Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Government Communications Security Your Rights Online

Syrian Government Uses Skype To Push Malware To Activists 139

judgecorp writes "The Syrian government is using Skype as a channel to infect activists' systems with malware, installing Trojans and backdoors, according to security firm F-Secure. The evidence comes from a hard drive sent for analysis. 'The activist's system had become infected as a result of a Skype chat. The chat request came from a fellow activist. The problem was that the fellow activist had already been arrested and could not have started the chat. Initial infection occurred when the activist accepted a file called MACAddressChanger.exe over the chat. This utility was supposed to change the hardware MAC address of the system in order to bypass some monitoring tools. Instead, it dropped a file called silvia.exe which was a backdoor — a backdoor called "Xtreme RAT." Xtreme Rat is a full-blown malicious Remote Access Tool.'"
This discussion has been archived. No new comments can be posted.

Syrian Government Uses Skype To Push Malware To Activists

Comments Filter:
  • by girlintraining ( 1395911 ) on Friday May 04, 2012 @01:12PM (#39892359)

    When the file comes from a trusted source, it's not stupid. You have to trust someone eventually; The OS manufacturer (ie, Apple, Microsoft, etc.), the distributor (the person making the DVDs), etc. Trusting a friend isn't stupid, it's what most people would do. That's exactly why so many different worms try to propagate using a person's address book; Human trust networks.

    It was only stupid that he didn't scan the file first, not that he accepted the download. And if said malware is custom-designed, it wouldn't be in any anti-malware/anti-virus definitions, and so he could do everything right and still wind up screwed. How many governments have asked that their malware not be added to the definition files again? ALL OF THEM.

  • by headhntr ( 2612991 ) on Friday May 04, 2012 @01:24PM (#39892555)
    This F-Secure post is not news. The EFF wrote this up on March 5th: https://www.eff.org/deeplinks/2012/03/how-find-syrian-government-malware-your-computer-and-remove-it [eff.org]
  • by Kjellander ( 163404 ) on Friday May 04, 2012 @01:53PM (#39892935)

    In order for this not to happen again do the following:

    Stop using Windows and MacOSX.
    Download and install Fedora F16.
    When installing, encrypt the harddrive with a really hard to break password.
    Install pidgin and off the record like this: 'yum install pidgin pidgin-otr'
    Generate keys and verify them before communicating.
    Be _very_ careful if who you usually talks to changes their key, they might have been arrested.
    Never ever communicate in the clear.

    Using this strategy you will not be immune, rubber-hose-cryptanalysis with still defeat this. Also you can be tracked so your oppresive government can see that you communicate, they will just not be able to read what you are saying. And not using major OSes will keep you away from the most common exploits and trojans.

    Also, try to use TOR, HTTPS-everywhere and other good tools.

    References:
    https://fedoraproject.org/ [fedoraproject.org]
    http://fr2.rpmfind.net//linux/RPM/fedora/16/x86_64/pidgin-otr-3.2.0-4.fc15.x86_64.html [rpmfind.net]
    http://www.cypherpunks.ca/otr/ [cypherpunks.ca]

    Good luck.

  • by Hatta ( 162192 ) on Friday May 04, 2012 @02:22PM (#39893315) Journal

    Anonymity is valued by the participants, who often exchange contact information under pseudonyms. Crytographically signing things means verifying the participants identity

    You don't have to completely identify yourself to get a benefit from cryptographic signatures. All you really need to know is that the Ahmed you corresponded with today is the same Ahmed you corresponded with last week. To do that, all you need to know is that the key used today is the same key that was used last week. This trivial precaution would have protected against this attack.

    These guys aren't anonymous, they're pseudonymous. The key can be their pseudonym without compromising their actual identity in any way.

Make sure your code does nothing gracefully.

Working...