Fort Meade, August 22: A highly clandestine National Security Agency (NSA) of the United States of America allegedly snooped around the Pakistani Top civil military as well as the civilians using ‘Malware SECONDDATE’, reported by the Intercept. Seconddate is a tool that intercepts web requests and redirects browsers on target computers to an NSA web server. The server then infects the web requests with malware.
The National Security Agency of the United States allegedly created Malware SECONDDATE and the same was used by agency hackers. The hackers used the Malware second date to violate the documents those were crucial documents of Pakistan’s Green Line communications network available in Pakistan’s National Telecommunications Corporation’s (NTC) VIP Division. These are most probably used by the civilians and military leadership in Pakistan. The file is said to be a highly confidential presentation belonging to the SigDev division of NSA.
The Malware, also termed as ‘foxacid’, was mentioned by the former NSA contractor Edward Snowden. Snowden had released an important confidential agency draft manual for implanting malware. The report that was published in the ‘Intercept’ stated that the NSA contractors were instructed to track the use of a Malware program through a 16-character string “ace02468bdf13579” ─ the same string which appears in the SECONDDATE code leaked by a group called ‘ShadowBrokers’.
Johns Hopkins University cryptographer Matthew Green said, “The danger of these exploits is that they can be used to target anyone who is using a vulnerable router. This is the equivalent of leaving lockpicking tools lying around a high school cafeteria. It’s worse, in fact, because many of these exploits are not available through any other means, so they’re just now coming to the attention of the firewall and router manufacturers that need to fix them, as well as the customers that are vulnerable.”