Skip to main content

EU officials question americans about NSA spying on global bank messenger


The EU is pushing the United States for answers following reports that the National Security Agency siphoned bank messaging data held in the European Union, possibly in violation of a July 2010 treaty.

Snowden told how the NSA spying on SWIFT


The National Security Agency is keen to portray its surveillance efforts as primarily focused on detecting and preventing possible terror attacks. But a new trove of freshly leaked secret documents suggests that the agency also uses its powerful spying apparatus to infiltrate and monitor multinational companies.

On Sunday, Brazilian TV show Fantastico published previously undisclosed details based on documents obtained by Guardian journalist Glenn Greenwald from former NSA contractor Edward Snowden. The 13-minute news segment focused on the revelation that, according to the leaked files, the NSA apparently targeted Brazil’s state-run Petrobras oil producer for surveillance—undermining a recent statement by the agency that it “does not engage in economic espionage in any domain.” The Petrobras detail has been picked up internationally, and is likely to cause a serious stir in Brazil. (The country is still reeling from the revelation last week that the NSA spied on its president.) But Fantastico delivered several other highly significant nuggets that deserve equal attention.

Aside from targeting Petrobras, Fantastico revealed that in a May 2012 presentation reportedly used by the agency to train new recruits how to infiltrate private computer networks, Google is listed as a target. So are the French Ministry of Foreign Affairs and SWIFT, a financial cooperative that connects thousands of banks and is supposed to help “securely” facilitate banking transactions made between more than 200 countries. Other documents show that the NSA’s so-called STORMBREW program—which involves sifting Internet traffic directly off of cables as it is flowing past—is being operated with the help of a “key corporate partner” at about eight key locations across the United States where there is access to “international cables, routers, and switches.” According to a leaked NSA map, this surveillance appears to be taking place at network junction points in Washington, Florida, Texas, at two places in California, and at three further locations in or around Virginia, New York, and Pennsylvania.

Further afield, the NSA has apparently targeted the computer networks of Saudi Arabia’s Riyad Bank and Chinese technology company Huawei for surveillance, the documents show. The agency also operates a program called SHIFTINGSHADOW that appears to collect communications and location data from two major cellphone providers in Afghanistan through what it describes as a “foreign access point.” The targeting of China’s Huawei and phone operators in Afghanistan is perhaps unsurprising, given fears about Huawei’s links to the Chinese government and potential terror attacks on U.S. interests emanating from Afghanistan. But the potential infiltration of Google, in particular, is a controversial development, and the Internet giant will no doubt be demanding answers from the U.S. government.



(Google declined a request for comment. James Clapper, the Director of National Intelligence, has put out a statement not directly addressing any of the latest revelations but saying that the United States “collects foreign intelligence—just as many other governments do—to enhance the security of our citizens and protect our interests and those of our allies around the world.”)

Equally notable, Fantastico displayed a number of leaked secret documents that help shed light on recent reports about efforts made by the NSA and its British counterpart GCHQ to break encryption. In a joint scoop last week, the New York Times, ProPublica, and the Guardian claimed that the spy agencies had “cracked much of the online encryption relied upon by hundreds of millions of people” to protect their online data. However, it was not clear from the reports exactly what encryption protocols had been “cracked” and the tone of the scoops, as I noted at the time, seemed excessively alarmist.

Now, documents published by Fantastico appear to show that, far from “cracking” SSL encryption—a commonly used protocol that shows up in your browser as HTTPS—the spy agencies have been forced to resort to so-called “man-in-the-middle” attacks to circumvent the encryption by impersonating security certificates in order to intercept data.

Prior to the increased adoption of SSL in recent years, government spies would have been able to covertly siphon emails and other data in unencrypted format straight off of Internet cables with little difficulty. SSL encryption seriously dented that capability and was likely a factor in why the NSA started the PRISM Internet surveillance program, which involves obtaining data from Internet companies directly.

However, in some cases GCHQ and the NSA appear to have taken a more aggressive and controversial route—on at least one occasion bypassing the need to approach Google directly by performing a man-in-the-middle attack to impersonate Google security certificates. One document published by Fantastico, apparently taken from an NSA presentation that also contains some GCHQ slides, describes “how the attack was done” to apparently snoop on SSL traffic. The document illustrates with a diagram how one of the agencies appears to have hacked into a target’s Internet router and covertly redirected targeted Google traffic using a fake security certificate so it could intercept the information in unencrypted format.

