Pakistan News Service

Wednesday Nov 20, 2019, Rabi-al-awwal 22, 1441 Hijri
Logo
LATEST :
Pakistan News Home -> Top -> News Details

NSA spied on civil-military leadership in Pakistan using malware

22 August, 2016

  Related News  
Blood for blood: Tahirul Qadri
Afghan protesters stormed Bab-e-Dosti
  More on this View All

WASHINGTON: The United States' clandestine National Security Agency (NSA) allegedly spied on top civil-military leadership in Pakistan using malware, The Intercept reported. Malware SECONDDATE allegedly built by the NSA was used by agency hackers to breach "targets in Pakistan's National Telecommunications Corporation's (NTC) VIP Division", which contained documents pertaining to "the backbone of Pakistan's Green Line communications network" used by "civilian and military leadership", according to an April 2013 presentation document obtained by The Intercept.

The file appears to be a 'top secret' presentation originating from the NSA's SigDev division. SECONDDATE is described as a tool that intercepts web requests and redirects browsers on target computers to an NSA web server. The server then infects the web requests with malware.

The malware server, also known as FOXACID, has been described in earlier leaks made by former NSA contractor Edward Snowden. SECONDDATE, however, is just one method the NSA allegedly uses to redirect a target's browser to the FOXACID server. Others involve exploiting bugs in commonly used email providers by sending spam or malicious links that lead to the server, The Intercept said.

Another document obtained by The Intercept, an NSA Special Source Operations division newsletter describes how agency software other than SECONDDATE was used to repeatedly direct targets in Pakistan to the FOXACID servers to infect target computers.

The Intercept confirmed the "authenticity" of the SECONDDATE malware by means of a data leak reportedly made by Snowden. Snowden released a classified top-secret agency draft manual for implanting malware which instructs NSA operators to track their use of a malware programme through a 16-character string - the same string which appears in the SECONDDATE code leaked by a group called ShadowBrokers. ShadowBrokers last week announced that SECONDDATE was part of a group of NSA-built 'cyber weapons' that it was auctioning off. Although it is unclear how the code for the software leaked and was obtained by ShadowBrokers, The Intercept claims "the malware is covered with NSA's virtual fingerprints and clearly originates from the agency".

 What do you think about the story ? Leave your comments!

Heading (Optional)
Your Comments: *

Your Name:*
E-mail (Optional):
City (Optional):
Country (Optional):
 
 
Field marked(*) are mandatory.
Note. The PakTribune will publish as many comments as possible but cannot guarantee publication of all. PakTribune keeps its rights reserved to edit the comments for reasons of clarity, brevity and morality. The external links like http:// https:// etc... are not allowed for the time being to be posted inside comments to discourage spammers.

  Speak Out View All
Military Courts
Imran - Qadri long march
 
Candid Corner
Exclusive by
Lt. Col. Riaz Jafri (Retd)
Pakistan itself a victim of state-sponsored terrorism: Qamar Bajwa
Should You Try Napping During the Workday?
Suggested Sites