November 01, 2012
computers in spy camera
In a reversal of roles spy camera, members of the country's Computer Emergency Response Team (CERT) suckered the cybermiscreant into downloading a file infected with his own spyware that allowed CERT to photograph the alleged hacker with his computer's webcam and ransack its hard drive for files.The Georgian CERT team discovered the hacker's activity in March 2011 spy camera.
He was planting advanced malicious software spy cameraon computers in Georgia and elsewhere that collected sensitive, confidential information about Georgian and American security documents, the team said.The Georgian CERT team discovered the hacker's activity in March 2011. He was planting advanced malicious software on computers in Georgia and elsewhere that collected sensitive, confidential information about Georgian and American security documents, the team said.
"After investigating attackers servers and malicious files, we have linked this cyberattack to Russian official security agencies," Georgian CERT reported.
In the course of his espionage campaign, the report notes, the suspected Russian cyberspy infected 390 computers -- 70 percent of them in Georgia, 5 percent in the United States and another 10 percent in Canada, Ukraine, France, China, Germany and Russia.Organizations targeted in Georgia included government ministries, its parliament, critical information
Spy camera blitz on danger cyclists at city bridge infrastructures, banks and non-governmental organizations spy camera, the report says.The attacks were highly targeted spy camera. For example, Web pages at Georgian news websites were infected based on content. Stories about NATO and Georgia, meetings and agreements between the United States and Georgia and Georgian military news were popular spy camera targets of the hacker.
Comments are disabled.
Post is locked.
He was planting advanced malicious software spy cameraon computers in Georgia and elsewhere that collected sensitive, confidential information about Georgian and American security documents, the team said.The Georgian CERT team discovered the hacker's activity in March 2011. He was planting advanced malicious software on computers in Georgia and elsewhere that collected sensitive, confidential information about Georgian and American security documents, the team said.
"After investigating attackers servers and malicious files, we have linked this cyberattack to Russian official security agencies," Georgian CERT reported.
In the course of his espionage campaign, the report notes, the suspected Russian cyberspy infected 390 computers -- 70 percent of them in Georgia, 5 percent in the United States and another 10 percent in Canada, Ukraine, France, China, Germany and Russia.Organizations targeted in Georgia included government ministries, its parliament, critical information
Spy camera blitz on danger cyclists at city bridge infrastructures, banks and non-governmental organizations spy camera, the report says.The attacks were highly targeted spy camera. For example, Web pages at Georgian news websites were infected based on content. Stories about NATO and Georgia, meetings and agreements between the United States and Georgia and Georgian military news were popular spy camera targets of the hacker.
Posted by: davytoney at
01:41 AM
| No Comments
| Add Comment
Post contains 262 words, total size 2 kb.
11kb generated in CPU 0.0678, elapsed 0.1011 seconds.
33 queries taking 0.0938 seconds, 65 records returned.
Powered by Minx 1.1.6c-pink.
33 queries taking 0.0938 seconds, 65 records returned.
Powered by Minx 1.1.6c-pink.