Homepage / Technology / Russian rogue cell sites, spy drones target NATO troop smartphones, says report
Les Gambling establishments en Ligne en France 2024 200% Reward + 300 Free Rotates LevelUp Internet casino Melbourne En İyi ve Güvenilir Casino Siteleri Canlı Casino Siteleri 2023 Listesi En İyi ve Güvenilir Casino Siteleri Canlı Casino Siteleri 2023 Listesi Le meilleur casino en ligne franзais Extra Casino avec le dйpфt minimal le in addition bas Yeni Casino Siteleri ᐈ Çevrimiçi Kumarhaneler Mart 2024 Les gambling establishments en ligne proposent une grande variйtй de jeux de internet casino gratuits. Türkiye’deki Resmi Web Sitesi Google Play, Türkiye’de kumar oyunlarına izin verecek Her Gün Tatil Olsa ORDU’DA PAZARTESİ GÜNÜ FINDIK FİYATI NASIL? كازينو اون لاين الكازينوهات الممتازة على الإنترنت ألعاب الكازينو المباشرة مينا كازينو العر Google Play, Türkiye’de kumar oyunlarına izin verecek Domain Sorgulama & Domain Fýrsatlarý Canlı Casino Siteleri: 2024 Güvenilir Siteler Seçilmiştir Golden Easter Slot İncelemesi 2024, Demoyu Ücretsiz Oynayın Golden Easter Slot İncelemesi 2024, Demoyu Ücretsiz Oynayın 1xbet Türkiye Giriş Empieza Kayıt 202 Kumar Ve Kumarhaneler Hakkında Pek İlginç 21 Bilgi Kumarhane Doğru Yazımı Nedir? Tdk Ile Kumarhane Kelimesinin Doğru Yazılışı! Mobilbahiste En İyi Kumar Bonusları Ve Kazançlar Mobilbahis Giriş Sayfası On Line Casino Siteleri En Iyi Casino Siteleri 2024 Mostbet: Türkiye’de Internet Casino Mostbet Online Slotlar Ve Canlı-casin Pin Up Casino Oyna Türkiye, Pinup’un Sah Web Sites Ifade Haberleri Son Dakika Ifade Hakkında Güncel Haber Ve Bilgiler “önceliğimiz Transferin Önünü Açmak, Görüştüğümüz Yerler Var” On Line Casino Nuh’un Gemisi Deluxe Resort & Spa, Kıbrıs Bonus Veren Siteler 3 000 Den Fazla Online Oyunu Ücretsiz Oyna En Tehlikeli Kumar Oyunu Ekşi Sözlük Deneme Bonusu Veren Siteler Deneme Bonusu 2024 Explore the Magic of WildCardCity Güvenilir Bahis Siteleri En İyi Kumar Siteleri Balıkesir Triatlonuna Avrupadan Ödül Tricks of the Aviator gambling establishment game by Spribe Çevrim Içi Kumar Siteleri “bonus” Yalanıyla Kandırıyor En Güvenilir Canlı On Line Casino Siteleri Xbetting-tips Com Uncovering the Abundant Tapestry of Ozwin Gambling establishment Evaluating Board Portal Providers Uncovering the Wealthy Tapestry of Ozwin On line casino Electronic Data Area Providers Evaluation Cobra Internet casino: Raising the Australian On the internet Video gaming Practical experience 4 Things to Search for in Safeguarded Cloud Safe-keeping Fastpay On line casino Australia – Simple and No-Taxation Wagering Web page officielle franзaise de Joka Gambling establishment The Software Development Universe Game Woo Internet casino – Enjoy Slot machine games around australia Ostdeutsche Biersorten What Are Virtual Data Rooms? Vitamin D Receptor Polymorphisms Revue du Casino BlackLabel Faktory, kterй ovlivnujн hodnocenн ceskэch online kasin How to Make the Most of Your Web Development Organization and Advertising Efforts L’essor des casinos en ligne en France Boost Meeting Efficiency With Boardroom Technology Developments WildJoker Casino WildCardCity On line casino – Guaranteed Australian Gambling Portal WildCardCity Casino – The Ideal On the internet Gambling establishment within australia Modern Technologies Produce Sharing Documents Online Faster and More Protect Free Virtual Info Room pertaining to Speedy Due Diligence A Review of Data Area Software For people who do buiness Five Board Bedroom Features Which will help You Acquire a More Productive Boardroom Electronic Systems To your Business Understanding Legal Terms and Laws in Today’s World The Laws and Contracts of Hollywood: A Sunset Blvd. Tale Legal Discussion Between Johnny Cash and Antonin Scalia Legal Insights: What Teens Should Know Legal Issues and Exceptions: What You Need to Know Legal Insights and Expert Analysis Celebrity Dialogue: Legal Matters in the 21st Century Famous Personalities Discuss Legal Issues The Boys in the Boat: Legal Advisors and The Quest for Legal Knowledge Understanding Legal Matters: Q&A on Criminal Law, Joint Ventures, and More Enticing Title The Departed: Understanding Basic Work Requirements and Legal Rights Youth Slang Blog Article Legal Insights: A Journey into the World of Law The Ins and Outs of Legal Matters: Everything You Need to Know Legal Insights and Trends: A Rap Guide Mysterious Legal Matters Unveiled Insights and Information: Understanding Various Laws and Regulations Famous People of the 21st Century The Circle of Legal Life The Intersection of Fashion Law, Legal Translation, and THC Oil: A Modern Legal Guide Legal Q&A: Understanding Joinder Federal Rules and More Understanding Legal Terms and Conditions: A Comprehensive Guide Understanding Legal Documentation in a Fun Way! Understanding Legal Aspects: From Islamic Law of Inheritance to Farm Law Protests Understanding Legal Rights: A Guide to Legal Regulations and Requirements Understanding Legal Guidelines and Agreements Famous 21st Century People in Conversation Mysterious Legal Matters Unveiled Legal Matters and Real Estate: A Conversation Between Cameron Boyce and Donald Trump Understanding Legal Expertise and Why It Matters Legal FAQs and Expert Services Understanding Legal Ramifications: Common Law Ontario Health Benefits and More The Ins and Outs of Legal Requirements: From FBI Academy Physical Requirements to Silver Lake Fishing Rules The Legal Underworld: Understanding the Significance of Laws and Rights Legal Conversations: A Dialogue Between Jon Jones and Chadwick Boseman Legal Beats: Bobcats, Real Estate, Babysitting, and More

