This post describes the results of a comprehensive global Internet scan for the command and control servers of FinFisher’s surveillance software. It also details the discovery of a campaign using FinFisher in Ethiopia that may have been used to target individuals linked to an opposition group. Additionally, it provides examination of a FinSpy Mobile sample found in the wild, which appears to have been used in Vietnam.
Search Results for: ethiopia
Source: Don Eijndhoven, InfoSec Island
In December of last year, the German public prosecutors’ office had declared that there was no legal basis for the use of the so-called “Bundestrojaner” spyware, which was used to spy on German citizens.
This report, written and coordinated by Citizen Lab Technical Advisor Morgan Marquis-Boire, analyzes several samples we believe to be mobile variants of the FinFisher Spy Kit targeting iPhone, Android, Blackberry, Windows Mobile and Symbian platforms. It is a follow-on to a previous research brief, From Bahrain with Love: FinFisher's Spy Kit Exposed?, that analyzed several pieces of malware targeting Bahraini dissidents.
Source: Fahmida Y. Rashid, PCmag.com
FinFisher, a software application used by law enforcement agencies for surveillance, appears to be far more widespred than originally thought.
Source: Global Voices
In countries whose governments disrespect free speech and privacy, the introduction of new telecommunications (telecoms) infrastructure generally creates a new layer of censorship and surveillance.
“For the past decade, those who used the Internet to report the news might have assumed that the technological edge was in their favor. But online journalists now face more than just the standard risks to those working in dangerous conditions. They find themselves victims of new attacks unique to the new medium.
Ronald Deibert and Nart Villeneuve of the University of Toronto’s Citizen Lab, in partnership with computer security consultants at the SecDev Group, have conducted some of the most detailed postmortems of online attacks on the press, including the malware sent to Chinese foreign correspondents, and a forthcoming examination of Burma’s DDOS incidents. Their academic work firmly states that they cannot connect such events directly to the Chinese or Burmese states. Deibert says the evidence they have collected does show, however, that both attacks utilized techniques and strategies common to petty cyber-criminals, including individual “hackers” who work simply for the thrill of bringing down a highly visible, but vulnerable target.”
“There are many worrying trends in this modern era of globalisation, most notably the ease with which companies can operate and banks move money around, apparently outside any democratic parameters set by nations or an international community struggling to catch up with a rapidly liberalising context. But I have never been part of the ‘anti-globalisation’ movement because there are so many positive aspects to globalisation.”
Ron Deibert, Director of the Citizen Lab and Canada Centre for Global Security Studies has been appointed on the Privacy International Advisory Board. Privacy International campaigns on matters of privacy on an international level and is the oldest surviving privacy advocacy group in the world. Professor Deibert joins a team of 90 members from over 40 countries. Members include government officials, academics, civil society, and corporate and legal consultants. Congratulations to all new Board members!
A basement in the gray, Gothic heart of the University of Toronto is home to the CSI of cyberspace. “We are doing free expression forensics,” says Ronald Deibert, director of the Citizen Lab, based at the Munk Centre for International Studies. Deibert and his team of academics and students investigate in real time governments and… Read more »