+

Cookies on the Business Insider India website

Business Insider India has updated its Privacy and Cookie policy. We use cookies to ensure that we give you the better experience on our website. If you continue without changing your settings, we\'ll assume that you are happy to receive all cookies on the Business Insider India website. However, you can change your cookie setting at any time by clicking on our Cookie Policy at any time. You can also see our Privacy Policy.

Close
HomeQuizzoneWhatsappShare Flash Reads
 

Nicolas Sarkozy's Naked Wife Used As Bait By G20 Hackers

Dec 10, 2013, 21:37 IST

REUTERS

Suspected Chinese hackers have systematically targeted diplomats working within foreign ministries in European countries, reports Nicole Perlroth of The New York Times.

Advertisement

The hackers were hoping to find out how those ministers viewed the U.S. ahead of a key 2011 G20 finance meeting in Paris, according to a FireEye report Perlroth read.

What's interesting, though, is yet again the hackers used target-specific spear phishing attacks to breach the diplomats' computers:

The attackers sent their targets emails with a link that claimed to contain naked photos of Carla Bruni-Sarkozy, wife of former President Nicolas Sarkozy of France. Once clicked, attackers were able to gain a foothold into their targets' computer networks, though investigators said they were unable to see which files the attackers had taken.

As a former super model, Carla Bruni has several revealing images floating around the cyber ether, and made headlines when prints of those images auctioned for big bucks.

Advertisement

Needless to say, the diplomats took the bait.

Whether they made good on their promise or not, the hackers were able surreptitiously to steal information from infected computers.

Spear phishing attacks usually come in the form of an official looking email that contains a link. The link directs the user to a website containing malware, or the link itself contains an auto-exec file which deploys malware the moment the user clicks.

They are the most commonly used and researched form of security breach companies and governments have to mitigate. Spearphishing is user activated and so requires no expensive or risky use of software backdoors or brute force attacks.

Often, upon closer inspection of the email address, users can usually identify that the sender is an imposter.

Advertisement
You are subscribed to notifications!
Looks like you've blocked notifications!
Next Article