They're Spying On You: Hacking Team Mobile Malware, Infrastructure Uncovered 48
msm1267 (2804139) writes Controversial spyware commercially developed by Italy's Hacking Team and sold to governments and law enforcement for the purpose of surveillance has a global command and control infrastructure. For the first time, security experts have insight into how its mobile malware components work. Collaborating teams of researchers from Kaspersky Lab and Citizen Lab at the Monk School of Global Affairs at the University of Toronto today reported on their findings during an event in London. The breadth of the command infrastructure supporting Hacking Team's Remote Control System (RCS) is extensive, with 326 servers outed in more than 40 countries; the report also provides the first details on the inner workings of the RCS mobile components for Apple iOS and Android devices.
Adds reader Trailrunner7: [T]he report also provides the first details on the inner workings of the RCS mobile components for Apple iOS and Android devices. The new modules enable governments and law enforcement officers with extensive monitoring capabilities over victims, including the ability to report on their location, steal data from their device, use the device's microphone in real time, intercept voice and SMS messages sent via applications such as Skype, WhatsApp, Viber, and much more.
But... (Score:1)
...it's to keep us FREE! They said so.
Someday we will be required to have cellphones (Score:5, Funny)
Re: (Score:1)
Stallinman is communist anyway.
Re: (Score:2)
Is it any surprise they're in Italy? Where the per-capita cellphone ratio is over 2? Yes, they really like their cellphones, and most people have two, or three. Work phone, play (domestic life) phone, and a third just because ("mistress" phone).
Heck, the worldwide number of cellphones has recently exceeded the population of the world.
And eve
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
I hope not. I still don't own a mobile phone like Richard Stallman. If it is enforced, will we get a cellphone for free? Was landline phone service ever required for Americans from the laws?
They mention "uninstall" and "wipe" but not how to (Score:1)
Re: (Score:3)
iOS malware only works on jailbroken devices!! (Score:4, Informative)
Taking a deeper dive into the malware, Kaspersky and Citizen Lab learned that the iOS version of the RCS Trojans hits only jailbroken devices. Pristine iPhones are also vulnerable if an attacker can remotely run a jailbreaking tool such as Evasi0n and then load the malware implant.
So I know there will be a lot of shouts here of 'see! iOS is vulnerable just like android!" this only works for people who have chosen to expose themselves to malware. also raises a lot of questions about who are the secret teams behind these jailbreaking kits. Especially with the new news of the new jailbreaking kit out of china [cnet.com].
don't jailbreak, don't get pwned.
Re: (Score:2)
My question was: given that the researchers identified ways to uninstall/trigger wipes of the malware from one's phone, how does one go about doing so? "Don't jailbreak an iphone." is not an adequate answer to that question.
Re: (Score:2)
in terms of avoiding malware, the suggestion "don't jailbreak your iPhone" is actually an excellent suggestion. Kinda like a strategy to avoid STDs: "don't sleep with whores". for all that slashdot raves about the safet
Nope:iOS malware only works on jailbroken devices (Score:1)
Re: (Score:2)
Re: (Score:2)
Another computer or person can "jailbreak" a device of interest in a way that the person been watched would not be aware of.
ie you get the users password and its a background like task that is never noticed. ie infect the computer, then you get details on the connected devices, then you can jailbreak. No user interaction needed
Re: (Score:1)
Re: (Score:2)
Could a unique telco call carry the needed 'off' layer without "ringing"/user been notified?
Could wifi be turned on and a site visit in range send the "off" instruction from a street, shop, cafe?
Could net connection be used to send the "off" instruction?
Could malware in a users computer be waiting to issue that command next time connected?
Consumer devices have many options to connect
That's it (Score:5, Funny)
I'm dusting off my old Motorola 8000 DynaTAC.
Victims? (Score:2)
Re: (Score:2)
Perspective - one side's Freedom Fighter is another's Terrorist. cf: LEO::Jack-booted Thug
Re: (Score:2)
Interesting choice of words there. 'Victims' and 'suspects' carry pretty different implications with them.
It makes sense the way it's used. If someone is a "suspect" according to their government, that is someone suspected of a crime, then that government probably has straight-up legal means of eavesdropping on them. OTOH, someone who is being spied on via a surreptitiously installed piece of malware might be more properly called a "victim," since the implication is that the spying is being done in an extrajudicial manner by governments or other parties.
Of course, one could be both victim and suspect. Or be spi
If You Want to Be Safe & Secure Go With Micros (Score:1, Funny)
Because Windows Phone is THE ONLY secure smart phone you can buy!
Re: (Score:2)
Re: (Score:3)
The biggest problem I see in perusing such charges is finding out who put it there. After that you would need to find a court that will rule in your favor and not be swayed by we need to stop those communist fascist terrorist kiddy diddlers arguments.
Will upgrading iOS remove this? (Score:1)
Re: (Score:2)
Re: (Score:2)
I call Alarmism (Score:4, Interesting)
I did RTFA and found this gem: "the iOS version of the RCS Trojans hits only jailbroken devices". Also
“Once the sample is ready, the attacker delivers it to the mobile device of the victim. Some of the known infection vectors include spearphishing via social engineering – often coupled with exploits, including zero-days; and local infections via USB cables while synchronizing mobile devices,”
So, ya, while this is bad, it is not in the same league as what NSA's surveillance of everyone and everything is.
Pigs at the trough (Score:4, Insightful)
Re: (Score:2)
Re: (Score:2)
Some get given a free mirror of your cities telco towers (federal law enforcement, your mil).
Some have to use devices at the street level that become a fake cell tower to track people.
At every level of international, national or local clandestine surveillance you have groups, individuals and multinationals with products and survives to sell, rent or service.
Your average telco is also bound by international conventions to use standard junk
Re: (Score:2)
Local law enforcement know federal/mil/contractor/private sector help with "parallel construction" is totally wrong. The local law enforcement put on a good show to hide the origins of cases or try to seal early case work and present more legally sound evidence.
Thankfully whistleblowers, good legal teams, law reform groups, po
Leave Britney Alone! (Score:1)
Broken Link in Article (Score:1)
Re: (Score:1)
Keep Your Messages Private -- With IONU (Score:1)