Waikato Times

Spies’ blunder reveals Lebanon’s global surveillan­ce campaign

- – Telegraph Group

"It's almost like thieves robbed the bank and forgot to lock the door where they stashed the money."

Mike Murray, head of intelligen­ce at Lookout

LEBANON: A major hacking operation to snoop on government and military officials in 21 countries has been traced back to Lebanon’s intelligen­ce agency after spies accidental­ly uploaded stolen data to the internet.

The hi-tech surveillan­ce campaign, dubbed Dark Caracal, retrieved call logs, audio recordings, WhatsApp messages, location informatio­n and the browsing history of thousands of victims’ smartphone­s across north Africa, Europe, the Middle East and North America, according to a report published yesterday.

The report, by mobile security firm Lookout and digital rights group Electronic Frontier Foundation, claimed the hacking arsenal was discovered after Lebanese spies published a gigabyte of the stolen data online.

‘‘It’s almost like thieves robbed the bank and forgot to lock the door where they stashed the money,’’ Mike Murray, head of intelligen­ce at Lookout, told the Associated Press.

By sifting through the stolen informatio­n, security experts were able to deduce that the victims included members of the military, government officials, medical practition­ers, education profession­als and academics from a range of countries including Germany, Italy, Russia, South Korea, the United States and Syria. British officials appear not to have been affected.

The data was gleaned from a set of phones that appeared to have been configured to road test the spyware. The test devices all seemed to have connected to a wi-fi network active at the site of Lebanon’s security headquarte­rs, the report found.

The report also reveals how the spies used a network of spoof websites and malicious smartphone apps masqueradi­ng as WhatsApp and Telegram to steal passwords and eavesdrop on conversati­ons while capturing at least 486,000 text messages.

The tranche of data spanned a huge variety of themes, from photograph­s from Syrian battlefiel­ds to details of children’s birthday parties.

Victims were also targeted through Facebook groups and WhatsApp messages that were booby-trapped with malicious software. Once downloaded, that software captured smartphone data and sent it back to servers owned by the Lebanese General Directorat­e of General Security (GDGS) in Beirut. The GDGS is known for its intelligen­ce gathering and for its offensive cyber capabiliti­es.

It is unclear how long Dark Caracal had been in action, but the report suggested that this was not a one-ofa-kind project and that other government­s probably had access to similar tools.

Discoverie­s of state-sponsored cyberespio­nage campaigns have become more common as countries in the Middle East and Asia attempt to match the digital prowess of the US, China and Russia.

 ??  ??

Newspapers in English

Newspapers from New Zealand