This is the story about when a nation state hacks into a company within another nation.
Sponsors
This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/dark. And use promo code DARKNET25 to get 25% off.
Sources
- European Commission suffers ‘serious’ cyberattack
- ‘Serious’ cyber attack on EU bodies before summit
- EU parliament suspends webmail after cyber-attack
- NSA Spied on European Union Offices
- GCHQ Tapping into International Fibre Optic Cables, Shares Intel with NSA
- GCHQ taps fibre-optic cables for secret access to world’s communications
- Britain’s GCHQ Hacked Belgian Telecoms Firm
- Belgacom takes actions related to IT security
- Belgacom clears up after hack attempt
- Bellens: “No indication that Belgacom customers have been affected”
- Bics: a spider in the web of global telephony
- How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID
- State-sponsored economic espionage is on the rise, strategist says
- GCHQ Used Fake LinkedIn Pages to Target Engineers
- GCHQ hacked GRX and OPEC employees via Quantum inserts, Snowden papers show
- Belgacom Annual Report 2013
- NSA, GCHQ, accused of hacking Belgian smartcard crypto guru
- Belgian professor in cryptography hacked
- Belgacom to brand all domestic Belgian services as Proximus
- Global mobile roaming hub accessible and vulnerable, researchers find
- British Spies Face Legal Action Over Secret Hacking Programs
- Mass surveillance of UK citizens on Facebook, YouTube and Google is legal, says official
- GCHQ sued by ISPs over state-sponsored hacking
- ISPs take legal action against GCHQ for ‘attacking international infrastructure’
- ISPs haul GCHQ into COURT over dragnet interwebs snooping
- ISPs take legal action against GCHQ
- Glenn Greenwald against the world
- NSA/GCHQ: The HACIENDA Program for Internet Colonization
- Belgacom says alleged GCHQ APT attack cost firm £12 million
- Interview: Belgacom looks back on the espionage affair
- Symantec exposes powerful ‘Regin’ malware
- Secret Malware in European Union Attack Linked to U.S. and British Intelligence
- This Malware May Have Gotten the NSA Caught With Its Hand in the Cookie Jar
- Regin: Top-tier espionage tool enables stealthy surveillance
- Highly advanced backdoor trojan cased high-profile targets for years
- ‘Regin’: The ‘New Stuxnet’ spook-grade SOFTWARE WEAPON described
- Researchers uncover government spy tool used to hack telecomes and Belgian cryptographer
- UK, US behind Regin malware, attacked European Union networks
- Kaspersky Labs Discloses More Info on the Super-Spy Malware Regin
- What we know about ‘Regin,’ the powerful malware that could be the work of NSA
- Security firms uncover ‘sophisticated’ Regin spyware
- NSA, GCHQ or both behind Stuxnet-like Regin malware?
- ‘Regin’ Attack Platform Targeted GSM Networks
- GCHQ faces new Belgacom hack allegations
- The Inside Story Of How British Spies Hacked Belgium’s Largest Telco
- Experts Unmask ‘Regin’ Trojan as NSA Tool
- NSA Preps America for Future Battle
- Belgacom Annual Report 2014
- How to detect sneaky NSA ‘Quantum Insert’ Attacks
- Investigatory Powers Tribunal, Amended Statement of Grounds (ISPs - GCHQ)
- Symantec Security Response Whitepaper. Regin: Top-tier espionage tool enables stealthy surveillance
- Regin: Further unravelling the mysteries of a cyberespionage threat
- UK spy agency GCHQ admits it carries out computer hacking
- Privacy International and Greennet & Others v The Secretary of State for Foreign and Commonwealth Affairs and The Government Communications Headquarters (“GCHQ”) - Investigatory Powers Tribunal Judgement
- Privacy International and Greennet & Others v The Secretary of State for Foreign and Commonwealth Affairs and The Government Communications Headquarters (“GCHQ”) - Monckton Chambers, Case Note
- This is everything Edward Snowden revealed in one year of unprecedented top-secret leaks
- Security Center - Backdoor.Regin
- How U.K. Spies Hacked A European Ally and Got Away With It
- Report confirms Britain hacked Belgium’s largest telco
- British sabotage investigation hacking Belgacom
- Belgium: Oi, Brits, explain why Belgacom hack IPs pointed at you and your GCHQ
- Threat Intelligence Report for the Telecommunications Industry
- Proximus Group (previously known as Belgacom Group)
- Belgacom/Proximus Financial Reports
- The Regin Platform
- The Investigatory Powers Tribunal
- Government Communications Headquarters (GCHQ) Website
- UK National Intelligence Machinery
Audio/Video clips
- Big Game Hunting: The Peculiarities of Nation-State Malware Research
- GCHQ could be behind ‘super-spyware’ attack
- GRX & A spy agency talk at Hack in the Box, Amsterdam, 2014
- Omer Coskun – Why nation-state malwares target Telco Networks: Regin and its counterparts
- Press TV - ISPs sue GCHQ News Report
- Alexander De Croo - Privacy and Secrecy in the Digital Age - Davos Open Forum 2016
- Annie Machon - NSA vs. British GCHQ
- Craig Mundie [Microsoft] - Fireside Chat with Craig Mundie
- Eric Cole - What is a Nation State Cyber Attack
- Vicente Diaz [Kaspersky] - A Futurist’s Look at Nation-State Cyberespionage
- BBC MI5, MI6 and GCHQ IN FULL HEARING - United Kingdom secret services before the select committee for the first time ever in public.
Attribution
Darknet Diaries is created by Jack Rhysider.
Episode artwork by odibagas.
Theme music created by Breakmaster Cylinder. Theme song available for listen and download at bandcamp. Or listen to it on Spotify.
Additional music by Epidemic Sound.
Equipment
Recording equipment used this episode was the Shure SM7B, a cloudlifter, Audient ID4, Sony MDR7506 headphones, and Hindenburg audio editor.
Transcript
[FULL TRANSCRIPT]
JACK: [MUSIC] It’s naïve to think that nations aren’t spying on each other, like deploying secret agents in each other countries. But in the modern times we live in, when nations rely so heavily on computers to store communications and data, that spying is now done online. Governments train people to become elite hackers, to break into networks of other countries and snoop on their e-mails and databases. You see, in cyberspace, the rules are unclear on what one nation can do to another. The geographical boundaries are unseen and the attacks go undetected. Even if you see an attack, it’s almost impossible to know who did it. Nation state cyber-attacks intent on spying are covert and silent. The malware they use can be sitting inside the network of targeted industries and organizations for years before they’re found.