It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Russia spied on foreign powers at last month’s G20 summit by giving delegations USB pen drives capable of downloading sensitive information from laptops, it was claimed today.
The devices were given to foreign delegates, including heads of state, at the summit near St Petersburg, according to reports in two Italian newspapers, La Stampa and Corriere della Sera.
Downing Street said David Cameron was not given one of the USB sticks said to have contained a Trojan horse programme, but did not rule out the possibility that officials in the British delegation had received them.
The Prime Minister's official spokesman said: "My understanding is that the Prime Minister didn't receive a USB drive because I think they were a gift for delegates, not for leaders."
Asked if Downing Street staff were given the USBs, he said: "I believe they were part of the gifts for delegates."
Dmitry Peskov, Vladimir Putin's spokesman, flatly denied the allegations, describing the Italian stories as a poorly disguised effort to divert attention from reports of US intelligence services spying on Angela Merkel and other European allies.
"These are really funny reports, actually. First of all they have no sources. It is a bold attempt to switch attention from very real problems existing between European capitals and Washington. It is a classic example of that," he told the Telegraph on Tuesday.
matafuchs
how Russia 'gifted' USB flash drives that were then used to spy on the recipients.
Now, this would be a rookie mistake to use this
So the attacker went into the cafeteria and ate, but he also did what he called "USB key drops". That means, he dropped USB sticks with names like ’Payroll’ or ’Strategy 2009 ’ throughout the entire cafeteria. The USBs had rootkits on them and many contained an autorun rootkit...
alfa1
matafuchs
how Russia 'gifted' USB flash drives that were then used to spy on the recipients.
Now, this would be a rookie mistake to use this
Very much an idiot mistake to use a USB drive that you cant be sure hasnt been tampered with.
In the old days the "bad guys" would leave floppy disks lying around for the suspect idiot to pick up and use, but USB drives are even easier to make into a weapon for breaking security.
I recall reading a few years ago how a company asked for an external consultant to attempt to break into their network. A few USB drives lying about in the carpark where the smokers hung out was all that was needed. The company employees picked them up, plugged them back at their desks, and security was cracked wide open.
Falling for the oldest trick in the book.
Here is another random example:
So the attacker went into the cafeteria and ate, but he also did what he called "USB key drops". That means, he dropped USB sticks with names like ’Payroll’ or ’Strategy 2009 ’ throughout the entire cafeteria. The USBs had rootkits on them and many contained an autorun rootkit...
edit on 30-10-2013 by alfa1 because: (no reason given)
Kryyptyk
reply to post by matafuchs
Yeah...as always, its just another diversionary tactic. The NSA has been caught with their pants down, over and over...this is just a way to distract from all that.
Though, I have to be honest...even if it were true, nobody would really care about G20 being spied on.
alfa1
Very much an idiot mistake to use a USB drive that you cant be sure hasnt been tampered with.
In the old days the "bad guys" would leave floppy disks lying around for the suspect idiot to pick up and use, but USB drives are even easier to make into a weapon for breaking security.
Agit8dChop
reply to post by matafuchs
oldest trick in the book. I doubt they fell for it.