335
submitted 8 months ago by 0x815@feddit.de to c/europe@feddit.de

Four German military officials discussed what targets German-made Taurus missiles could potentially hit if Chancellor Olaf Scholz ever allowed them to be sent to Kyiv, and the call had been intercepted by Russian intelligence.

According to German authorities, the "data leak" was down to just one participant dialling in on an insecure line, either via his mobile or the hotel wi-fi.

The exact mode of dial-in is "still being clarified", Germany has said.

"I think that's a good lesson for everybody: never use hotel internet if you want to do a secure call," Germany's ambassador to the UK, Miguel Berger, told the BBC this week. Some may feel the advice came a little too late.

Eyebrows were raised when it emerged the call happened on the widely-used WebEx platform - but Berlin has insisted the officials used an especially secure, certified version.

Professor Alan Woodward from the Surrey Centre for Cyber Security says that WebEx does provide end-to-end encryption "if you use the app itself".

But using a landline or open hotel wi-fi could mean security was no longer guaranteed - and Russian spies, it's now supposed, were ready to pounce.

you are viewing a single comment's thread
view the rest of the comments
[-] anticurrent@sh.itjust.works 18 points 8 months ago

How is it possible to accomplish a man in the middle attack on a TLS secure connection ? Hotel wifi or not, unless something major like Singaporean gov interfered with the connection, forced forged certificates into his phone, I don't see how this was put off by compromising the connection .

I bet they are covering for the Fact that one of them has downloaded malware into his device to masturbate to a hot girl living next to him kinda ad. and then malware shared back that data to Russia. or they have a spy among them and Germany isn't ready to admit having its defense forces compromised with Russian assets.

[-] bluemellophone@lemmy.world 6 points 8 months ago

The easiest explanation is the room was bugged and the general stayed there.

[-] Maggoty@lemmy.world 4 points 8 months ago

Everyone forgets the old school stuff. It doesn't matter how well your connection is encrypted if the GRU has the room next to you.

[-] ErwinLottemann@feddit.de 4 points 8 months ago

they were using an insecure method to connect with webex, so something like a dial-in number for using it without a computer i guess. that is probably not encrypted. the meeting could have been a fax anyway

[-] anticurrent@sh.itjust.works 1 points 8 months ago* (last edited 8 months ago)

Do you think Webex doesn't reject insecure connections ? it is the bare minimum for any web app.

[-] anticurrent@sh.itjust.works 2 points 8 months ago

but the audio in the hands of the Russians sounds crystal clear! and you can hear all the participants very clearly, which means it has been captured from one of the involved devices.

[-] ErwinLottemann@feddit.de 1 points 7 months ago

not sure how they would check a landline call for security ๐Ÿคท

[-] Passerby6497@lemmy.world 1 points 8 months ago

TLS means dick if you have a nation-state that can mint a cert that would be trusted by your browser. Unless you're using a site that does cert pinning (which is basically a list your browser has of URLs and expected cert fingerprints as published by the site owners) or the fuckery that Google gets up to in chrome (they monitor and immediately ping the mother ship if a Google property is detected using an unauthorized cert), you can't really stop or detect it as an end user.

Your computer trusts so many companies to vouch for other sites' legitimacy that it's not out of the realm of possibilities that they leaned on a CA and minted a cert to let them MITM the connection. You're still connecting to a "trusted" cert, even if it isn't the legitimate one.

[-] Maggoty@lemmy.world 1 points 8 months ago

All the data goes to the man in the middle. Worse, there's nothing stopping a user from connecting for other things. So a man in the middle can act like a trusted source while sending malware to the device. If they compromised the phone/computer then the encrypted tunnel is moot. It has to be decrypted at some point, even if the malware literally just creates a recording.

this post was submitted on 08 Mar 2024
335 points (97.5% liked)

Europe

8332 readers
1 users here now

News/Interesting Stories/Beautiful Pictures from Europe ๐Ÿ‡ช๐Ÿ‡บ

(Current banner: Thunder mountain, Germany, ๐Ÿ‡ฉ๐Ÿ‡ช ) Feel free to post submissions for banner pictures

Rules

(This list is obviously incomplete, but it will get expanded when necessary)

  1. Be nice to each other (e.g. No direct insults against each other);
  2. No racism, antisemitism, dehumanisation of minorities or glorification of National Socialism allowed;
  3. No posts linking to mis-information funded by foreign states or billionaires.

Also check out !yurop@lemm.ee

founded 1 year ago
MODERATORS