Your Source for Leaks Around the World!

NSA QUANTUM Files

In Archive, Hacking, Internet, Malware, NSA, NSA Files, Surveillance, TAO on December 30, 2013 at 1:49 AM

NSA-Programm Quantumtheory

12/29/2013

SPIEGEL:

One of NSA’s Tailored Access Operations (TAO)  key tasks is the offensive infiltration of target computers with so-called implants or with large numbers of Trojans. They’ve bestowed their spying tools with illustrious monikers like “ANGRY NEIGHBOR,” “HOWLERMONKEY” or “WATERWITCH.” These names may sound cute, but the tools they describe are both aggressive and effective. See: NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware

According to details in Washington’s current budget plan for the US intelligence services, around 85,000 computers worldwide are projected to be infiltrated by the NSA specialists by the end of this year. By far the majority of these “implants” are conducted by TAO teams via the Internet.

See Also: Digital “Sleeper Cells”: NSA Infects More Than 50,000 Computer Networks Worldwide With Malware “Implants”

Until just a few years ago, NSA agents relied on the same methods employed by cyber criminals to conduct these implants on computers. They sent targeted attack emails disguised as spam containing links directing users to virus-infected websites. With sufficient knowledge of an Internet browser’s security holes — Microsoft’s Internet Explorer, for example, is especially popular with the NSA hackers — all that is needed to plant NSA malware on a person’s computer is for that individual to open a website that has been specially crafted to compromise the user’s computer. Spamming has one key drawback though: It doesn’t work very often.

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #01 NSA

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #01 GCHQ

Nevertheless, TAO has dramatically improved the tools at its disposal. It maintains a sophisticated toolbox known internally by the name “QUANTUMTHEORY.” “Certain QUANTUM missions have a success rate of as high as 80%, where spam is less than 1%,” one internal NSA presentation states.

A comprehensive internal presentation titled “QUANTUM CAPABILITIES,” which SPIEGEL has viewed, lists virtually every popular Internet service provider as a target, including Facebook, Yahoo, Twitter and YouTube. “NSA QUANTUM has the greatest success against Yahoo, Facebook and static IP addresses,” it states. The presentation also notes that the NSA has been unable to employ this method to target users of Google services. Apparently, that can only be done by Britain’s GCHQ intelligence service, which has acquired QUANTUM tools from the NSA.

A favored tool of intelligence service hackers is “QUANTUMINSERT.” GCHQ workers used this method to attack the computers of employees at partly government-held Belgian telecommunications company Belgacom, in order to use their computers to penetrate even further into the company’s networks. The NSA, meanwhile, used the same technology to target high-ranking members of the Organization of the Petroleum Exporting Countries (OPEC) at the organization’s Vienna headquarters. In both cases, the trans-Atlantic spying consortium gained unhindered access to valuable economic data using these tools.

The insert method and other variants of QUANTUM are closely linked to a shadow network operated by the NSA alongside the Internet, with its own, well-hidden infrastructure comprised of “covert” routers and servers. It appears the NSA also incorporates routers and servers from non-NSA networks into its covert network by infecting these networks with “implants” that then allow the government hackers to control the computers remotely.

In this way, the intelligence service seeks to identify and track its targets based on their digital footprints. These identifiers could include certain email addresses or website cookies set on a person’s computer. Of course, a cookie doesn’t automatically identify a person, but it can if it includes additional information like an email address. In that case, a cookie becomes something like the web equivalent of a fingerprint.

Related: NSA Using Advertising Data for Surveillance: Cookies to Identify Hacking Targets, Mobile Apps to Track Locations

Once TAO teams have gathered sufficient data on their targets’ habits, they can shift into attack mode, programming the QUANTUM systems to perform this work in a largely automated way. If a data packet featuring the email address or cookie of a target passes through a cable or router monitored by the NSA, the system sounds the alarm. It determines what website the target person is trying to access and then activates one of the intelligence service’s covert servers, known by the codename FOXACID.

