- How can we be of help?

Dive into business data optimization and best practices.
Post Reply
rakhirhif8963
Posts: 529
Joined: Mon Dec 23, 2024 3:13 am

- How can we be of help?

Post by rakhirhif8963 »

Security Tales: Hostile Wiretapping
Vladimir Bezmaly | 14.08.2017
- Johann, I'm afraid our security service needs your help again.

- What's happened?

— Our agents from abroad report that foreign intelligence is listening in and watching the offices of our officials. As evidence, the agent provided video and audio files with wiretapping and "peeping" of one of the highest officials of the empire. The recordings were obviously made at his home. But that is not what is strange. What is strange is that we did not find a single malicious bookmark. Three teams checked. They did not find anything!


— Maybe your specialists, by watching the video, will be able to determine where in the house it was filmed?

- I think yes!

The next day, Mark and Rita went to the official's house. Watching the video, they quickly realized that the entire recording was made in the official's office. They also managed to find out the macedonia mobile database of the video camera quite quickly. Apparently, it was a video camera of a laptop that was standing on the table. The only thing that was unclear was how the laptop was infected and why the malware was not detected by the antivirus.

A month passed. Johann was again summoned to the counterintelligence department.

— Johann, our agents report that the malware you found on the official's computer is an intelligence project of State A. In fact, the tool allows intercepting H.264 video streams in real time and collecting them in AVI video files or JPG photographs.

— So, can we say that we are dealing with an attack from a foreign state?

- Exactly! I'm afraid we're entering an era where malware attacks are already escalating into war.
Post Reply