NSA 'hijacked' criminal botnets to install spyware: Report

Advertisement
By Reuters | Updated: 13 March 2014 09:52 IST

While U.S. law enforcement agencies have long tried to stamp out networks of compromised computers used by cyber criminals, the National Security Agency has been hijacking the so-called botnets as a resource for spying.

The NSA has "co-opted" more than 140,000 computers since August 2007 for the purpose of injecting them with spying software, according to a slide leaked by former NSA contractor Edward Snowden and published by The Intercept news website on Wednesday.

Advertisement

Botnets are typically used by criminals to steal financial information from infected machines, to relay spam messages, and to conduct "denial-of-service" attacks against websites by having all the computers try to connect simultaneously, thereby overwhelming them.

In November, Federal Bureau of Investigation Director James Comey told the Senate that botnets had "emerged as a global cyber security threat" and that the agency had developed a "comprehensive public-private approach to eliminate the most significant botnet activity and increase the practical consequences for those who use botnets for intellectual property theft or other criminal activities."

Advertisement

According to the NSA slide published by The Intercept, one technique the intelligence agency used was called QUANTUMBOT, which "finds computers belonging to botnets, and hijacks the command and control channel." The program was described as "highly successful."

Reuters reported in May that U.S. agencies had tapped botnets to harvest data from the machines' owners or to maintain the ability to issue the infected computers new commands.

Advertisement

The slide leaked by Snowden is the first confirmation of the practice, and underscores the complications for the NSA of balancing its major mission of providing eavesdropping capability with the less well-funded missions of protecting critical national assets and assisting law enforcement.

The Top Secret slide was marked for distribution to the "Five Eyes" intelligence alliance, which includes the United States and Britain.

Advertisement

The NSA declined to confirm or deny the existence of the program. It is not known if the botnets hijacked by the agency

were in other counties or in the United States, or if the botnets could have been recaptured by criminals.

Many botnet operations disable the machines' security software, leaving them vulnerable to new attacks by others.

In a written statement, an NSA spokeswoman said: "As the President affirmed on 17 January, signals intelligence shall be collected exclusively where there is a foreign intelligence or counterintelligence purpose to support national and departmental missions, and not for any other purposes.

"Moreover, Presidential Policy Directive 28 affirms that all persons - regardless of nationality - have legitimate privacy interests in the handling of their personal information, and that privacy and civil liberties shall be integral considerations in the planning of U.S. signals intelligence activities."

The Intercept article and supporting slides showed that the NSA had sought the means to automate the deployment of its tools for capturing email, browsing history and other information in order to reach as many as millions of machines.

It did not say whether such widespread efforts, which included impersonating web pages belonging to Facebook Inc and other companies, were limited to computers overseas.

If it did pursue U.S. computers, the NSA also could have minimized information about those users.

© Thomson Reuters 2014

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. OnePlus Nord CE 6, Nord CE 6 Lite Will Launch in India on This Date
  2. Dell 15 Refreshed With Up to Intel Core Ultra 7, 15.6-Inch Display
  3. Apple WWDC 2026 Artwork Teases New Siri Interface, AI Features in iOS 27
  4. OnePlus Ace 6 Ultra, New Gaming Controller Will Launch on This Date
  5. Poco C81, C81x to Launch in India With Up to 6,300mAh Battery on This Date
  6. Apple Withholds Data in India Antitrust Case, CCI Sets Final Hearing
  7. Resident Evil Requiem Could Get Mercenaries Arcade Mode Next Month
  8. Adobe Introduces Agentic Platform CX Enterprise at Adobe Summit 2026
  9. Toshiba Z670SP MiniLED TV Series Launched in India: See Pricing, Features
  10. Huawei Watch Fit 5 Series Debuts With AMOLED Displays, HarmonyOS: See Price
  1. Adobe Introduces CX Enterprise, an Agentic AI Platform to Automate Customer Experience for Businesses
  2. Infinix GT 50 Pro Global Launch Date Announced; Will Debut With Liquid Cooling, Pressure-Sensitive Triggers
  3. Huawei Watch Fit 5, Watch Fit 5 Pro Launched With AMOLED Screens, HarmonyOS and Up to 10 Days Battery Life
  4. Apple Withholds Data in India Antitrust Case, CCI Sets Final Hearing
  5. Anthropic Introduces Claude Design, an AI Tool to Generate Visual Prototypes and Pitch Decks
  6. Nee Forever OTT Release Date: When and Where to Watch This Tamil Romantic Drama Online?
  7. Huawei Pura 90 Pro Max Launched With 200-Megapixel Telephoto Camera Alongside Huawei Pura 90, Pura 90 Pro
  8. Nukkad Naatak OTT Release Date: When and Where to Watch This Social Drama Online?
  9. Huawei Pura X Max Launched as Company’s First Wide Foldable With 5,300mAh Battery: Price, Features
  10. Poco C81, Poco C81x India Launch Date Revealed Along With Design and Key Specifications
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.