• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 22nd, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Surveillance

Kaspersky Uncovers sophisticated Spying operation ‘The Mask’ targeted diplomats, govts for 7 years

February 12th, 2014 Pushpa Mishra Cyber Crime, Surveillance 0 comments
Kaspersky Uncovers sophisticated Spying operation ‘The Mask’ targeted diplomats, govts for 7 years
Share on FacebookShare on Twitter

Kaspersky Lab, the Moscow-based computer security software firm, has unearthed a cyber-spying campaign apparently started by a Spanish-speaking country. The campaign targeted government agencies, energy companies and activists in 31 countries. 

Image by Kaspersky Labs

Image by Kaspersky Labs

The campaign, dubbed as “The Mask” (translation for the Spanish word Careto), was stopped last week, but has been operational since 2007; infecting more than 380 targets, according to the Russian security software firm on Monday.

The Mask campaign used malware to steal documents, encryption keys, and other sensitive files besides controlling the infected computer completely. It infected computers running Microsoft Corp’s Windows and Apple Inc’s Mac software, and mobile devices running Apple’s iOS and Google Inc’s Android software, added the Kaspersky Lab.

The firm further confirmed that the spying activities were most prominent in Morocco, Brazil, UK, France and Spain according to the firm though it declined to comment on the government suspected to be behind the large scale spying.

Commenting on difficulty in identifying the possible suspects behind The Mask, Liam O’Murchu, a researcher at Symantec Corp, said via an email, “the code is professionally written, but it’s even difficult to say whether is it written by a government or by a private company that sells this type of software.”

Most of the cyber crimes, uncovered so far, have originated in the US, China, Russia and Brazil. The involvement of a Spanish speaking country in such a cyber crime is first of its kind.

The discovery came to light because Kaspersky’s security software was infected hinting increased level of Internet spying globally.

“There are many super-advanced groups that we don’t know about. This is the tip of the iceberg,” Costin Raiu, the Director of Kaspersky’s global research team, said at his company sponsored conference in Dominican Republic.

The Director added that The Mask hackers took advantage of a flaw in Adobe Systems Inc’s  Flash software that allowed the hackers to get into the infected computer through the Google’s web browser, Chrome.

Additionally, the hackers were aided by the booming “zero-day” exploits market–a market for undisclosed software flaws and tools for exploiting them. Makers of the affected software are unaware of such flaws whereas the buyers of zero-days leave the software vulnerabilities unfixed to deploy spy software, said Raiu adding that the Mask apparently had links to zero-day companies.

Follow @HackRead

Facebook Twitter LinkedIn Pinterest
Previous article Anonymous Whistleblower reveals U.S. uses unreliable NSA cell phone location data to drone civilians.
Next article The 400Gbps largest DDoS attack has hit Europe using NTP Amplification
Pushpa Mishra

Pushpa Mishra

Pushpa is a Dubai based scientific academic editor who worked for Reuters' Zawya business magazine and at the same time a passionate writer for HackRead. From the very first day she has been a blessing for team Hackread. Thanks to her dedication and enthusiasm.

Related Posts
Online scams: How to give scammers a taste of their own medicine

Online scams: How to give scammers a taste of their own medicine

Infamous cybercrime, carding market Joker's Stash is shutting down

Infamous cybercrime, carding market Joker's Stash is shutting down

Facebook sues developer of data scraping extensions for Chrome

Facebook sues developer of data scraping extensions for Chrome

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Shazam Vulnerability exposed location of Android, iOS users
Security

Shazam Vulnerability exposed location of Android, iOS users

41
Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet
Security

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

78
Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping
Security

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

104

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us