diff options
author | muelli <muelli@cryptobitch.de> | 2011-12-21 20:42:58 +0000 |
---|---|---|
committer | muelli <muelli@cryptobitch.de> | 2020-05-23 13:39:09 +0000 |
commit | 734348de88052159fad834ca2d47211a5b59e23e (patch) | |
tree | 6d56f88b45944c2601fbae447c39f63f8b597db5 | |
parent | 2a6c0174d6e401923b0bd1eb7a74c03281cfe5bc (diff) |
committing page revision 8
-rw-r--r-- | updates/2011/staatstrojaner.en.md | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/updates/2011/staatstrojaner.en.md b/updates/2011/staatstrojaner.en.md index 8b3a65eb..2270194d 100644 --- a/updates/2011/staatstrojaner.en.md +++ b/updates/2011/staatstrojaner.en.md | |||
@@ -1,6 +1,6 @@ | |||
1 | title: Chaos Computer Club analyzes government malware | 1 | title: Chaos Computer Club analyzes government malware |
2 | date: 2011-10-08 19:00:00 | 2 | date: 2011-10-08 19:00:00 |
3 | updated: 2011-10-09 19:32:32 | 3 | updated: 2011-12-21 20:42:58 |
4 | author: admin | 4 | author: admin |
5 | tags: update, pressemitteilung, staatstrojaner | 5 | tags: update, pressemitteilung, staatstrojaner |
6 | previewimage: /images/0zapftis.png | 6 | previewimage: /images/0zapftis.png |
@@ -61,7 +61,7 @@ delete files, which puts the whole rationale for this method of | |||
61 | investigation into question. | 61 | investigation into question. |
62 | 62 | ||
63 | But the trojan's built-in functions are scary enough, even without | 63 | But the trojan's built-in functions are scary enough, even without |
64 | extending it by new moduls. For the analysis, the CCC wrote it's own | 64 | extending it by new moduls. For the analysis, the CCC wrote its own |
65 | control terminal software, that can be used to remotely control infected | 65 | control terminal software, that can be used to remotely control infected |
66 | PCs over the internet. With its help it is possible to watch screenshots | 66 | PCs over the internet. With its help it is possible to watch screenshots |
67 | of the web browser on the infected PC – including private notices, | 67 | of the web browser on the infected PC – including private notices, |
@@ -100,7 +100,7 @@ integrity protected. Not only can unauthorized third parties assume | |||
100 | control of the infected system, but even attackers of mediocre skill | 100 | control of the infected system, but even attackers of mediocre skill |
101 | level can connect to the authorities, claim to be a specific instance of | 101 | level can connect to the authorities, claim to be a specific instance of |
102 | the trojan, and upload fake data. It is even conceivable that the law | 102 | the trojan, and upload fake data. It is even conceivable that the law |
103 | enforcement agencies's IT infrastructure could be attacked through this | 103 | enforcement agencies' IT infrastructure could be attacked through this |
104 | channel. The CCC has not yet performed a penetration test on the server | 104 | channel. The CCC has not yet performed a penetration test on the server |
105 | side of the trojan infrastructure. | 105 | side of the trojan infrastructure. |
106 | 106 | ||