summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--updates/2011/staatstrojaner.en.md6
1 files changed, 3 insertions, 3 deletions
diff --git a/updates/2011/staatstrojaner.en.md b/updates/2011/staatstrojaner.en.md
index 8b3a65eb..2270194d 100644
--- a/updates/2011/staatstrojaner.en.md
+++ b/updates/2011/staatstrojaner.en.md
@@ -1,6 +1,6 @@
1title: Chaos Computer Club analyzes government malware 1title: Chaos Computer Club analyzes government malware
2date: 2011-10-08 19:00:00 2date: 2011-10-08 19:00:00
3updated: 2011-10-09 19:32:32 3updated: 2011-12-21 20:42:58
4author: admin 4author: admin
5tags: update, pressemitteilung, staatstrojaner 5tags: update, pressemitteilung, staatstrojaner
6previewimage: /images/0zapftis.png 6previewimage: /images/0zapftis.png
@@ -61,7 +61,7 @@ delete files, which puts the whole rationale for this method of
61investigation into question. 61investigation into question.
62 62
63But the trojan's built-in functions are scary enough, even without 63But the trojan's built-in functions are scary enough, even without
64extending it by new moduls. For the analysis, the CCC wrote it's own 64extending it by new moduls. For the analysis, the CCC wrote its own
65control terminal software, that can be used to remotely control infected 65control terminal software, that can be used to remotely control infected
66PCs over the internet. With its help it is possible to watch screenshots 66PCs over the internet. With its help it is possible to watch screenshots
67of the web browser on the infected PC – including private notices, 67of the web browser on the infected PC – including private notices,
@@ -100,7 +100,7 @@ integrity protected. Not only can unauthorized third parties assume
100control of the infected system, but even attackers of mediocre skill 100control of the infected system, but even attackers of mediocre skill
101level can connect to the authorities, claim to be a specific instance of 101level can connect to the authorities, claim to be a specific instance of
102the trojan, and upload fake data. It is even conceivable that the law 102the trojan, and upload fake data. It is even conceivable that the law
103enforcement agencies's IT infrastructure could be attacked through this 103enforcement agencies' IT infrastructure could be attacked through this
104channel. The CCC has not yet performed a penetration test on the server 104channel. The CCC has not yet performed a penetration test on the server
105side of the trojan infrastructure. 105side of the trojan infrastructure.
106 106