The hack of the year

A Swedish hacker tells how he infiltrated a global communications network used by scores of embassies over the world, using tools freely available on the internet. In August, Swedish hacker Dan Egerstad gained access to sensitive embassy, NGO and corporate email accounts. Were they captured from the clutches of hackers? Or were they being used by spies? Patrick Gray investigates the most sensational hack of 2007. IT WASN'T supposed to be this easy. Swedish hacker Dan Egerstad had infiltrated a global communications network carrying the often-sensitive emails of scores of embassies scattered throughout the world. It had taken him just minutes, using tools freely available for download on the internet.

In time, Egerstad gained access to 1000 high-value email accounts. He would later post 100 sets of sensitive email logins and passwords on the internet for criminals, spies or just curious teenagers to use to snoop on inter-governmental, NGO and high-value corporate email. The question on everybody's lips was: how did he do it? The answer came more than a week later and was somewhat anti-climactic. The 22-year-old Swedish security consultant had merely installed free, open-source software - called Tor - on five computers in data centres around the globe and monitored it. Ironically, Tor is designed to prevent intelligence agencies, corporations and computer hackers from determining the virtual - and physical - location of the people who use it.

View: Full Story @ The Age

Report a problem with article
Previous Story

SCO guilty of lying about Unix code in Linux in Germany

Next Story

Atari ceasing game development (again)

7 Comments

Commenting is disabled on this article.

Oh, c'mon... he is just a script kiddie, a REAL hacker will attack without left any trace of their attempt... and can parasite from a system during years.

Anyways, how was he able to install Tor in those computer?.

And how was caught?

Magallanes said,
Oh, c'mon... he is just a script kiddie, a REAL hacker will attack without left any trace of their attempt... and can parasite from a system during years.

Anyways, how was he able to install Tor in those computer?.

And how was caught?

Did you even bother to RTFA?

so it gets thicker than this... not only did tor get compromised by him, but tor is used by hackers who compromised other people's email accounts?