Documents from GCHQ’s “network exploitation” unit show that it operates a program called “FLYING PIG” that was started up in response to an increasing use of SSL encryption by email providers like Yahoo, Google, and Hotmail. The FLYING PIG system appears to allow it to identify information related to use of the anonymity browser Tor (it has the option to query “Tor events”) and also allows spies to collect information about specific SSL encryption certificates. GCHQ’s network exploitation unit boasts in one document that it is able to collect traffic not only from foreign government networks—but from airlines, energy companies, and financial organizations, too.











Comments

Popular posts from this blog

ΠŸΠΎΡ‡Π΅ΠΌΡƒ ΠΈΠ½ΠΆΠ΅Π½Π΅Ρ€Ρ‹ элСктросвязи становятся ΠΏΡ€ΠΎΠ΄Π°ΠΆΠ½ΠΈΠΊΠ°ΠΌΠΈ

Π”Π°Π²Π½ΠΎ ΠΏΡ€Π΅Π΄ΡƒΠΏΡ€Π΅ΠΆΠ΄Π°Π» ΠΈΠ½ΠΆΠ΅Π½Π΅Ρ€ΠΎΠ² элСктросвязи - Ссли Π²Ρ‹ Π½Π΅ Ρ€Π°Π·Π²ΠΈΠ²Π°Π΅Ρ‚Π΅ΡΡŒ, Ρ‚ΠΎ Ρ€Π°Π½ΠΎ ΠΈΠ»ΠΈ ΠΏΠΎΠ·Π΄Π½ΠΎ ΠΏΡ€Π΅Π²Ρ€Π°Ρ‚ΠΈΡ‚Π΅ΡΡŒ Π»ΠΈΠ±ΠΎ Π² Π΄Π²ΠΎΡ€Π½ΠΈΠΊΠ°, Π»ΠΈΠ±ΠΎ Π² ассСнизатора. О Ρ‡Π΅ΠΌ Π½Π΅ ΠΏΡ€Π΅Π΄ΡƒΠΏΡ€Π΅ΠΆΠ΄Π°Π», каюсь, - Ρ‚Π°ΠΊ это ΠΎ Ρ‚ΠΎΠΌ, Ρ‡Ρ‚ΠΎ Π»ΠΎΠΊΠ°Π»ΡŒΠ½Ρ‹ΠΉ апокалипсис наступит прямо сСйчас. Π’Π·ΡΡ‚ΡŒ, Π½Π°ΠΏΡ€ΠΈΠΌΠ΅Ρ€, сСтСвых ΠΈΠ½ΠΆΠ΅Π½Π΅Ρ€ΠΎΠ²  РостСлСкома, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ Π±ΠΎΠ΄Ρ€ΠΎ Ρ‚Π°ΠΊ искали, ΠΊΠΎΠ³ΠΎ Π΅Ρ‰Ρ‘ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡ΠΈΡ‚ΡŒ ΠΊ ΠΈΠ½Ρ‚Π΅Ρ€Π½Π΅Ρ‚Ρƒ послСдниС ΠΏΠ°Ρ€Ρƒ нСдСль Π² Π‘ΠΎΡ‡ΠΈ ΠΈ Π² АдлСрС. Π‘ΠΊΠ°ΠΆΠ΅Ρ‚Π΅, ΠΈΠ½ΠΆΠ΅Π½Π΅Ρ€ΠΎΠ² Π·Π°ΡΡ‚Π°Π²Π»ΡΡŽΡ‚ Ρ€Π°Π±ΠΎΡ‚Π°Ρ‚ΡŒ ΠΏΡ€ΠΎΠ΄Π°ΠΆΠ½ΠΈΠΊΠ°ΠΌΠΈ - ΠΏΡ€ΠΎΠΈΠ·Π²ΠΎΠ» ΠΈ Π½Π΅ΡΠΏΡ€Π°Π²Π΅Π΄Π»ΠΈΠ²ΠΎΡΡ‚ΡŒ? Π›ΠΈΡ‡Π½ΠΎ я Π² этом ΡΠΎΠ²Π΅Ρ€ΡˆΠ΅Π½Π½ΠΎ Π½Π΅ ΡƒΠ²Π΅Ρ€Π΅Π½.



