Search Results for: syria

A Call to Harm: New Malware Attacks Target the Syrian Opposition

The Citizen Lab is pleased to announce the publication of A Call to Harm: New Malware Attacks Against the Syrian Opposition. This research report by Morgan Marquis-Boire and John Scott-Railton examines two recent cyber attacks targeting the Syrian opposition: malware masquerading as the circumvention tool Freegate and a campaign masquerading as a call to arms by a pro-opposition cleric.

Syrian Activists Targeted with BlackShades Spy Software

The use of remote surveillance software against activists has been a feature of the ongoing conflict in Syria. Today, the EFF and Citizen Lab report on the use of a new toolkit by a previously observed attacker. This actor has been circulating malware which surreptitiously installs BlackShades RAT on victims machines.

The Canadian Connection: An investigation of Syrian government and Hezbullah web hosting in Canada

A new report, entitled The Canadian Connection: An investigation of Syrian government and Hezbullah web hosting in Canada, continues Citizen Lab research into the intersection of the private sector, authoritarianism, and cyberspace regulation, turning our attention to a component of the Internet that does not typically receive the same amount of attention as filtering, surveillance, and computer network attack products and services: web hosting services.

Syria’s digital counter-revolutionaries

In this article, The Atlantic reports on the Syrian Electronic Army, an open and organized pro-government computer attack group that is operating with at least tacit support from the regime, who uses DDoS attacks, phishing scams, and other tricks to fight opposition activists online.

Fake Facebook page targets pro-revolution Syrian users

The Information Warfare Monitor (IWM), a research collaboration between the Citizen Lab at the Munk School of Global Affairs, University of Toronto and the SecDev Group, an operational think tank based in a Ottawa, Canada, has uncovered an attempt to lure pro-revolution Syrian Facebook users into providing their login credentials by using a fake URL and login page.