Business, Rights, Technology

UK spies continue ‘quantum insert’ attack via LinkedIn, Slashdot pages

According to a new report by Der Spiegel, the British signals intelligence spy agency has again employed a quantum insert technique as a way to target employees (Google Translate) of two companies that are GRX (Global Roaming Exchange) providers.

The lead author of the story in the German magazine is Laura Poitras, one of the journalists known to have access to the entire trove of documents leaked by former National Security Agency (NSA) contractor Edward Snowden.

GRX is roughly analogous to an IX (Internet Exchange), and it acts as a major exchange for mobile Internet traffic while users roam around the globe. There are only around two dozen such GRX providers globally. This new attack specifically targeted administrators and engineers of Comfone and Mach (which was acquired over the summer by Syniverse), two GRX providers.

Der Spiegel suggests that the Government Communications Headquarters (GCHQ), the British sister agency to the NSA, used spoofed versions of LinkedIn and Slashdot pages to serve malware to targets. This type of attack was also used to target nine salaried employees of the Organisation of Petroleum Exporting Countries (OPEC), the global oil cartel.

This new revelation may be related to an attack earlier this year against Belgacom International Carrier Services (BICS), a subsidiary of the Belgian telecom giant Belgacom. BICS is another one of the few GRX providers worldwide — via redwolf.newsvine.com

Share this Story
Load More Related Articles
Load More By Red Wolf
Load More In Business

Leave a Reply

Your email address will not be published. Required fields are marked *

Photos from Flickr