Π§Ρ‚ΠΎΠ±Ρ‹ Π±Ρ‹Π»ΠΎ сразу понятно, ΠΎ Ρ‡Π΅ΠΌ Ρ€Π΅Ρ‡ΡŒ, Π³ΠΎΡ‚ΠΎΠ² ΠΏΡ€ΠΎΠΈΠ»Π»ΡŽΡΡ‚Ρ€ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ свою ΠΌΡ‹ΡΠ»ΡŒ ΠΊΠ°ΠΊ Ρ€Π°Π±ΠΎΡ‚ΠΎΠ΄Π°Ρ‚Π΅Π»ΡŒ. ΠœΡ‹ вСдь ΠΈΠΌΠ΅Π΅ΠΌ здСсь ΠΏΠΎΡ‚Π΅Π½Ρ†ΠΈΠ°Π»ΡŒΠ½Ρ‹ΠΉ ΠΊΠΎΠ½Ρ„Π»ΠΈΠΊΡ‚ Π² ΠΎΡ‚Π½ΠΎΡˆΠ΅Π½ΠΈΡΡ… ΠΌΠ΅ΠΆΠ΄Ρƒ Ρ€Π°Π±ΠΎΡ‚Π½ΠΈΠΊΠΎΠΌ ΠΈ РостСлСкомом, Π²Π΅Ρ€Π½ΠΎ? И ΠΏΠΎΠΊΠ° возмущСнная ΠΎΠ±Ρ‰Π΅ΡΡ‚Π²Π΅Π½Π½ΠΎΡΡ‚ΡŒ Ρ‚Π²Π΅Ρ€Π΄ΠΎ стоит Π½Π° сторонС Ρ€Π°Π±ΠΎΡ‚Π½ΠΈΠΊΠ°, ΠΏΡ€Π΅Π΄Π»Π°Π³Π°ΡŽ ΠΏΠΎΡΠΌΠΎΡ‚Ρ€Π΅Ρ‚ΡŒ Ρ‡ΡƒΡ‚ΡŒ ΡˆΠΈΡ€Π΅ — Π½Π΅ со стороны работодатСля Π΄Π°ΠΆΠ΅, Π° Ρ‚Π°ΠΊ, сбоку.

Π”Π°Π²Π°ΠΉΡ‚Π΅ возьмСм, Π½Π°ΠΏΡ€ΠΈΠΌΠ΅Ρ€, мСня — Ρ‚ΠΈΠΏΠΈΡ‡Π½ΠΎΠ³ΠΎ работодатСля. Π’Π°ΠΊ ΡΠ»ΡƒΡ‡ΠΈΠ»ΠΎΡΡŒ, Ρ‡Ρ‚ΠΎ Π½Π° мСня Ρ€Π°Π±ΠΎΡ‚Π°Π΅Ρ‚ Π½Π΅ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠ΅ количСство вСсьма Π»ΠΎΡΠ»ΡŒΠ½Ρ‹Ρ… ΠΈ Ρ‚ΠΎΠ»ΠΊΠΎΠ²Ρ‹Ρ… людСй, Ρ‡Π΅ΠΉ высоко…

ΠšΠΎΠΌΡƒ Π½ΡƒΠΆΠ½Ρ‹ Π΄Ρ€ΠΎΠΏΡ‹?

Π² этом Π²ΠΈΠ΄Π΅ΠΎ Ρ…ΠΎΡ€ΠΎΡˆΠΎ ΠΏΠΎΠΊΠ°Π·Π°Π½Π° Тизнь ΠΎΠ΄Π½ΠΎΠ³ΠΎ соврСмСнного Ρ‡Π΅Π»ΠΎΠ²Π΅ΠΊΠ°,
ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΉ Π½Π°Ρ‡Π°Π» Π½Π°Π»ΠΈΡ‚ΡŒ Π±Π΅Π»Ρ‹ΠΉ пластик

ΠΏΠΎΠ»Π΅Π·Π½ΠΎ ΠΏΠΎΡΠΌΠΎΡ‚Ρ€Π΅Ρ‚ΡŒ Π½Π°Ρ‡ΠΈΠ½Π°ΡŽΡ‰ΠΈΠΌ Π΄Ρ€ΠΎΠΏΠ°ΠΌ - ΠΊΠ°ΠΊ вСсти сСбя со своим Π΄Ρ€ΠΎΠΏΠΎΠ²ΠΎΠ΄ΠΎΠΌ, ΠΈ Ρ‡Ρ‚ΠΎ Π½ΡƒΠΆΠ½ΠΎ Ρ€Π°ΡΡΠΊΠ°Π·Ρ‹Π²Π°Ρ‚ΡŒ Π² ΠΏΠΎΠ»ΠΈΡ†ΠΈΠΈ, Π² случаС Ссли Π²Ρ‹ Ρ‚ΡƒΠ΄Π° ΠΏΠΎΠΏΠ°Π»ΠΈ



