000 and 100,000 devices.

Also part of the NSA's offensive hacking initiative is the targeting of system operators. In an internal document released by Snowden, an operative claims that "sysadmins are a means to an end" with a compromised administrator making it easier to get to other persons of interest on the managed system.

Firstlook spoke with a Facebook spokesman about the allegations of false servers masquerading as the social media powerhouse. Spokesman Jay Nancarrow stated that there was "no evidence of this alleged activity" but noted that any site could be susceptible to the reported NSA tactics. Nancarrow noted that "if government agencies indeed have privileged access to network service providers, any site running only HTTP could conceivably have its traffic misdirected."

How the NSA Secretly Masqueraded as Facebook to Hack Computers for Surveillance from First Look Media on Vimeo.

by MacNN Staff



Login Here

Not a member of the MacNN forums? Register now for free.


Network Headlines

Follow us on Facebook


Most Popular


Recent Reviews

Polk Hinge Wireless headphones

Polk, a company well-established in the audio market, recently released a new set of headphones aimed at the lifestyle market. The Hin ...

Blue Yeti Studio

Despite being very familiar with Blue Microphones' lower-end products -- we've long recommended the company's Snowball line of mics ...

ZTE Spro 2 Smart Projector

Home theaters are becoming more and more accessible these days, but maybe you've been a bit wary about buying a home projector. And h ...


Most Commented