Search Results for: finfisher

Pay No Attention to the Server Behind the Proxy: Mapping FinFisher’s Continuing Proliferation

This post describes the results of Internet scanning we recently conducted to identify the users of FinFisher, a sophisticated and user-friendly spyware suite sold exclusively to governments. We devise a method for querying FinFisher’s “anonymizing proxies” to unmask the true location of the spyware’s master servers. Since the master servers are installed on the premises of FinFisher customers, tracing the servers allows us to identify which governments are likely using FinFisher. In some cases, we can trace the servers to specific entities inside a government by correlating our scan results with publicly available sources.

The Verge article features FinFisher research

An article by The Verge on the persecution of Bahraini activists Moosa Abd-Ali Ali, Jaffar Al Hasabi, and Saeed Al-Shehabi features the Citizen Lab’s extensive analysis into FinFisher, a line of remote intrusion and surveillance software developed by Munich-based Gamma International GmbH, conducted by Senior Security Researcher Morgan Marquis-Boire and Research Fellow Bill Marzcak.

PI legal action informed by Citizen Lab’s FinFisher research

Privacy International has filed a criminal complaint with the UK’s National Cyber Crime Unit requesting police investigation into allegations that the computer and telecommunications data of Bahraini democracy activists were subject to unlawful surveillance, which cites reports authored by Citizen Lab on the presence of FinFisher in Bahrain, as well the global proliferation of the software.

Bytes for All hits snags in FinFisher court hearing

A public interest litigation case launched by CSN Partner Bytes For All (B4A) at the Lahore High Court has been met with obstacles during court proceedings. Despite a court order to look into the matter and produce a report in one month, the Pakistan Telecommunications Authority (PTA) has failed to do so.