Π‘Π½Π°Π»ΠΈΡ‚ΡŒ дСньги ΠΈΠ· Π±Π°Π½ΠΊΠΎΠΌΠ°Ρ‚Π° ΠΌΠΎΠΆΠ½ΠΎ Π½Π°Π±ΠΎΡ€ΠΎΠΌ ΠΊΠΎΠ΄Π°

ΠšΠ°ΡΠΏΠ΅Ρ€ ΠΈ Π΅Π³ΠΎ ΠΎΡ…ΠΎΡ‚Π½ΠΈΠΊΠΈ Π·Π° ΠΏΡ€ΠΈΠ·Ρ€Π°ΠΊΠ°ΠΌΠΈ Π² доспСхах Π½Π΅ Ρ‚Π°ΠΊ Π΄Π°Π²Π½ΠΎ ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠΈΠ»ΠΈ изъян Π² Π·Π°Ρ‰ΠΈΡ‚Π΅ Π±Π°Π½ΠΊΠΎΠΌΠ°Ρ‚ΠΎΠ², с ΠΏΠΎΠΌΠΎΡ‰ΡŒΡŽ ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠ³ΠΎ Π΄Ρ€ΠΎΠΏΠΎΠ²ΠΎΠ΄Ρ‹ ΠΌΠΎΠ³ΡƒΡ‚ ΡΠ½ΠΈΠΌΠ°Ρ‚ΡŒ ΠΊΡ€ΡƒΠΏΠ½Ρ‹Π΅ суммы Π΄Π΅Π½Π΅Π³ Π²ΠΎΠΎΠ±Ρ‰Π΅ Π±Π΅Π· ΠΊΠ°Ρ€Ρ‚Ρ‹.

CΠ»ΡƒΠΆΠ±Ρ‹ бСзопасности Π½Π΅ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Ρ… ΠΊΡ€ΡƒΠΏΠ½Ρ‹Ρ… Π±Π°Π½ΠΊΠΎΠ² Π² странах Π•Π²Ρ€ΠΎΠΏΡ‹, Латинской АмСрики ΠΈ Азии, Π² ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Ρ… Π΄Ρ€ΠΎΠΏΠΎΠ²ΠΎΠ΄Ρ‹ ΡƒΠΆΠ΅ ΠΏΡ‹Ρ‚Π°Π»ΠΈΡΡŒ Π²ΠΎΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒΡΡ выявлСнным изъяном Π½Π°Ρ‡Π°Π»ΠΈ собствСнноС Π²Π½ΡƒΡ‚Ρ€Π΅Π½Π½Π΅Π΅ расслСдованиС.



БпСциалисты выяснили, Ρ‡Ρ‚ΠΎ ΡΠ½ΡΡ‚ΡŒ Π² Π±Π°Π½ΠΊΠΎΠΌΠ°Ρ‚Π΅ Π½Π°Π»ΠΈΡ‡Π½Ρ‹Π΅ ΠΌΠΎΠΆΠ½ΠΎ послС ввСдСния Π½Π΅ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠΉ ΠΊΠΎΠΌΠ±ΠΈΠ½Π°Ρ†ΠΈΠΈ Ρ†ΠΈΡ„Ρ€ Π½Π° ΠΏΠ°Π½Π΅Π»ΠΈ, послС Ρ‡Π΅Π³ΠΎ Π½Π΅Ρ€Π°Π·Π²ΠΎΠ΄Π½ΠΎΠΉ Π΄Ρ€ΠΎΠΏ ΠΌΠΎΠΆΠ΅Ρ‚ Π·Π° ΠΎΠ΄ΠΈΠ½ ΠΏΠΎΠ΄Ρ…ΠΎΠ΄ ΠΊ Π±Π°Π½ΠΊΠΎΠΌΠ°Ρ‚Ρƒ ΠΏΠΎΠ»ΡƒΡ‡ΠΈΡ‚ΡŒ 40 Π±Π°Π½ΠΊΠ½ΠΎΡ‚. ΠšΡ€Π΅Π΄ΠΈΡ‚Π½Π°Ρ ΠΈΠ»ΠΈ дСбСтовая ΠΊΠ°Ρ€Ρ‚Π° ΠΏΡ€ΠΈ этом Π²ΠΎΠΎΠ±Ρ‰Π΅ Π½Π΅ трСбуСтся.



