The best paid proxy service which offers you both user&pass and IP authentication methods. Select the method you prefer.

Proxy Locations
US
CA
UK
FR
RU
DE
RO
NL
TR
LV
Craigslist
Facebook
Google
Pinterest
Ticketmaster
Twitter
Yahoo
Youtube and
other web sites
YOU CAN USE OUR PROXY SERVERS AT:
Money back
Guarantee

Beebus Just Won’t Die

Posted on: May 21st, 2013

Beebus Just Won’t DieThere’s been a lot of concern over the presence and use of unmanned drones in warfare and intelligence gathering. For some the concern is over Fourth Amendment rights and the authority that the government has the right to assassinate their target with deadly missiles on US soil. One chief concern that has only recently cropped up is the idea of a US drone being hacked by foreign nationals or terrorists and used against the very people who have authorized their use. Researchers have discovered attempts by factions in China’s People Liberation Army to use malware and phishing attacks to gain access to sensitive information about these drones.

Researchers dubbed this effort, Operation Beebus. They recently discovered two more malware that were associated with the concerted attack. Prior to this, they had discovered two malware seemingly delivered via a phony White House holiday greeting from the Obama family that was sent to government officials that are connected to the drone program. James Bennett, lead researcher for the FireEye Company that discovered these malware problems says that there is evidence of coordinated attacks against 12 different organizations in India and in the United States. Another phishing attempt was made using decoy documents regarding the unmanned drone vehicle industry in Pakistan.

Once clicked, this malware, nicknamed “Mutter” creates a backdoor to infected systems to allow remote servers to log in, see key stroke patterns and to send this information to the hacker. The sneaky part of “Mutter” is that it lies dormant for long periods of time, fooling the malware analysis systems into believing that its presence is benign. To date, “Mutter” has not stopped sending communications out, but once the information is sent, it lies dormant once again. This makes detecting which networks have it very difficult. According to one study, 95% of these attacks originate from China.


You can follow any responses to this entry through the RSS 2.0 feed.

AddThis Social Bookmark Button

Leave your comment