Syrian Social Hack Co-Opts Fighter's Computers 71
hij (552932) writes "The BBC is reporting that Syrian government forces used a social hack to gain access to opposing forces computers. By acting like women sympathetic to their cause they were able to send images laced with malware to the fighters. From the article: "Fake 'femme fatales' have been used to steal battle plans and other data from Syrian opposition groups, a report suggests. The virtual women had been used in text chat on Skype to engage potential victims, security company FireEye said. And data had been stolen via booby-trapped images of the women to whom the victims had believed they had been chatting."
booby-trapped (Score:5, Funny)
Gives a new meaning to the name.
Re: (Score:3)
It's not. https://en.wikipedia.org/wiki/... [wikipedia.org]
Re: (Score:2)
Gives a new meaning to the name.
Yes, in this case, I think we can say, "Literally booby-trapped".
Genesis (Score:3)
It's always a woman's fault.
Re: (Score:2)
It's always a woman's fault.
Even in Eden this wasn't true, Adam knew what he was doing was wrong. Human nature has not changed since then.
Re: (Score:3)
No, it's God's fault. He's omniscient so he knew exactly what was going to happen when he created the tree, the serpent and the fallible humans who wouldn't be able to resist the temptation, but he went ahead and did it anyway. It was a goddamned setup from the very beginning.
Re: (Score:2)
I always suspected the same thing.
Re: (Score:1)
Honey Dicked (Score:2, Funny)
Honey Dicked
Re: (Score:2)
LOL only noteworthy phrase to come out of that movie.
so THAT'S what's wrong with my computer (Score:2, Funny)
who still falls for this picture.jpg.exe nonsense? (Score:5, Interesting)
A random stranger sends you an executable file and tells you it's their picture. Go ahead, click on it.
Yeah, seems legit. Come on.
Anyone who falls for such transparent hacking attempts deserves what they get.
Re:who still falls for this picture.jpg.exe nonsen (Score:5, Informative)
Lots of people do. it's called Dancing Pigs (or rabbits) [wikipedia.org] and is probably the biggest security hole in computing today.
We like to complain about Apple's walled garden and such, but such a security model isn't governed from Jobs' ass - it came from deep understanding that humans are vulnerable, and most malware attacks take advantage of that vector. From sending seniors "hey, I'm your nephew, send me $100" scams to "I'm trapped in London, wire me $2000 for a plane ticket" sent to friends.
It doesn't take much to go beyond that - just get the person's trust and you can accomplish a lot. It's a lot more like spear phishing than anything - the user trusts the source and the guard goes down. Hell, I'm sure if you did a survey, most parents would click on an attachment if it appeared to be sent from their children, especially if said child works in IT. Perhaps even your parents will think "well, if he sent it, it must be something I need to do".
Re:who still falls for this picture.jpg.exe nonsen (Score:5, Interesting)
One of my E-mail accounts (relegated to being the spam/swill account with filters to scoop up anything from the sources I might use) that has been around since the 1990s still gets plenty of those, either "foo.jpg.exe or "foo.jpg .exe" with plenty of spaces between the two.
Part of why this happens is the Dancing Bunnies hole. The receiver really wanted to see what the sender wanted to send, so ignored common sense.
I've had this happen, when I thought the other person decided to have an auto-extracting document. Since it wasn't confidential, I uploaded the executable to virustotal, found that others had uploaded the same thing, it was a known Trojan. End of story. Had I still been unsure, I'd have put it in a virtual machine that is isolated from any physical network as a sandboxed user with zero privs. This, I do sometimes if I need to download some program from a download mirror, one notorious for wrapping the installer with their own scumware, so I can pull out the actual program installer out of the archive. The scumware happily installs and seizes control of the VM, but I then can use the extracted original files on a clean VM after I roll back to a known good snapshot.
The best defense we have against malware is virtualization. Infecting a machine is relatively easy. Jumping out and nailing the hypervisor or the bare metal... not so much.
Re: (Score:2)
When attacking an organisation, you can rely on luck. Send your dancing pigs to a hundred people. 99 will see it as a scam. One will open it - and that one is all you need to get in. Even if it's just one of the cleaning staff, it's an opening you can use to search for exploitable vulnerabilities.
Re: (Score:2, Interesting)
According to the second link (PDF warning) it was "picture.pif" which was just a renamed self-extracting RAR containing both a photo and a RAT payload.
Now how many people - nerds included - could tell you what a .pif is off the top of their head? Admit it, plenty of you (myself included) would have to look it up because it's probably not something we encounter every day. The real difference between someone who falls for it and someone who won't is that the latter will think "If I don't recognize it I'm not
Re: (Score:2)
Re: (Score:2)
Program Information File. Used by Windows 3.x to control the DOS VM for running DOS programs in Windows. I believe they were also used by Windows 9x, but were much obscured by the UI.
