Image: Sobhan Farajvan/Pacific Press/LightRocket via Getty Images
Hacking. Disinformation. Surveillance. CYBER is Motherboard's podcast and reporting on the dark underbelly of the internet.
"It's bold," Sherrod DeGrippo, the senior director of threat research and detection at Proofpoint said in a phone call, adding that it's not too common to see state-sponsored actors being so chatty and trying to set up calls.Kendel, one of the academics that the hackers impersonated, told Motherboard that "of course it's stressful" to be used as bait, but he also looked at the bright side.“On the upside I had conversations with a lot of interesting people that I would probably not have had interaction with otherwise. I’m taking it as a lived case study,” he said in an email."I think it was smart of them to pick me. The UK does not recognise identity theft as a crime in itself," Kendel added. "Working in the field of diplomacy and at a renowned institution, yet not senior enough to be implausible for first contact. A mixture of slightly clumsy but also highly sophisticated."
DeGrippo added that sometimes hackers don't actually get on a call but just do this to get the victim's username on a particular app, or their phone number, which could be useful for future hacking attempts. Or, she speculated, perhaps the hackers' government could put that number on an espionage list in case the targets ever travel to the country and use a phone network under the governments' control.Do you research or track similar hacking campaigns? We’d love to hear from you. You can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, OTR chat at lorenzofb@jabber.ccc.de, or email lorenzofb@vice.com
Advertisement
Advertisement