A rebel fighter of al-Jabha al-Shamiya (the Shamiya Front) mans a checkpoint in the Masaken Hanano neighbourhood of Aleppo February 1, 2015. REUTERS/Hosam Katan
Your feedback is important to us!
We invite all our readers to share with us their views and comments about this article.
Disclaimer: Comments submitted by third parties on this site are the sole responsibility of the individual(s) whose content is submitted. The Daily Star accepts no responsibility for the content of comment(s), including, without limitation, any error, omission or inaccuracy therein. Please note that your email address will NOT appear on the site.
Alert: If you are facing problems with posting comments, please note that you must verify your email with Disqus prior to posting a comment. follow this link to make sure your account meets the requirements. (http://bit.ly/vDisqus)
Hackers targeted Syrian opposition members with online "honey traps," posing as female supporters to steal battle plans and the identity of defectors, a security firm said in a report Monday.FireEye said it was unclear whether the information stolen from the opposition had been passed onto the Syrian government and who the hackers were working for.Most of the stolen material was created between May 2013 and December 2013, though some of it dated back to 2012 and as recently as January 2014 .The hackers also used other tactics, including creating fake social media accounts and Syrian opposition websites that encouraged visitors to click on links that would infect their computers.FireEye was unable to identify where the hackers it tracked were based, but it noted that their servers were outside of Syria and their tools and tactics differed from previous Syrian hackers.
FOLLOW THIS ARTICLE