How ‘honey trap’ hackers stole Syrian rebel war plans

&MaxW=640&imageVersion=default&AR-150209757

Source: National Cyber Security – Produced By Gregory Evans

BEIRUT // Hackers targeted Syrian opposition members with online “honey traps,” posing as female supporters to steal battle plans and the identity of defectors. A report released on Monday by US cybersecurity firm FireEye describes how the hacking operations in late 2013 and early 2014 targeted Syrian opposition fighters, media activists and humanitarian aid workers. The company said it was unclear whether the information had been passed onto the Syrian government, and who the hackers were. But the hacked material included a detailed opposition military plan to recapture the town of Khirbet Ghazaleh, strategically located in southern Daraa province, in 2013. “The hackers stole a cache of critical documents and Skype conversations revealing the Syrian opposition’s strategy, tactical battle plans, supply needs, and troves of personal information and chat sessions,” the report said. The hacking provided “actionable military intelligence for an immediate battlefield advantage” in the case of the planned Khirbet Ghazaleh attack, capturing “the type of insight that can thwart a vital supply route, reveal a planned ambush and identify and track key individuals.” Despite the high-tech tools used in the attack, the hackers also relied on a well-worn tactic: the “honey trap.” Targets were contacted on the online […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post How ‘honey trap’ hackers stole Syrian rebel war plans appeared first on National Cyber Security.

View full post on National Cyber Security

Exit mobile version