This article is from the source 'bbc' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.

You can find the current article at its original source at http://www.bbc.co.uk/news/technology-31093136

The article has changed 2 times. There is an RSS feed of changes available.

Version 0 Version 1
Fake 'femme fatales' aid Syrian battle hack Fake 'femmes fatales' aid Syrian battle hack
(about 5 hours later)
Fake "femme fatales" have been used to steal battle plans and other data from Syrian opposition groups, a report suggests. Fake "femmes fatales" have been used to steal battle plans and other data from Syrian opposition groups, a report suggests.
The virtual women had been used in text chat on Skype to engage potential victims, security company FireEye said.The virtual women had been used in text chat on Skype to engage potential victims, security company FireEye said.
And data had been stolen via booby-trapped images of the women to whom the victims had believed they had been chatting.And data had been stolen via booby-trapped images of the women to whom the victims had believed they had been chatting.
"We cannot positively identify who is behind these attacks," said FireEye."We cannot positively identify who is behind these attacks," said FireEye.
Tailored attackTailored attack
Security researcher Nart Villeneuve added: "We know that they used social media to infiltrate victims' machines and steal military information that would provide an advantage to President [Bashar al-]Assad's forces on the battlefield."Security researcher Nart Villeneuve added: "We know that they used social media to infiltrate victims' machines and steal military information that would provide an advantage to President [Bashar al-]Assad's forces on the battlefield."
The attack had been mounted between November 2013 and January 2014 and the information that had been stolen had come to light as FireEye had investigated a separate incident, it said.The attack had been mounted between November 2013 and January 2014 and the information that had been stolen had come to light as FireEye had investigated a separate incident, it said.
In total, it said, 7.7GB of data had been stolen, including more than 240,000 messages, 31,000 conversations and 64 separate Skype account databases.In total, it said, 7.7GB of data had been stolen, including more than 240,000 messages, 31,000 conversations and 64 separate Skype account databases.
Annotated satellite images and maps, the times that assaults had been planned and lists of the type of weapons to be used in each phase of an upcoming battle had all been included among the stolen data, FireEye said.Annotated satellite images and maps, the times that assaults had been planned and lists of the type of weapons to be used in each phase of an upcoming battle had all been included among the stolen data, FireEye said.
The attackers had also grabbed information about the movement of weapons away from the front line, as well as casualties, financing and humanitarian activity, it said.The attackers had also grabbed information about the movement of weapons away from the front line, as well as casualties, financing and humanitarian activity, it said.
According to FireEye:According to FireEye:
The malware was a well-known remote-access tool known as DarkComet but had been adapted to the particular circumstances in Syria, said FireEye.The malware was a well-known remote-access tool known as DarkComet but had been adapted to the particular circumstances in Syria, said FireEye.
Victims were located mainly in Syria but also in other Middle Eastern and European countries, it said.Victims were located mainly in Syria but also in other Middle Eastern and European countries, it said.