Dark Caracal collected and exposed on the open internet hundreds of gigabytes of personally identifiable data in more than 21 countries. REUTERS/Kacper Pempel/Illustration
Your feedback is important to us!
We invite all our readers to share with us their views and comments about this article.
Disclaimer: Comments submitted by third parties on this site are the sole responsibility of the individual(s) whose content is submitted. The Daily Star accepts no responsibility for the content of comment(s), including, without limitation, any error, omission or inaccuracy therein. Please note that your email address will NOT appear on the site.
Alert: If you are facing problems with posting comments, please note that you must verify your email with Disqus prior to posting a comment. follow this link to make sure your account meets the requirements. (http://bit.ly/vDisqus)
In the spring of 2017, researchers at the San Francisco-based mobile security firm Lookout were toiling over heaps of data, investigating a campaign of phishing and malware conducted on behalf of the Kazakh government against journalists, lawyers and political dissidents.What researchers were not expecting, however, was to stumble upon a twin operation originating from Lebanon, which would turn out to be one of the most prolific hacking campaigns ever documented. On Jan. 18, Lookout and a second security firm, the Electronic Frontier Foundation, released a report linking Dark Caracal to Lebanon's General Security.Iran, however, is only one of a number of actors likely to be spying on Lebanon.
Crisis ahead for creaking water sector
Lebanese enthusiasts ‘mining’ a crypto future
Gender equality not a side project: Abirafeh on her work
FOLLOW THIS ARTICLE