ΠŸΠ΅Ρ€Π΅Π΄ Ρ‚Π΅ΠΌ, ΠΊΠ°ΠΊ ΡΠ½ΡΡ‚ΡŒ Ρ‚Π°ΠΊΠΈΠΌ ΠΎΠ±Ρ€Π°Π·ΠΎΠΌ Π½Π°Π»ΠΈΡ‡Π½Ρ‹Π΅, Π΄Ρ€ΠΎΠΏΠΎΠ²ΠΎΠ΄Ρƒ трСбуСтся ΠΏΡ€ΠΎΠ³Ρ€ΡƒΠ·ΠΈΡ‚ΡŒ Π² Π±Π°Π½ΠΊΠΎΠΌΠ°Ρ‚ ΠΊΠΎΠΌΠΏΡŒΡŽΡ‚Π΅Ρ€Π½Ρ‹ΠΉ вирус с Π·Π°Π³Ρ€ΡƒΠ·ΠΎΡ‡Π½ΠΎΠ³ΠΎ ΠΊΠΎΠΌΠΏΠ°ΠΊΡ‚-диска, для этого Π½Π΅ΠΎΠ±Ρ…ΠΎΠ΄ΠΈΠΌ доступ ΠΊ Π²Π½ΡƒΡ‚Ρ€Π΅Π½Π½ΠΈΠΌ ΠΊΠΎΠΌΠΏΠΎΠ½Π΅Π½Ρ‚Π°ΠΌ Π±Π°Π½ΠΊΠΎΠΌΠ°Ρ‚Π°. Как Π΄Ρ€ΠΎΠΏΠΎΠ²ΠΎΠ΄Π°ΠΌ удаСтся ΠΏΠΎΠ»ΡƒΡ‡Π°Ρ‚ΡŒ этот доступ, спСциалисты Π±Π°Π½ΠΊΠ° ΠΏΠΎΠΊΠ° Π΅Ρ‰Ρ‘ Π½Π΅ пояснили.

Π’Π·Π»ΠΎΠΌΡ‰ΠΈΠΊ Π±Π°Π½ΠΊΠΎΠΌΠ°Ρ‚ΠΎΠ² "Вюпкин"

ПослС установки троянской ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΡ‹ Π² Π±Π°Π½ΠΊ…

