Skip to main content

SHOCK, John McAfee:: infected laptops with malware, spied and stole passwords

Twenty years ago, John McAfee ran an anti-virus company.

He's not had anything to do with the company that bears his name (and was subsequently acquired by Intel) since the early 1990s, but that doesn't mean that his involvement with malware has come to an end.

Many people have been following the bizarre story of John McAfee, who has been on the run from the Belize police since mid-November, had his location leaked to the world in a photo's EXIF meta-data, and was hastily deported from his Guatemala hide-out to the United States.

Throughout his escapades, John McAfee has been keeping the internet entertained and informed of his swashbuckling exploits via his blog.

Most recently, John McAfee claims that he gave Belize officials cheap laptops that had been deliberately pre-infected with keylogging spyware.
I purchased 75 cheap laptop computers and, with trusted help, installed invisible keystroke logging software on all of them - the keind that calls home (to me) and disgorges the text files. It also, on command, turns on and off, the microphone and camera - and sends these files on command.

I had the computers re-packaged as if new. I began giving these away as presents to select people - government employees, police officers, Cabinet Minister's assistants, girlfriends of powerful men, boyfriends of powerful women.

I hired four trusted people full time to monitor the text files and provide myself with the subsequent passwords for everyone's email, Facebook, private message boards and other passworded accounts. The keystroke monitoring continued after the password collection, in order to document text input and would later be deleted. So nothing was missed...

67-year-old McAfee goes on to claim that he also hired 23 women and six men as operatives to seduce and spy upon his intended targets.
These men and women were given simple training on how to access and load software on someone's computer while they slept, or ate or made long phone calls etc.

It's dead simple if you're sleeping with someone - "Hey Babe, can I borrow your computer to check my email?" - A little more complex if you're not - but not much.


According to his blog post, the anti-virus veteran ended up living with eight of the female honeytraps, and was nearly killed by one who turned out to be a double agent.

John McAfee's spying didn't stop there, however. According to his blog post he also infiltrated two local phone companies, and paid workers to tap phones and provide lists of who his targets were in contact with.

Is John McAfee telling the truth? Or spinning a fanciful tale for his own entertainment? There is no way, of course, for us to verify John McAfee's colourful story - which goes on to claim that there is an international terrorist conspiracy run from Belize.

But if elements of this story are true (such as the deliberate spreading of keylogging malware and the snooping on sensitive passwords) that is unlikely to be popular with the-powers-that-be in Belize.

Comments

Popular posts from this blog

Hass avocado farming in Kenya

Hass avocado farming in Kenya has become the new craze due to its extensive European market. Farmers today have lots of concern on where to source for quality certified hass avocado seedlings in Kenya , Nurseries such as the ones owned by Farmers Trend have been a good source for the seedlings and better information. To get quality hass avocado seedlings, contact https://farmerstrend.co.ke/ on 0790509684 Buy hass avocado seedlings at an affordable from a reputable certified seedbed in Kenya. Contact John Kiruthi on 0790-509684 Prices range from 150/= to 400/= per pc This post is a result of many queries that we get on this platform on where one can source hass avocado seedlings in Kenya. The Hass avocado season runs from June to mid – September with other varieties like Fuerte avocado starting a little earlier in March/April. The nursery imports its Hass shoots from South Africa and grafts them with locally available indigenous avocado seedlings for root stock. T...

How a Telegram Group (Farmers+254) Is Rapidly Transforming Itself To Becoming A Support System For Farmers In Kenya

A simple mobile phone 15 years ago was out of reach for most small holder farmers in Kenya but that has changed. Affordable smart phones are increasingly becoming accessible and there is foreseen increase in usage for the technology by small holder farmers to access information in the medium term. A mobile phone screenshot of Farmers+254 Telegram Group Today, a group of young professional youths involved in agriculture has seen an opportunity in creating an agricultural group on telegram – Farmers+254 – in Kenya,  a group where farmers are sharing information, marketing their produce, getting technical help,  market updates, trends in agribusiness, value addition support and questions getting answered in real time. Telegram has indeed become part of the holy grail together with the traditional over the internet SMS to reach more small holder farmers and value chain actors with timely information dissemination. TELEGRAM Telegram  is a cloud-based ins...

Hack an Ethernet Router(ADSL)

Hack an Ethernet Router(ADSL) ADSL(Asymmetric Digital Subscriber Line) ethernet routers are used by many people across the world because it is efficient in many ways,But it is also the more vulnerable to the network,The most serious vulnerability which can easily be exploited by an hacker(a beginner also ) is…….. In first every ADSL Ethernet router comes with a USERNAME and PASSWORD using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in the Default username and password that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password later. This makes it possible for the attackers to gain unauthorized access and modify the router settings using a common set of default usernames and passwords. Here is how you can do it. U need some tools like PORT SCANNE R which you can download here 1.You need some ip addr...