Home  

Random  

Nearby  



Log in  



Settings  



Donate  



About Wikipedia  

Disclaimers  



Wikipedia





Cyber spying





Article  

Talk  



Language  

Watch  

Edit  





Cyber spying, cyber espionage, or cyber-collection is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information using methods on the Internet, networks or individual computers through the use of proxy servers,[1] cracking techniques and malicious software including Trojan horses and spyware.[2][3] Cyber espionage can be used to target various actors- individuals, competitors, rivals, groups, governments, and others- in order to obtain personal, economic, political or military advantages. It may wholly be perpetrated online from computer desks of professionals on bases in far away countries or may involve infiltration at home by computer trained conventional spies and moles or in other cases may be the criminal handiwork of amateur malicious hackers and software programmers.[2]

History

edit

Cyber spying started as far back as 1996, when widespread deployment of Internet connectivity to government and corporate systems gained momentum. Since that time, there have been numerous cases of such activities.[4][5][6]

Details

edit

Cyber spying typically involves the use of such access to secrets and classified information or control of individual computers or whole networks for a strategic advantage and for psychological, political and physical subversion activities and sabotage.[7] More recently, cyber spying involves analysis of public activity on social networking sites like Facebook and Twitter.[8]

Such operations, like non-cyber espionage, are typically illegal in the victim country while fully supported by the highest level of government in the aggressor country. The ethical situation likewise depends on one's viewpoint, particularly one's opinion of the governments involved.[7]

Platforms and functionality

edit

Cyber-collection tools have been developed by governments and private interests for nearly every computer and smart-phone operating system. Tools are known to exist for Microsoft, Apple, and Linux computers and iPhone, Android, Blackberry, and Windows phones.[9] Major manufacturers of Commercial off-the-shelf (COTS) cyber collection technology include Gamma Group from the UK[10] and Hacking Team from Italy.[11] Bespoke cyber-collection tool companies, many offering COTS packages of zero-day exploits, include Endgame, Inc. and Netragard of the United States and Vupen from France.[12] State intelligence agencies often have their own teams to develop cyber-collection tools, such as Stuxnet, but require a constant source of zero-day exploits in order to insert their tools into newly targeted systems. Specific technical details of these attack methods often sells for six figure sums.[13]

Common functionality of cyber-collection systems include:

Infiltration

edit

There are several common ways to infect or access the target:

Cyber-collection agents are usually installed by payload delivery software constructed using zero-day attacks and delivered via infected USB drives, e-mail attachments or malicious web sites.[20][21] State sponsored cyber-collections efforts have used official operating system certificates in place of relying on security vulnerabilities. In the Flame operation, Microsoft states that the Microsoft certificate used to impersonate a Windows Update was forged;[22] however, some experts believe that it may have been acquired through HUMINT efforts.[23]

Examples of operations

edit

See also

edit
  • Chinese intelligence operations in the United States
  • Computer security
  • Computer surveillance
  • Cyber-security regulation
  • Cyber spying on universities
  • Cyber threat intelligence
  • Cyberwarfare
  • Employee monitoring software
  • GhostNet
  • Industrial espionage
  • Proactive Cyber Defence
  • Stalkerware
  • Surveillance
  • Titan Rain
  • Vulkan files leak
  • References

    edit
    1. ^ "Residential proxy network use cases". GeoSurf. Retrieved 28 September 2017.
  • ^ a b "Cyber Espionage". PC Magazine.
  • ^ "Cyberspying". Techopedia.
  • ^ Pete Warren, State-sponsored cyber espionage projects now prevalent, say experts, The Guardian, August 30, 2012
  • ^ Nicole Perlroth, Elusive FinSpy Spyware Pops Up in 10 Countries, New York Times, August 13, 2012
  • ^ Kevin G. Coleman, Has Stuxnet, Duqu and Flame Ignited a Cyber Arms Race? Archived 2012-07-08 at the Wayback Machine, AOL Government, July 2, 2012
  • ^ a b Messmer, Ellen. "Cyber Espionage: A Growing Threat to Business". Archived from the original on January 26, 2021. Retrieved Jan 21, 2008.
  • ^ "Five Ways the Government Spies on You". The LockerGnome Daily Report. 7 November 2011. Archived from the original on 18 October 2019. Retrieved 9 February 2019.
  • ^ Vernon Silver, Spyware Matching FinFisher Can Take Over IPhones,, Bloomberg, August 29, 2012
  • ^ "FinFisher IT Intrusion". Archived from the original on 2012-07-31. Retrieved 2012-07-31.
  • ^ "Hacking Team, Remote Control System". Archived from the original on 2016-12-15. Retrieved 2013-01-21.
  • ^ Mathew J. Schwartz, Weaponized Bugs: Time For Digital Arms Control, Information Week, 9 October 2012
  • ^ Ryan Gallagher, Cyberwar’s Gray Market, Slate, 16 Jan 2013
  • ^ Daniele Milan, The Data Encryption Problem Archived 2022-04-08 at the Wayback Machine, Hacking Team
  • ^ Robert Lemos, Flame stashes secrets in USB drives Archived 2014-03-15 at the Wayback Machine, InfoWorld, June 13, 2012
  • ^ how to spy on a cell phone without having access
  • ^ Pascal Gloor, (Un)lawful Interception Archived 2016-02-05 at the Wayback Machine, SwiNOG #25, 07 November 2012
  • ^ Mathew J. Schwartz, Operation Red October Attackers Wielded Spear Phishing, Information Week, January 16, 2013
  • ^ FBI Records: The Vault, Surreptitious Entries, Federal Bureau of Investigation
  • ^ Kim Zetter, "Flame" spyware infiltrating Iranian computers, CNN - Wired, May 30, 2012
  • ^ Anne Belle de Bruijn, Cybercriminelen doen poging tot spionage bij DSM, Elsevier, July 9, 2012
  • ^ Mike Lennon, Microsoft Certificate Was Used to Sign "Flame" Malware Archived 2013-03-07 at the Wayback Machine, June 4, 2012
  • ^ Paul Wagenseil, Flame Malware Uses Stolen Microsoft Digital Signature, NBC News, June 4, 2012
  • ^ "Red October" Diplomatic Cyber Attacks Investigation, Securelist, January 14, 2013
  • ^ Kaspersky Lab Identifies Operation Red October Archived 2016-03-04 at the Wayback Machine, Kaspersky Lab Press Release, January 14, 2013
  • ^ Dave Marcus & Ryan Cherstobitoff, Dissecting Operation High Roller Archived 2013-03-08 at the Wayback Machine, McAfee Labs
  • ^ "the Dukes, timeline". Archived from the original on 2015-10-13. Retrieved 2015-10-13.
  • ^ "The Dukes Whitepaper" (PDF).
  • ^ "F-Secure Press Room - Global".
  • Sources

    edit
    edit

    Retrieved from "https://en.wikipedia.org/w/index.php?title=Cyber_spying&oldid=1223012213"
     



    Last edited on 9 May 2024, at 09:46  





    Languages

     


    Afrikaans
    العربية
    Azərbaycanca
    Español
    فارسی

    Հայերեն
    Hrvatski
    Bahasa Indonesia
    Bahasa Melayu
    Монгол
    Nederlands

    Norsk bokmål
    Português
    Русский

    Українська
     

    Wikipedia


    This page was last edited on 9 May 2024, at 09:46 (UTC).

    Content is available under CC BY-SA 4.0 unless otherwise noted.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Terms of Use

    Desktop