How is planting a spyware in the nuclear talk possible

How is planting a spyware in the nuclear talk possible

This post is also available in: heעברית (Hebrew)

39601903_mFollowing reports on Israel’s involvment in planting a spy software in the hotels where the nuclear talks took place, I-HLS was given the professional opinion of Doron Sivan, the owner of MadSec which specializes in information security, on the technology that makes such a thing possible:

“Breaking into the Nuclear Conference Talks could have only been by a high-level cyber organization, likely by a country, due to its high level of sophistication. This breaking in is made of two parts – the first is a Trojan Horse encoded in a highly sophisticated way, and the second is taking advantage of five unknown vulnerabilities, called in the professional language Zero-Day.

Most Trojan Horses can open a camera and microphone, but in this case the sophistication is in encrypting in the highest possible level, thus preventing the security measures and anti-virus from detecting it. This is a Trojan Horse made from scratch. This isn’t some mutation or a new version of a Trojan Horse, but a brand new one – a clever and undeteced one. Developing this kind of a Trojan Horse is well beyond the ability of regular hackers in the crime organizations as it required software engineering at a high level, a very research unit that involved information, planning and a lot of effort. Only a very large, sophisticated body, such as a state, is capable of reaching such level of development.

It’s important to meantion that a Trojan Horse, as genius as it might be, has to get inside in some way – by a hotel employee, through surfing the website or opening a mail. For this reason, oit’s important to keep an eye on all entrance portals and to be alert. In this case, even a hotel that allegedly has very sensitive information becomes a target since it hosts people dealing with very such information. Only immunity check-ups at close frequencies can detect suspicious activity of this sort.

Doron Sican, a physicist with extensive training in the computers and communication fields. Sivan is the author of the best-selling “Hacking and security systems”, “Hardware and Software Guide for PC Technicians” and “PC Technicians Guide”. He is an organizational consultant advisor and speaker for the world’s leading communication companies.