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #01 Foxacid

This NSA server coerces the user into connecting to NSA covert systems rather than the intended sites. In the case of Belgacom engineers, instead of reaching the LinkedIn page they were actually trying to visit, they were also directed to FOXACID servers housed on NSA networks. Undetected by the user, the manipulated page transferred malware already custom tailored to match security holes on the target person’s computer.

The technique can literally be a race between servers, one that is described in internal intelligence agency jargon with phrases like: “Wait for client to initiate new connection,” “Shoot!” and “Hope to beat server-to-client response.” Like any competition, at times the covert network’s surveillance tools are “too slow to win the race.” Often enough, though, they are effective. Implants with QUANTUMINSERT, especially when used in conjunction with LinkedIn, now have a success rate of over 50 percent, according to one internal document.

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #02 #01

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #02 #02

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #02 #03

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #01 Foxacid #01

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #01 Foxacid #02

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #01 Foxacid #03

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #01 Foxacid #04

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #01 Foxacid #05

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #01 Foxacid #06

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #01 Foxacid #07

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #01 Foxacid #08

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #02 #06

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #02 #07

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #02 #08

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #02 #09

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #02 #10

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #02 #11

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #02 #12

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #02 #13

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #02 #14

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #02 #16

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #02 #17

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #02 #18

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #02 #19

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #02 #20

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #02 #21

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #01 Validator

ACHTUNG SPERRFRIST 30.12.2013 Quantum-Biga #01 Olympus

ACHTUNG SPERRFRIST 30.12.2013 Feuer-Biga #01

ACHTUNG SPERRFRIST 30.12.2013 Feuer-Biga #02

ACHTUNG SPERRFRIST 30.12.2013 Feuer-Biga #03

ACHTUNG SPERRFRIST 30.12.2013 Feuer-Biga #08

ACHTUNG SPERRFRIST 30.12.2013 Feuer-Biga #09

ACHTUNG SPERRFRIST 30.12.2013 Feuer-Biga #10

ACHTUNG SPERRFRIST 30.12.2013 Feuer-Biga #11

ACHTUNG SPERRFRIST 30.12.2013 Feuer-Biga #13

ACHTUNG SPERRFRIST 30.12.2013 Feuer-Biga #14

ACHTUNG SPERRFRIST 30.12.2013 Feuer-Biga #15

ACHTUNG SPERRFRIST 30.12.2013 Feuer-Biga #16

ACHTUNG SPERRFRIST 30.12.2013 Feuer-Biga #17

ACHTUNG SPERRFRIST 30.12.2013 Feuer-Biga #19

ACHTUNG SPERRFRIST 30.12.2013 Feuer-Biga #20

ACHTUNG SPERRFRIST 30.12.2013 Feuer-Biga #21

ACHTUNG SPERRFRIST 30.12.2013 Feuer-Biga #22

  1. […] mirror what CSE’s U.S. counterpart, the NSA, can do under a powerful hacking program called QUANTUM, which was created by the NSA’s elite cyberwarfare unit, Tailored Access […]

    Like

  2. […] new documents shed some new light on other revelations as well. Although an attack called QUANTUMINSERT has been widely reported by SPIEGEL and others, documentation shows that in reality it has a low […]

    Like

  3. […] TUMULT (See: Unraveling NSA’s TURBULENCE Programs / NSA QUANTUM Files) […]

    Like

  4. […] TUMULT (See: Unraveling NSA’s TURBULENCE Programs / NSA QUANTUM Files) […]

    Like

  5. […] Related: NSA Has Been Hijacking the Botnets of Other Hackers NSA QUANTUM Files […]

    Like

  6. […] Related: NSA Has Been Hijacking the Botnets of Other Hackers NSA QUANTUM Files […]

    Like

  7. Is it just me, or is most of this junk ten years old?

    Like

  8. […] It appears the government hackers succeeded here once again using the QUANTUMINSERT method. […]

    Like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: