Home Hacking Contained in the 2014 hack of a Saudi embassy

Contained in the 2014 hack of a Saudi embassy

by ethhack

An attacker claiming to be ISIS took management of the official e mail account of the Saudi Embassy within the Netherlands in August, 2014 and despatched emails to greater than a dozen embassies at The Hague demanding $50 million for ISIS, or they might blow up a significant diplomatic reception, paperwork seen by CSO reveal.

The assault compromised the Saudi embassy’s non-classified laptop community. They deployed a garden-variety rootkit on the workstation of the ambassador’s secretary and took over the embassy’s official e mail account.

Nobody was ever formally held accountable, regardless of an inner investigation. Given the low sophistication of the assault, specialists inform CSO it is unattainable to say whether or not the attacker actually was a part of an organized effort by ISIS, a random supporter, or a nation-state intelligence company masquerading as ISIS for motives unknown.

The story started with a weird try to defraud a Saudi schoolmaster within the UK of a €200 visa price and ended with a $50 million ransom demand and a manhunt by the Dutch diplomatic police because the clock ticked all the way down to September 23, Saudi Nationwide Day.

Paperwork obtained by CSO present particulars of the assault and the Saudi response. This supplies an fascinating window into how a authorities would possibly react to a suspected nation-state assault and raises questions concerning the degree of safety deployed at embassies around the globe.

The primary indicator of compromise

In response to the paperwork, the embassy first turned conscious that one thing was amiss when Dr. Sumaya Alyusuf, beforehand in the news herself a decade ago as the pinnacle of a British college that owned radical Islamist textbooks funded by the Saudi royal household, emailed the Saudi embassy asking for help in procuring a visa to India and was subsequently requested to wire €200 by way of MoneyGram.

Source link

Related Articles

Leave a Comment