Arik Hesseldahl

Recent Posts by Arik Hesseldahl

Malware Attacks by Syrian Pro-Government Hackers Are on the Rise

al-assad

James Gordon/Flickr Creative Commons

When we hear about Syrian hackers working on behalf of the regime of embattled President Bashar al-Assad, we think of the Syrian Electronic Army, the group of digital troublemakers that has hammered the Twitter feeds and websites of several Western media organizations, and has attacked Twitter itself.

But there are lesser-known groups using malware and attacking activists and people sympathetic to Syrian rebels, and according to a report released earlier this week, their activities are on the rise.

I’m a bit late to this, owing to the holiday, but the findings come from security researchers at the University of Toronto’s Citizen Lab and the Electronic Freedom Foundation. Hackers who support the Syrian regime have been documented trying to use malware attacks against journalists, workers at non-governmental organizations and others, using social-engineering techniques and remote-access tools. One in particular is a rare Trojan that attacks Apple’s Mac OS X.

In one case, the attackers were able to seize control of a Facebook page belonging to a pro-opposition group, and to use that power to delete comments warning others not to follow a link that led to a malware download.

In another case, links to Dropbox files accompanying YouTube videos contained malware linked to servers that are known to have been controlled by pro-Assad hackers in the past.

The Mac Trojan, which caught some media attention when it was first detected, turned out to be a so-called “false flag” operation. It first appeared to have been created by the Syrian Electronic Army, though it’s unclear why. That group later disavowed responsibility.

The report goes into a lot of technical detail about how the different attacks work. It’s essentially a warning to Syrians or anyone who may be involved with the conflict to be careful and to pay attention to the latest attack techniques. “The malware campaigns appear to be becoming more and more sophisticated, incorporating greater levels of social engineering,” it says. “Additionally, the presence of possible false flag operations muddies the waters, making it more difficult to identify actors.”

The full report, which I’ve embedded below, is worth reading:

Image: James Gordon/Flickr Creative Commons


Latest Video

View all videos »

Search »

Another gadget you don’t really need. Will not work once you get it home. New model out in 4 weeks. Battery life is too short to be of any use.

— From the fact sheet for a fake product entitled Useless Plasticbox 1.2 (an actual empty plastic box) placed in L.A.-area Best Buy stores by an artist called Plastic Jesus