Re:who still falls for this picture.jpg.exe nonsen (Score:4, Funny)
Doesn't even need to be that sophisticated. I was dealing with one of these "Fake women" once who I was stringing along because I knew it was a scam and so it was kind of fun to toy with the scammer.
It was simple, I uploaded a random picture to a webserver I controlled and told "her" to check it out and when I saw her reply without any logs on my server, I asked a question that would require looking at the photo to answer.... bingo.
I waited a few more minutes of chat while I looked up the IP registration info and shocked "her" by revealing I knew "she" was in Nigeria. Oh that was funny.
Soon after the game changed, and now he wanted to recruit me to remail packages. Strung him along for many weeks, it was kind of a fun hobby for a while.
Re: (Score:2)
Re: (Score:2)
Well this particular "woman" had responded to an ad I put out looking for roomates. The moment she said she wanted to send a money order I knew what the scam was ad I put the ad right back up, but I was kind of pissed because I took the ad down for a day before "she" gave it away.
Re: (Score:1)
The people that fall for it are the ones that have their windows set to the default of hiding file extensions. So what they see is "picture.jpg" If they don't notice the picture icon next to it that would be the same as a .exe, then they fall for it.
Really not that innovative for an attack. I'm surprised people still fall for it - but I guess timing is everything with it.
Re: (Score:3)
So what they see is "picture.jpg" If they don't notice the picture icon next to it that would be the same as a .exe, then they fall for it.
Actually it will show the embedded icon from the .exe which can easily be set to look like a picture file.
But what has always confused me is the filename actually shows as "picture.jpg", while an actual picture.jpg would show as just "picture", right? Therefore it should still be possible to distinguish them because a real one does not have ".jpg". Though I can imagine
Re: (Score:2)
Anyone who falls for such transparent hacking attempts deserves what they get.
Well, considering that these are people who are willing to risk their lives to fight against the government, possibly having been recruited by social engineering, they might not be the sort of people who give a crap about risk. Or to put it another way, having a lot of balls may make them more susceptible to booby traps (now featuring real boobies!).
Also, forgive me if I don't cheer for either side, when one side is the oppressive dictators favoring an unpopular secular/Shi'ite religious view, and the other
Re: (Score:2)
Anyone who falls for such transparent hacking attempts deserves what they get.
Yeah, it's not like some major operating system hides file extensions by default or anything. Come on!
Re: (Score:2)
Of course, this was the 90s and people didn't have their guard up on the net as much back then, I suppose. Still, it accounted for many hours of hilarity, back in the day. Surprised people would still fall for it, almost 20 years later.
In related news... (Score:5, Funny)
If you want to see a sexy shot of my ankle (Score:4, Funny)
"I'll lift my burka slightly if you'll click on this exe file"
"Okay, sexy girl. But I should warn you that afterwards there is a good chance I'm going to stone you to death for being a whore."
As usual (Score:1)
Re: (Score:2)
You say that like you don't realise these extremist consider modern western culture to be the enemy.
Re: (Score:2)
Not computers, but Windows computers, please! And any foreign forces that are using computers and software made by the enemy, and expect there are no backdoors, are retards. This is so simple a kid should understand it. Probably they choose more carefully their pants and their haircut than their computers and their choice of operating system.
As usual, I would like to thank the moderators for the censorphip and moderating on opinion, and not using points to mod up relevant conversations. Slashdot stinks.
Doesn't matter how 'religious' these guys are (Score:2)
The porn will get 'em every time. An exploit that is very difficult to patch without employing a most unpalatable procedure.
Re:Doesn't matter how 'religious' these guys are (Score:4, Insightful)
The porn will get 'em every time. An exploit that is very difficult to patch without employing a most unpalatable procedure.
You mean using Unix?
Re: (Score:2)
We could try just giving everyone a constant, steady stream of pornography? Then the appeal of even more free porn would be lessened.
Re: (Score:2)
Re: (Score:1)
Yes, if it's not for the midnight orgy
Alien vs Predator (Score:2)
Or actual women, something better to do. Works for (Score:2)
Or get them some actual women, so they have something better to do than blow stuff up and get blown up. In one study, this would actually work with crackers - script kiddies greatly lessened their activity after getting a girlfriend. Presumably, the female provided sufficient motivation to venture out from mom's basement.
Re: (Score:3)
Or get them some actual women, ...
The sad truth is that they actually have women ... enslaved [bbc.com].
Re: (Score:3)
Root for? You must be Australian.
You supply whoever is losing at the moment with a few extra rounds. Maintain the stalemate. See also Iran/Iraq under Reagan.
Re: (Score:2)
Fully agree w/ you - and yeah, Iran/Iraq was a good model. The US supporting Iraq via Egypt, and Iran via Israel. Syria (Hizbullah) vs ISIS would be another.
No, I'm not Australian
Re: (Score:2)
That was a joke. Rooting for someone means something different down there.
Must be all the blood pooling in their heads.
Re: (Score:2)
Images laced wth malware? (Score:1)
Re: (Score:2)
And they learned this from... (Score:2)