Skip to main content

SHOCK, John McAfee:: infected laptops with malware, spied and stole passwords

Twenty years ago, John McAfee ran an anti-virus company.

He's not had anything to do with the company that bears his name (and was subsequently acquired by Intel) since the early 1990s, but that doesn't mean that his involvement with malware has come to an end.

Many people have been following the bizarre story of John McAfee, who has been on the run from the Belize police since mid-November, had his location leaked to the world in a photo's EXIF meta-data, and was hastily deported from his Guatemala hide-out to the United States.

Throughout his escapades, John McAfee has been keeping the internet entertained and informed of his swashbuckling exploits via his blog.

Most recently, John McAfee claims that he gave Belize officials cheap laptops that had been deliberately pre-infected with keylogging spyware.
I purchased 75 cheap laptop computers and, with trusted help, installed invisible keystroke logging software on all of them - the keind that calls home (to me) and disgorges the text files. It also, on command, turns on and off, the microphone and camera - and sends these files on command.

I had the computers re-packaged as if new. I began giving these away as presents to select people - government employees, police officers, Cabinet Minister's assistants, girlfriends of powerful men, boyfriends of powerful women.

I hired four trusted people full time to monitor the text files and provide myself with the subsequent passwords for everyone's email, Facebook, private message boards and other passworded accounts. The keystroke monitoring continued after the password collection, in order to document text input and would later be deleted. So nothing was missed...

67-year-old McAfee goes on to claim that he also hired 23 women and six men as operatives to seduce and spy upon his intended targets.
These men and women were given simple training on how to access and load software on someone's computer while they slept, or ate or made long phone calls etc.

It's dead simple if you're sleeping with someone - "Hey Babe, can I borrow your computer to check my email?" - A little more complex if you're not - but not much.


According to his blog post, the anti-virus veteran ended up living with eight of the female honeytraps, and was nearly killed by one who turned out to be a double agent.

John McAfee's spying didn't stop there, however. According to his blog post he also infiltrated two local phone companies, and paid workers to tap phones and provide lists of who his targets were in contact with.

Is John McAfee telling the truth? Or spinning a fanciful tale for his own entertainment? There is no way, of course, for us to verify John McAfee's colourful story - which goes on to claim that there is an international terrorist conspiracy run from Belize.

But if elements of this story are true (such as the deliberate spreading of keylogging malware and the snooping on sensitive passwords) that is unlikely to be popular with the-powers-that-be in Belize.

Comments

Popular posts from this blog

How a Telegram Group (Farmers+254) Is Rapidly Transforming Itself To Becoming A Support System For Farmers In Kenya

A simple mobile phone 15 years ago was out of reach for most small holder farmers in Kenya but that has changed. Affordable smart phones are increasingly becoming accessible and there is foreseen increase in usage for the technology by small holder farmers to access information in the medium term. A mobile phone screenshot of Farmers+254 Telegram Group Today, a group of young professional youths involved in agriculture has seen an opportunity in creating an agricultural group on telegram – Farmers+254 – in Kenya,  a group where farmers are sharing information, marketing their produce, getting technical help,  market updates, trends in agribusiness, value addition support and questions getting answered in real time. Telegram has indeed become part of the holy grail together with the traditional over the internet SMS to reach more small holder farmers and value chain actors with timely information dissemination. TELEGRAM Telegram  is a cloud-based ins...

Hass avocado farming in Kenya

Hass avocado farming in Kenya has become the new craze due to its extensive European market. Farmers today have lots of concern on where to source for quality certified hass avocado seedlings in Kenya , Nurseries such as the ones owned by Farmers Trend have been a good source for the seedlings and better information. To get quality hass avocado seedlings, contact https://farmerstrend.co.ke/ on 0790509684 Buy hass avocado seedlings at an affordable from a reputable certified seedbed in Kenya. Contact John Kiruthi on 0790-509684 Prices range from 150/= to 400/= per pc This post is a result of many queries that we get on this platform on where one can source hass avocado seedlings in Kenya. The Hass avocado season runs from June to mid – September with other varieties like Fuerte avocado starting a little earlier in March/April. The nursery imports its Hass shoots from South Africa and grafts them with locally available indigenous avocado seedlings for root stock. T...

4 Best ways to Hack Facebook Password

In my previous post How to hack facebook password i told you about hacking facebook with phishing,Today i thought to uncover all the methods used to hack facebook password, I will cover 4 methods over here: 1. Facebook Phishing 2. Keylogging 3. Social engineering 4 . Primary email address hack 1. Facebook phishing: I have taken this method first because i think this is the most popular method/way of hacking facebook. I studied various facebook surveys taken on web about hacking facebook. The results of these surveys show "Phishing" as the most used method to hack facebook and to note…"Phishing is favorite method of facebook hackers". So, friends.. beware of facebook Phishing. Facebook staff is working hard to avoid these Facebook phishers. Phishing not only allows you to hack Facebook but also almost any email account. You have to only get the trick used to make a phisher, which i think is very easy. I learn't it without any difficult...