“Elite GCHQ teams targeted employees of mobile communications companies and billing companies to gain access to their company networks. The spies used fake copies of LinkedIn profiles as one of their tools. The Belgacom employees probably thought nothing was amiss when they pulled up their profiles on LinkedIn, the professional networking site. The pages looked the way they always did, and they didn’t take any longer than usual to load.The victims didn’t notice that what they were looking at wasn’t the original site but a fake profile with one invisible added feature: a small piece of malware that turned their computers into tools for Britain’s GCHQ intelligence service.”
Related posts:
Indian Jeweler Becomes Billionaire as Gold Price Surges
Floating Nuclear Power: Inside Russia's Reactors at Sea
What the Founding Fathers’ Money Problems Can Teach Us About Bitcoin
Another US encrypted email service, founded by PGP inventor, also shuts down
Former North Chicago police chief accused of stealing seized drug money
Sergey Brin says Google 'failed to be on the bleeding edge' of blockchain
Counter-Insurgency Warfare in Boise?
Al-Qaeda chief Ayman al-Zawahiri calls for U.S. attacks and economic boycott
Family of man killed by Phoenix officer suing his former partner
Florida Gators LB Antonio Morrison arrested for barking at police dog
Jim Rogers: I am still in wait-and-watch mode on India
Bitcoin’s Gains May Fuel Central Bank Concerns
Jim Rogers: Get Ready for Cheap Money 'Run Amok'
Life on Mars to become a reality in 2023 according to Dutch firm
Treasury Quietly Warns: 'Expect Debt Limit to Be Reached Near End of 2012'