Archive for February, 2015

Syria and cyberbattles: hackers use an old lure on the web to help the Syrian government


Cyber war x


By: Gregory P. Bufithis, Esq.



2 February 2015 – I have written numerous posts about cyber warfare: the actions by a nation-state or international organization to attack and attempt to damage another nation’s computers or information networks. Tools-of-the trade include  computer viruses or denial-of-service attacks. Last week at NATO headquarters in Belgium, RAND provided a workshop on the methods of defending against the damaging effects of cyber warfare on a nation’s digital infrastructure.

So a story in today’s New York Times was spot on: how Syria’s hackers … using the guise of a “harmless” romantic Skype chat … were able to bury a code in a photo sent to a rebel fighter with malware that copied files from the rebel’s computer, including tactical battle plans and troves of information about him, his friends and fellow fighters.

The story of the romantic Skype chat is drawn from a new study by the intelligence-gathering division of FireEye, a computer security firm, which has delved into the hidden corners of the Syrian conflict — one in which even a … Read more