From 734348de88052159fad834ca2d47211a5b59e23e Mon Sep 17 00:00:00 2001 From: muelli Date: Wed, 21 Dec 2011 20:42:58 +0000 Subject: committing page revision 8 --- updates/2011/staatstrojaner.en.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'updates/2011') diff --git a/updates/2011/staatstrojaner.en.md b/updates/2011/staatstrojaner.en.md index 8b3a65eb..2270194d 100644 --- a/updates/2011/staatstrojaner.en.md +++ b/updates/2011/staatstrojaner.en.md @@ -1,6 +1,6 @@ title: Chaos Computer Club analyzes government malware date: 2011-10-08 19:00:00 -updated: 2011-10-09 19:32:32 +updated: 2011-12-21 20:42:58 author: admin tags: update, pressemitteilung, staatstrojaner previewimage: /images/0zapftis.png @@ -61,7 +61,7 @@ delete files, which puts the whole rationale for this method of investigation into question. But the trojan's built-in functions are scary enough, even without -extending it by new moduls. For the analysis, the CCC wrote it's own +extending it by new moduls. For the analysis, the CCC wrote its own control terminal software, that can be used to remotely control infected PCs over the internet. With its help it is possible to watch screenshots of the web browser on the infected PC – including private notices, @@ -100,7 +100,7 @@ integrity protected. Not only can unauthorized third parties assume control of the infected system, but even attackers of mediocre skill level can connect to the authorities, claim to be a specific instance of the trojan, and upload fake data. It is even conceivable that the law -enforcement agencies's IT infrastructure could be attacked through this +enforcement agencies' IT infrastructure could be attacked through this channel. The CCC has not yet performed a penetration test on the server side of the trojan infrastructure. -- cgit v1.2.3