Black Hat SEO ΠΈΠ»ΠΈ Π±ΠΎΡ‚ для скликивания контСкстной Ρ€Π΅ΠΊΠ»Π°ΠΌΡ‹

На днях ΠΌΠ½Π΅ стало интСрСсно, Π° ΠΊΠ°ΠΊΠΈΠΌ ΠΎΠ±Ρ€Π°Π·ΠΎΠΌ с Ρ‚ΠΎΡ‡ΠΊΠΈ зрСния «Ρ‡Π΅Ρ€Π½Ρ‹Ρ…» ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΎΠ² SEO ΠΌΠΎΠ³ΡƒΡ‚ Π±Ρ‹Ρ‚ΡŒ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Π½Ρ‹ хакСрскиС ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΡ‹ – Π½Π°ΠΏΡ€ΠΈΠΌΠ΅Ρ€, ΠΏΡƒΡ‚Π΅ΠΌ Π³Π΅Π½Π΅Ρ€Π°Ρ†ΠΈΠΈ Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠ° для заинтСрСсованных рСсурсов ΠΈΠ»ΠΈ скликивания контСкстной Ρ€Π΅ΠΊΠ»Π°ΠΌΡ‹ AdWords ΠΈΠ»ΠΈ ЯндСкс.Π”ΠΈΡ€Π΅ΠΊΡ‚
ΠŸΠΎΠ½ΡΡ‚Π½ΠΎ, Ρ‡Ρ‚ΠΎ ΡƒΠ²Π΅Π»ΠΈΡ‡Π΅Π½ΠΈΠ΅ числа посСтитСлСй Π½Π° сайтС ΠΈΠ½Ρ‚Π΅Ρ€Π½Π΅Ρ‚-ΠΌΠ°Π³Π°Π·ΠΈΠ½Π° ΠΈΠ»ΠΈ ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΈ, Π·Π°Π½ΠΈΠΌΠ°ΡŽΡ‰Π΅ΠΉΡΡ Π½Π΅Π΄Π²ΠΈΠΆΠΈΠΌΠΎΡΡ‚ΡŒΡŽ, вСроятнСС всСго ΠΏΠΎΠ»ΠΎΠΆΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎ скаТСтся Π½Π° ΠΈΡ… Π΄ΠΎΡ…ΠΎΠ΄Π°Ρ…. ΠŸΠΎΡΡ‚ΠΎΠΌΡƒ Ρ€Π°Π·Ρ€Π°Π±ΠΎΡ‚ΠΊΠ° ΠΏΠΎΠ΄ΠΎΠ±Π½ΠΎΠ³ΠΎ Ρ‚ΠΈΠΏΠ° ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌ — Π²ΠΏΠΎΠ»Π½Π΅ сСбС ΠΎΠ±Ρ‹Π΄Π΅Π½Π½ΠΎΠ΅ Π΄Π΅Π»ΠΎ, ΠΈ появились Ρ‚Π°ΠΊΠΈΠ΅ ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΡ‹ ΡƒΠΆΠ΅ Π΄Π°Π²Π½ΠΎ. По большСй части Ρ‚Π°ΠΊΠΈΡ… Π±ΠΎΡ‚ΠΎΠ² ΠΌΠΎΠΆΠ½ΠΎ Ρ€Π°Π·Π΄Π΅Π»ΠΈΡ‚ΡŒ Π½Π° Π΄Π²Π° класса — это Ρ€Π°Π·Π»ΠΈΡ‡Π½ΠΎΠ³ΠΎ Ρ€ΠΎΠ΄Π° Adware, ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠ΅ распространяСтся вмСстС с популярными ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΠ°ΠΌΠΈ, ΠΈΠ»ΠΈ трояны, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ ΠΎΡΡƒΡ‰Π΅ΡΡ‚Π²Π»ΡΡŽΡ‚ Π±ΠΎΠ»Π΅Π΅ ΡΠ΅Ρ€ΡŒΠ΅Π·Π½ΡƒΡŽ ΠΌΠΎΠ΄ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΡŽ систСмы.  Win32/Patched.P Π”Π°Π²Π°ΠΉ для Π½Π°Ρ‡Π°Π»Π° рассмотрим достаточно экзотичСский, Π½ΠΎ ΠΎΡ‚ этого Π½Π΅ ΠΌΠ΅Π½Π΅Π΅ интСрСсный способ ΠΏΠΎΠ΄ΠΌΠ΅Π½Ρ‹ Ρ€Π΅Π·ΡƒΠ»ΡŒΡ‚Π°Ρ‚ΠΎΠ² ΠΏΠΎΠΈΡΠΊΠ° Π² популярных поисковых сСрвисах ЯндСкс ΠΈ Google, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΉ Π±Ρ‹Π» Ρ€Π΅Π°Π»ΠΈΠ·ΠΎΠ²Π°Π½ Π² троянской ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΠ΅ Win32/Patched.P (ESET)…

Как Ρ€Π°Π±ΠΎΡ‚Π°Π΅Ρ‚ Π±Π°Π½ΠΊ со своими коррСспондСнтами ΠΏΠΎ SWIFT

Π˜Ρ‚Π°ΠΊ, наш Π±Π°Π½ΠΊ ΠΈΠΌΠ΅Π΅Ρ‚ ΠΎΡ‚ΠΊΡ€Ρ‹Ρ‚Ρ‹Π΅ коррСспондСнтскиС счСта Π² БША (CITIBANK N.A. NEW YORK), Π² Π•Π²Ρ€ΠΎΠΏΠ΅ (VTB BANK DEUTSCHLAND AG), Π² России (ΠŸΡ€ΠΎΠΌΡΠ²ΡΠ·ΡŒΠ±Π°Π½ΠΊ Москва ΠΈ Π‘ΠΎΠ±ΠΈΠ½Π±Π°Π½ΠΊ Москва).



БоотвСтствСнно, всС расслСдования ΠΏΠΎ ΠΏΠ»Π°Ρ‚Π΅ΠΆΠ°ΠΌ происходят Ρ‡Π΅Ρ€Π΅Π· эти Π±Π°Π½ΠΊΠΈ согласно  установлСнным коррСспондСнтским ΠΎΡ‚Π½ΠΎΡˆΠ΅Π½ΠΈΡΠΌ с использованиСм ΡΠΎΠΎΡ‚Π²Π΅Ρ‚ΡΡ‚Π²ΡƒΡŽΡ‰ΠΈΡ… Ρ„ΠΎΡ€ΠΌΠ°Ρ‚ΠΎΠ² SWIFT MT-195/295, MT-196/296, MT-199/299 ΠΈ MT-192/292

