British spooks spoofed Slashdot and LinkedIn
British spooks used spoof sites of Slashdot and LinkedIn to distribute spying malware, a German newspaper has claimed.
Der Spiegel claims that the British signals intelligence spy agency has used a "quantum insert" technique as a way to target employees of two companies that are GRX (Global Roaming Exchange) providers.
The article was penned by Laura Poitras, a hackette who has access to the documents leaked by former National Security Agency contractor Edward Snowden.
GRX is a major hub for mobile Internet traffic when they globally roam. There are about 24 GRX providers globally and it seems that this attack specifically targeted administrators and engineers of Comfone and Mach.
GCHQ used spoofed versions of LinkedIn and Slashdot pages to serve malware to targets using the same methods to target "nine salaried employees" of the Organisation of Petroleum Exporting Countries (OPEC), the global oil cartel.
It had been believed that GCHQ had hit Belgacom International Carrier Services (BICS), a subsidiary of the Belgian telecom giant Belgacom earlier this year. BICS is another one of the few GRX providers worldwide.
What the Snowden documents have been revealing is how the British have been acting as the NSA's eyes and ears on Europe. It would appear that the NSA has been acting a little more aggressively than its US counterparts to silence press reports of the Snowden material.
Black suited men from GCHQ smashed hard drives of Guardian reporters in a somewhat desperate bid to censor the press. President Barrak Obama admitted that there is no way he would get away with that sort of attack on the press in the US.