Technology

Russian rogue cell sites, spy drones target NATO troop smartphones, says report

There are signs Russia hacked into the personal cellphones of NATO soldiers and tried to obtain sensitive military information such as troop numbers, according to a report.

The smartphone hacking campaign by Russia targeted a group of at least 4,000 NATO troops in Eastern Europe, including soldiers stationed in Poland and Baltic states such as Estonia, according to The Wall Street Journal.

According to the Journal, Moscow has been attempting to monitor troop numbers on NATO bases, and hacking into soldiers’ personal smartphones allows them to keep tabs on force strength. The snooping also gives them other operational information as well as personal details on soldiers that they can use for intimidation.

Equipment used included drones with sophisticated surveillance equipment as well as rogue access points on the ground to apparently track or hijack smartphone devices. It said the use of advanced drones suggests the activity was by a state-sponsored group.

“We call smartphones the most vulnerable computing device in an organization,” said John Michelsen, the chief technology officer of Zimperium, a Dallas-based mobile security firm with government and corporate clients. “There are so many ways to compromise a mobile device — many more than a typical desktop or server.”

Moreover, Michelsen told CNBC specialized apps built for the purpose of connecting mobile phones to network systems in large organizations can also be vulnerable and allow hackers to breach firewalls. “When compromised, the hacker has the same access to those systems that the apps do,” he said.

Lt. Cdr. Davide Galli, spokesman at NATO headquarters in Brussels, told CNBC: “We have seen attempts to undermine troops deployed in this part of our Alliance, but our personnel are well-equipped to perform the mission at hand, despite hybrid challenges. The kind of attacks are often complex and sophisticated, therefore it’s not always possible to determine all factors in an unequivocal way.”

Galli said the troop presence in the eastern part of the alliance is defensive in nature, but added “we are taking all necessary measures to protect the mission, including our networks. Allies are also training their personnel to be vigilant as part of their daily routines, including online.”

The Journal quoted a U.S. military officer by name whose smartphone was targeted this year and who was aware of at least six other soldiers under his command whose phones or Facebook accounts were hacked.

CNBC reached out to the Pentagon and Facebook for comment.

In July, the Government Accountability Office issued a report that highlighted “numerous security risks” of internet-capable devices, including smartphones and wearable fitness devices. The federal agency pointed out that the operational risks identified by the Department of Defense included smartphones, both personal and DoD-issued devices, that can be installed with “rogue applications” and “take pictures or record the user’s locations.”

In the case of the military, Michelsen said bad actors can deploy malware to “make that phone a weapon out in the field or on a base.” For example, the infected phone when on a NATO base could “connect to NATO’s network and now that phone is a weapon being used by a hacker.”

Compromising the smartphone and other mobile devices also opens the door to Russian intelligence and others to exploit software vulnerabilities to turn on device microphones for eavesdropping on conversations or to take pictures for nefarious purposes.

The Journal quoted a commander at a NATO base in Poland, U.S. Army Lt. Col. Christopher L’Heureux. His personal iPhone was hacked over the summer, and the paper said the cyber attackers tried “to breach a second layer of password protection through a Russian IP address.”

“They were geolocating me, whoever it was,” said the colonel, according to the paper. “I was like, ‘What the heck is this.'”

The Army officer also pointed out others under his command in Poland were hacked and suggested the incidents were the work of Russian intelligence keen on cracking passwords and intimidating allied soldiers.

The report also pointed out that hacking can be used by adversaries to “sow confusion” by sending out false instructions to troops.

In Estonia, near the Russian border, there also were cases of NATO soldiers’ personal smartphones doing “strange things,” the Journal said. “A probe indicated Russia had used a portable telephone antenna to gain access to phones in the area,” the Journal said, quoting information from an unnamed base officer.

Several NATO soldiers were casually approached in public locations by a Russian agent with information about their family and other personal details — all for purposes of intimidation. Some of the information may have been obtained through hacking into their email, contacts or other personal information.

Read the full story in The Wall Street Journal.

Source: Tech CNBC
Russian rogue cell sites, spy drones target NATO troop smartphones, says report

Comments are closed.