ΠšΡ€ΠΎΠΌΠ΅ прямых коррСспондСнтских ΠΎΡ‚Π½ΠΎΡˆΠ΅Π½ΠΈΠΉ с Π±Π°Π½ΠΊΠ°ΠΌΠΈ, нашим Π±Π°Π½ΠΊΠΎΠΌ установлСны ΠΎΡ‚Π½ΠΎΡˆΠ΅Π½ΠΈΡ ΠΈ с Π΄Ρ€ΡƒΠ³ΠΈΠΌΠΈ финансовыми организациями Ρ‡Π΅Ρ€Π΅Π· ΠΏΡ€ΠΎΡ†Π΅Π΄ΡƒΡ€Ρƒ ΠΎΠ±ΠΌΠ΅Π½Π° ΠΊΠ»ΡŽΡ‡Π°ΠΌΠΈ, Ρ‡Ρ‚ΠΎ Π΄Π°Ρ‘Ρ‚ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡ‚ΡŒ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒ SWIFT-Ρ„ΠΎΡ€ΠΌΠ°Ρ‚Ρ‹ МВ-195, МВ-196 ΠΈ МВ-199 для провСдСния ΠΏΡ€ΠΎΡ†Π΅Π΄ΡƒΡ€Ρ‹ расслСдования ΠΏΠΎ стандартным ΠΏΠ»Π°Ρ‚Π΅ΠΆΠ°ΠΌ ΠΈ ΠΏΠ»Π°Ρ‚Π΅ΠΆΠ°ΠΌ с ΠΏΠΎΠΊΡ€Ρ‹Ρ‚ΠΈΠ΅ΠΌ:

- DEUTSCHE BANK TRUST COMPANY AMERICAS USA
- COMMERZBANK AG Germany
- CITIBANK N.A. London
- CITIBANK N.A. Brussels
- BANQUE DE COMMERCE ET DE PLACEMENTS S.A. Geneva
- NORVIK BANKA JSC  LV
- ABLV BANK AS  LV

Π’ срСднСм ΠΏΡ€ΠΎΡ†Π΅Π΄ΡƒΡ€Π° расслСдования Π·Π°Π½ΠΈΠΌΠ°Π΅Ρ‚ ΠΎΡ‚ 3 Π΄ΠΎ 14 Π΄Π½Π΅ΠΉ (Ссли Π½Π΅ΠΎΠ±Ρ…ΠΎΠ΄ΠΈΠΌΠΎ ΡƒΡ‚ΠΎΡ‡Π½ΠΈΡ‚ΡŒ Π΄Π΅Ρ‚Π°…

М9 - Ρ‚ΠΎΡ‡ΠΊΠ° ΠΎΠ±ΠΌΠ΅Π½Π° Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠΎΠΌ • Московский INTERNET EXCHANGE • MSK-XI

