Jump to content

A massive hack that Google thwarted was actually a counterterrorism operation - Piracy News and Crypto Updates - InviteHawk - Your Only Source for Free Torrent Invites

Buy, Sell, Trade or Find Free Torrent Invites for Private Torrent Trackers Such As redacted, blutopia, losslessclub, femdomcult, filelist, Chdbits, Uhdbits, empornium, iptorrents, hdbits, gazellegames, animebytes, privatehd, myspleen, torrentleech, morethantv, bibliotik, alpharatio, blady, passthepopcorn, brokenstones, pornbay, cgpeers, cinemageddon, broadcasthenet, learnbits, torrentseeds, beyondhd, cinemaz, u2.dmhy, Karagarga, PTerclub, Nyaa.si, Polishtracker etc.

A massive hack that Google thwarted was actually a counterterrorism operation


Recommended Posts

Security researchers regularly reveal software vulnerabilities that hackers can exploit, or even have exploited in the past. In some cases, they’re software issues that have not been used to hack or spy on users. In others, researchers identify malware and hacks that are actively used in the wild. By the time they release information about the attacks, the companies whose code had been attacked have already released updates to patch the problems. And security researchers usually point out when they believe the hacks are too sophisticated for a regular hacker to pull off.

Google runs an infamous security team at Project Zero that analyzes all sorts of operating systems and products for vulnerabilities. Since January, the team produced research that highlighted 11 zero-day exploits that were used to compromise Android, iPhone, and Windows. Back in January, Project Zero scientists pointed out the sophistication of the attacks that utilized previously unknown vulnerabilities in Chrome and Safari code. It turns out that the hackers behind the campaign that Google found were from a nation-state. They were part of a counterterrorism operation initiated by a Western ally, and the operation was ongoing when Project Zero started revealing the software issues.

Today's Top DealThis $32 gadget went viral on TikTok and now Amazon can't keep it in stock!List Price:$35.99Price:$32.39You Save:$3.60 (10%)Buy NowAvailable from Amazon BGR may receive a commission

Whenever hackers backed by US rivals are responsible for newly discovered attacks, some researchers would go out and say the hacks originate from China, North Korea, or Russia. But Google’s Project Zero did not point any fingers while revealing these 11 zero-day bugs. The decision to shut down the cyberattack coming from a Western ally apparently caused some controversy inside Google, MIT Technology Review has found out.

It’s unclear which Western government had employed the sophisticated attack or what sort of counterterrorism operation they were running. The MIT report indicates that Google might have omitted the identity of attackers intentionally. Google might know precisely who the hackers are and what the operation was. It’s also unclear whether Google notified the attackers before revealing the zero-day vulnerabilities publicly.

Some Google employees have apparently argued that counterterrorism operations should be out of bounds when it comes to public disclosure. Others say that Google was within its rights to protect the company’s products from imminent attacks that could harm end-users. Google defended its actions in a statement:

Project Zero is dedicated to finding and patching 0-day vulnerabilities, and posting technical research designed to advance the understanding of novel security vulnerabilities and exploitation techniques across the research community. We believe sharing this research leads to better defensive strategies and increases security for everyone. We don’t perform attribution as part of this research.

The attackers used never-before-seen “watering hole” techniques to inject unknown websites with malware and deliver them to targets running Chrome and Safari on Android, iPhone, and Windows devices. The attackers exploited the 11 zero-days over just nine months, beginning in February 2020. The level of sophistication and speed of the attack is what troubled researchers.

A former senior US intelligence official told MIT that Western operations are recognizable, and that’s because of the local laws that impact what spy agencies can and can’t do:

There are certain hallmarks in Western operations that are not present in other entities … you can see it translate down into the code. And this is where I think one of the key ethical dimensions comes in. How one treats intelligence activity or law enforcement activity driven under democratic oversight within a lawfully elected representative government is very different from that of an authoritarian regime.

The oversight is baked into Western operations at the technical, tradecraft, and procedure level.

It’s unclear to what end the counterterrorism operation might have been crippled, and those are the kind of secrets that will probably never be revealed to the public. The fact that so many vulnerabilities were discovered that quickly is still troublesome, as other skilled hackers might have found and exploited them — which is ultimately why Google chose to reveal the info. The silver lining of these revelations is that Western spies were targeting specific groups of people, which means most Android, iPhone, and Windows users shouldn’t be impacted.

Link to comment
Share on other sites

Avoid unnecessary posts such as 'Thank you', 'Welcome', etc. Such posts will be deleted and user will be warned if it happens again. If caught spamming, the following actions are applicable -

  • First time - Warning
  • Second time - 5000 Points will be deducted
  • Third time - Ban for 7 days
  • Fourth time - Permanent Ban

If the post helped you, reward the user by reacting to the post like this -

1.jpg

Link to comment
Share on other sites

The last post in this topic was made more than 14 days ago. Only post in this topic if you have something valuable to add. Irrelevant posts are not allowed and you will be warned/banned for spamming old topics.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Read this before posting -
  • Only post if you have something valuable to contribute.
  • Avoid unnecessary posts such as 'Thank you', 'Welcome', etc. Such posts will be deleted and you will be warned if it happens again.
  • If the post helped you, reward the user by reacting to the post like this -                      1.jpg
Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Customer Reviews

  • Similar Topics

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.