Lustful Rebels Get Catfished in Syria

Hackers posing as attractive women steal sensitive info from rebels that could greatly benefit pro-Assad forces.

Recently, opposition fighters in Syria looking for love on the internet got more than they bargained for when it was revealed that they were actually chatting with the enemy. In a report released Monday from security research firm FireEye, the result of a years-long investigation, it was confirmed that members of a group, perhaps sympathetic to President Bashar al-Assad, posing as young, attractive females, were able to utilize a catfishing scheme to collect over 7.7 gigabytes worth of stolen data from 12,356 contacts in at least eight countries. These hackers, using avatars and fake photos, made contact with rebels via Skype and Facebook requesting a photo swap. Once downloaded, these malware-laden photos were able to absorb a plethora of sensitive information including strategic contacts, battle plans, movement information, even the IDs of refugees who’d fled to Turkey—often housed on basic phones and laptops. While the FireEye report stopped short of making a direct link between pro-Assad forces and the hackers, the information the group recovered would certainly have benefitted Assad’s army.

Image via FireEye

The hackers were startlingly thorough in their ruse, creating detailed fake profiles on social media with country-appropriate names, dummy opposition websites, and elaborate Live Cam IDs. Once an affection-starved rebel was located and willing to chat, the target was asked if they were on a smartphone or computer—enabling the launch of precise malware. (Androids proved to be the most popular smartphone with fighters, FYI.) According to coverage in The New York Times: “Sometimes, the threat group would take whole sets of files pertaining to upcoming large-scale military operations. These included correspondence, rosters, annotated satellite images, battle maps, orders of battle, geographic coordinates for attacks, and lists of weapons from a range of fighting groups.”

The FireEye report also found a treasure trove of archived chats and documents while investigating malware embedded in PDF documents. These were found to contain conversations between media activists, humanitarian aid workers, and other Syrian opposition forces in the region and internationally. One such piece of information was a conversation held in December 2013 between a fighter and an operative posing as a woman in Lebanon named Iman Almasri who claimed to work “in a programing company in Beirut.” After chatting for a few hours, the rebel and the woman exchanged photos. “Angel like,” he responded. “You drive me crazy.” Little did he know.

Image via Fireye

via David Leavitt / Twitter

Anyone who has ever worked in retail knows that the worst thing about the job, right after the pay, are the unreasonable cheapskates who "want to talk to your manager" to get some money off an item.

They think that throwing a tantrum will save them a few bucks and don't care if they completely embarrass themselves in the process. Sometimes that involves belittling the poor employee who's just trying to get through their day with an ounce of dignity.

Twitter is rallying around a gal named Tori who works at a Target in Massachusetts after she was tweet-shamed by irate chapekate, journalist, and Twitter troll, David Leavitt.

Keep Reading

Childbirth is the number one reason American women visit the hospital, and it ain't cheap. In fact, it's getting more and more expensive. A new study published in Health Affairs found that the cost of having a baby with employer-sponsored health insurance increased by almost 50% in the past seven years.

The study evaluated "trends in cost-sharing for maternity care for women with employer-based health insurance plans, before and after the Affordable Care Act," which was signed into law in 2010. The study looked at over 657,061 women enrolled in large employer-sponsored health insurance plans who delivered babies between 2008 and 2015, as these plans tend to cover more than plans purchased by small businesses or individuals.

Keep Reading

A meteorite crashed into Earth nearly 800,000 years ago. The meteor was 1.2 miles wide, and the impact was so big, it covered 10% of the planet with debris. However, scientists haven't been able to find the impact site for over a century. That is, until now. A study published in the Proceedings of the National Academy of Sciences journal believes the crash site has been located.

Tektites, which are essentially rocks that have been liquefied from the heat of the impact and then cooled to form glass, help scientists spot the original impact site of a meteor. Upon impact, melted material is thrown into the atmosphere, then falls back to the ground. Even if the original crater has disappeared due to erosion or is hidden by a shift in tectonic plates, tektites give the spot away. Tektites between 750,000 to 35.5 million years old have been found in every continent except Antarctica.

Keep Reading
The Planet