British spies used fake LinkedIn, Slashdot pages to tap telco

By

Quantum Insert tool used.

British intelligence agency GCHQ used fake Slashdot and LinkedIn pages to foist malware on employees of Belgium's largest  telecom company to spy on the company.

British spies used fake LinkedIn, Slashdot pages to tap telco

Der Spiegel reported in documents leaked by whistleblower Edward Snowden that the agency targeted Belgacom which was previously revealed to have been the victim of a years-long espionage campaign linked to the National Security Agency (NSA).

Victims were reportedly lured to GCHQ's malware as they perused LinkedIn profiles and tech news site Slashdot.

The agency used so called Quantum Insert technology that made use of high-speed servers located at “key internet switching points” that foisted the phishing pages over the original page.

Using the method, GCHQ was also able to “deeply infiltrate" Belgacom's subsidiary BICS, which operates a GRX router system that allows users to make calls and browsing the web via their mobile devices while abroad. 

LinkedIn told the paper it did "not sanction the creation or use of fake LinkedIn profiles or the exploitation of its platform for the purposes alleged" by the paper.

In the mission, called “Operation Socialist,” Switzerland-based billing companies, Comfone and Mach, were also targeted with the sophisticated exploitation tool.

This article originally appeared at scmagazineus.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

India's alarm over Chinese spying rocks CCTV makers

India's alarm over Chinese spying rocks CCTV makers

Victoria's Secret pulls down website amid security incident

Victoria's Secret pulls down website amid security incident

China blamed after cyberattack hits Czech Republic

China blamed after cyberattack hits Czech Republic

Cyber companies hope to untangle weird hacker codenames

Cyber companies hope to untangle weird hacker codenames

Log In

  |  Forgot your password?