Research News

Citizen Lab's latest research publications.

Malware Attack Targeting Syrian ISIS Critics

This report describes a malware attack on a Syrian citizen media group critical of Islamic State of Iraq and Syria (ISIS). Though we are unable to conclusively attribute the attack to ISIS or its supporters, a link to ISIS is plausible. The malware used in the attack differs substantially from campaigns linked to the Syrian regime, and the attack is against a group that is an active target of ISIS forces. In the interest of highlighting a developing threat, this post analyzes the attack and provides a list of Indicators of Compromise.

Privacy and security in cyberspace: Right of all or luxury of the few?

In an article published on openDemocracy.net, Citizen Lab Senior Legal Advisor Sarah McKune writes about the digital threats that civil society organizations (CSOs) face in carrying out their work, which undermine their privacy and compromise sensitive information. “To address this problem we must expand the terms and scope of the debate, exploring the link between the right to privacy and access to digital security more fully,” said McKune.

Op-ed by Ron Deibert: The Cyber Security Syndrome

In an op-ed on OpenCanada.org, Citizen Lab Director Ron Deibert argues that law enforcement and intelligence agencies such as the US’s NSA, UK’s GCHQ and Canada’s CSE must be highly accountable, transparent to democratically elected representatives, and unleashed to act only in tightly circumscribed way, in order to protect the liberal democratic society in which we live.

Targeted Threat Research at USENIX Security 2014

At USENIX Security 2014 Citizen Lab researchers presented two papers on targeted threats against civil society communities as part of a dedicated session on the topic entitled Tracking Targeted Attacks against Civilians and NGOs.

Schrodinger’s Cat Video and the Death of Clear-Text

This report provides a detailed analysis of two products sold for facilitating targeted surveillance known as network injection appliances. These products allow for the easy deployment of targeted surveillance implants and are being sold by commercial vendors to countries around the world. Compromising a target becomes as simple as waiting for the user to view unencrypted content on the Internet.