THE ROLE OF “DARKCOMET” IN THE SYRIAN CONFLICT

Authors: Natia Pilashvili, Mariam Kikliashvili
Affiliation: Ivane Javakhishvili Tbilisi State University

Category:

Keywords: კიბერდანაშაული, კიბერშეტევა, დისტანციური მართვის მექნიზმი(RAT), „ტროიანი“, „ DarkComet”, „სირიის კონფლიქტი.
ABSTRACT. In the 21st century, in parallel with rapid technological progress, the increasing trend of unsolved and inexcusable crimes is marked by cybercrime, often referred to as "the crime of the future." Malicious software, one of the key mechanisms of cybercrime, makes it easy for us to be victims of it. And when it comes to mass conflicts, it becomes even more important. One example of this is the Syrian government's use of „DarkComet“, to gain full control over its opponents and obtain desired information on their action plans

References:

McMillan, Robert. “How The Boy Next Door Accidentally Built a Syrian Spy Tool”(07/11/2012) https://www.wired.com/2012/07/dark-comet-syrian-spytool/? fbclid=IwAR1_9WwMBqk2iTsGLwXfmCn03Gt- 1b0BK3MmERTEZOL2iAL2Ve69gfV_qHU
“DarkComet”(2012) https://www.enigmasoftware.com/darkcometremoval/? fbclid=IwAR1iDHGo3W5J3PCL2sxpP5cyEmGWBzdJzzN1XI1jCuQvel5v1dowPc8006Q
“DarkComet Surfaced in The Targeted Attacks in Syrian Conflict”(23/02/2012) https://blog.trendmicro.com/trendlabs-security-intelligence/darkcomet-surfaced-in-the-targetedattacks- in-syrian-conflict/?fbclid=IwAR0rc-2t2SlPbV- 63JKASqZ6aX7fI5NJgQ29qVf6xXZGU8XXFCr1gJbT8AI
“DarkComet Analysis – Understanding the Trojan used in Syrian Uprising”(16/03/2012) https://resources.infosecinstitute.com/darkcomet-analysissyria/? fbclid=IwAR39kzxgBnRkuD2X0F37f8F9XtNXyLvMOoFPT6dwO0eQiLP3tXQogmRHqCI# gref
"Spy code creator kills project after Syrian abuse". BBC. 10 July 2012. https://www.bbc.com/news/technology-18783064?fbclid=IwAR0DGAyU1c3KDSDqqKoC9qyTuOkEQqYq6p7oXL5OgDrUFKVYMn4JIa5Yi8
“The use of cybertools in an internationalized civil war context: Cyber activities in the Syrian conflict”. Zürich, October 2017. https://css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/Cyber- Reports-2017-05.pdf?fbclid=IwAR1vUGDqF2xq-SyHH4MoECftOBCIBMtGX_ 3ZWX4eDN5pyxk1Zks_Aq6QIo