Results
1 Total
0.0
VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN
Document
Release Date:
2014-03-12
Slides from an NSA Turbulence presentation describe two of the agency’s specialised implants, aimed at compromising virtual private networks (VPNs) and online telephony (VOIP): see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123
APEX VPN Phases
► VPN Phase 1: IKE Metadata Only (Spin 15)
- IKE packets are exfiled to TURMOIL APEX.
■ APEX reconstructs/r...