(Dec 11, (WASHINGTON))--Since 2016, the Ethiopian government has targeted dissidents and journalists in nearly two dozen countries with spyware provided by an Israeli software company, according to a new report from Citizen Lab, a research and development group at the University of Toronto.
Once their computers are infected, victims of the attack can be monitored covertly whenever they browse the web, the report says. Based on an in-depth analysis of the methods used to trick victims into installing the software, Citizen Lab concluded that “agencies of the Ethiopian government” deployed the spyware to target individuals critical of their policies. More than 40 devices in 20 countries were infected, according to Citizen Lab’s research. It’s unknown how many individuals might have been targeted.
Full access
Citizen Lab’s report found that attackers used email to target dissidents, outspoken critics and perceived enemies by impersonating legitimate websites and software companies. In some cases, they sent messages about events related to Ethiopian politics, with links purporting to show related videos.
Those links led to web pages that prompted victims to update their Flash Players or download “Adobe PdfWriter,” fictitious software that, in fact, led to CutePDF Writer, a tool to create PDF files. The attackers embedded the spyware in bona fide programs by exploiting security vulnerabilities, creating the impression that recipients were installing legitimate software and coaxing them to provide the administrator-level permissions needed to activate the surveillance.
Once installed, the spyware spread to additional files tied to web browsers, making the software difficult to remove and nearly always active. Read more from VOA »
Once their computers are infected, victims of the attack can be monitored covertly whenever they browse the web, the report says. Based on an in-depth analysis of the methods used to trick victims into installing the software, Citizen Lab concluded that “agencies of the Ethiopian government” deployed the spyware to target individuals critical of their policies. More than 40 devices in 20 countries were infected, according to Citizen Lab’s research. It’s unknown how many individuals might have been targeted.
Full access
Citizen Lab’s report found that attackers used email to target dissidents, outspoken critics and perceived enemies by impersonating legitimate websites and software companies. In some cases, they sent messages about events related to Ethiopian politics, with links purporting to show related videos.
Those links led to web pages that prompted victims to update their Flash Players or download “Adobe PdfWriter,” fictitious software that, in fact, led to CutePDF Writer, a tool to create PDF files. The attackers embedded the spyware in bona fide programs by exploiting security vulnerabilities, creating the impression that recipients were installing legitimate software and coaxing them to provide the administrator-level permissions needed to activate the surveillance.
Once installed, the spyware spread to additional files tied to web browsers, making the software difficult to remove and nearly always active. Read more from VOA »
No comments:
Post a Comment