Π’ΠΎΡ‚ Ρ‚Π°ΠΊ всё Π½Π°Ρ‡ΠΈΠ½Π°Π»ΠΎΡΡŒ
Π˜Π·Π½Π°Ρ‡Π°Π»ΡŒΠ½ΠΎ Π±Ρ‹Π» всСго ΠΎΠ΄ΠΈΠ½ ΠΏΡ€ΠΎΠ²Π°ΠΉΠ΄Π΅Ρ€ - Π Π΅Π»ΠΊΠΎΠΌ. НС Π±Ρ‹Π»ΠΎ ΠΊΠΎΠ½ΠΊΡƒΡ€Π΅Π½Ρ‚ΠΎΠ² - Π½Π΅ Π±Ρ‹Π»ΠΎ ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌ. Π ΡƒΠ½Π΅Ρ‚ Π΅Ρ‰Π΅ Π΄Π΅Π»Π°Π» свои ΠΏΠ΅Ρ€Π²Ρ‹Π΅ шаги, ΠΈ всС русскоязычныС рСсурсы Π±Ρ‹Π»ΠΈ сосрСдоточСны Π² ΠΎΠ΄Π½ΠΎΠΌ мСстС. ПозТС Π Π΅Π»ΠΊΠΎΠΌ развалился Π½Π° Π Π΅Π»ΠΊΠΎΠΌ ΠΈ ДСмос, стали ΠΏΠΎΡΠ²Π»ΡΡ‚ΡŒΡΡ Π΄Ρ€ΡƒΠ³ΠΈΠ΅ ΠΏΡ€ΠΎΠ²Π°ΠΉΠ΄Π΅Ρ€Ρ‹. Π ΡƒΠ½Π΅Ρ‚ Ρ‚Π΅ΠΌ Π²Ρ€Π΅ΠΌΠ΅Π½Π΅ΠΌ подрос ΠΈ... распался Π½Π° мноТСство ΠΎΡ‚Π΄Π΅Π»ΡŒΠ½Ρ‹Ρ… сСтСй-сСгмСнтов, ΠΊΠΎΠ½Ρ‚Ρ€ΠΎΠ»ΠΈΡ€ΡƒΠ΅ΠΌΡ‹Ρ… Ρ€Π°Π·Π½Ρ‹ΠΌΠΈ ΠΏΡ€ΠΎΠ²Π°ΠΉΠ΄Π΅Ρ€Π°ΠΌΠΈ. РазумССтся, ΠΊΠΎΠ½Π΅Ρ‡Π½Ρ‹Π΅ ΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚Π΅Π»ΠΈ ΠΈΠΌΠ΅Π»ΠΈ доступ ΠΊΠΎ всСм рСсурсам Ρ€ΡƒΠ½Π΅Ρ‚Π°, Π½ΠΎ прямого взаимодСйствия ΠΌΠ΅ΠΆΠ΄Ρƒ ΠΏΡ€ΠΎΠ²Π°ΠΉΠ΄Π΅Ρ€Π°ΠΌΠΈ Π½Π΅ Π±Ρ‹Π»ΠΎ. ΠŸΠΎΡΡ‚ΠΎΠΌΡƒ Ρ‚Ρ€Π°Ρ„ΠΈΠΊ шСл с сСрвСра ΠΎΠ΄Π½ΠΎΠ³ΠΎ ΠΏΡ€ΠΎΠ²Π°ΠΉΠ΄Π΅Ρ€Π° ΠΏΠΎ ΠΎΠ³Ρ€ΠΎΠΌΠ½ΠΎΠΉ ΠΏΠ΅Ρ‚Π»Π΅ Ρ‡Π΅Ρ€Π΅Π· АмСрику, ΠΏΠΎΡ‚ΠΎΠΌ Π“Π΅Ρ€ΠΌΠ°Π½ΠΈΡŽ, ΠΈ Ρ‚ΠΎΠ»ΡŒΠΊΠΎ ΠΏΠΎΡ‚ΠΎΠΌ возвращался Π½Π° сСрвСр Π΄Ρ€ΡƒΠ³ΠΎΠ³ΠΎ ΠΏΡ€ΠΎΠ²Π°ΠΉΠ΄Π΅Ρ€Π°. ИмСла мСсто нСоправданная потСря ΠΈ Π² скорости, ΠΈ Π² Π΄Π΅Π½ΡŒΠ³Π°Ρ…. Пока Ρ‚Ρ€Π°Ρ„ΠΈΠΊ Π±Ρ‹Π» Π½Π΅Π·Π½Π°Ρ‡ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹ΠΌ, это ΠΌΠ°Π»ΠΎ ΠΊΠΎΠ³ΠΎ Π²ΠΎΠ»Π½ΠΎΠ²Π°Π»ΠΎ, Π½ΠΎ ΠΈΠ½Ρ‚Π΅Ρ€Π½Π΅Ρ‚ Π±ΡƒΡ€Π½ΠΎ развивался, Ρ‚Ρ€Π°Ρ„ΠΈΠΊ ΠΏΠΎ Ρ€ΡƒΠ½Π΅Ρ‚Ρƒ ΡΡ‚Ρ€Π΅ΠΌΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎ увСличивался, ΠΈ Π² ΠΎΠ΄ΠΈΠ½ прСкрасный дСнь ΠΊΡ€ΡƒΠΏΠ½Ρ‹Π΅ ΠΏΡ€ΠΎΠ²Π°ΠΉΠ΄Π΅Ρ€Ρ‹ ΠœΠΎΡΠΊΠ²Ρ‹ (ΠΏΠΎ сути, ДСмос ΠΈ Π Π΅Π»ΠΊΠΎΠΌ) сСли Π΄Ρ€ΡƒΠ³ Π½Π°ΠΏΡ€ΠΎΡ‚ΠΈΠ² Π΄Ρ€ΡƒΠ³Π° ΠΈ Ρ€Π΅ΡˆΠΈΠ»ΠΈ, Ρ‡Ρ‚ΠΎ ΠΈΠΌ Π½Π°Π΄ΠΎ Π½Π°Π»Π°ΠΆ…