praegune kellaaeg 15.08.2025 14:44:55
|
Hinnavaatlus
:: Foorum
:: Uudised
:: Ärifoorumid
:: HV F1 ennustusvõistlus
:: Pangalink
:: Telekavad
:: HV toote otsing
|
|
autor |
|
tahanteada
Lõuapoolik

liitunud: 04.04.2003
|
25.06.2014 09:22:55
HackingTeam tool makes use of mobile malware targeting all major platforms |
|
|
HackingTeam tool makes use of mobile malware targeting all major platforms
Researchers have uncovered troubling details about a mobile surveillance service provided by HackingTeam, an Italian seller of monitoring software.
While the company's Remote Control System (RCS) solution, also known as Galileo, has long been on the radar of the security community, as well as the practice of it being marketed to police and intelligence agencies around the world, researchers had not been able to identify how the firm's products used rumored mobile malware – until now, that is.
On Tuesday, Citizen Lab, an information security and human rights organization at the University of Toronto, and Kaspersky Lab teamed to release findings on HackingTeam's mobile trojans, which have been linked to the surveillance of journalists, politicians and activists.
In a Tuesday blog post, Kaspersky researchers revealed that the malware had been discovered this year on all major mobile platforms: Android, iOS, Windows Phone and BlackBerry.
Kaspersky also noted that RCS' iOS module, designed to work on jailbroken Apple devices, was alone capable of monitoring targets' emails, text messages, and keystrokes made in apps. In addition, the malware could intercept phone calls, take photos using the phone's camera, register new SIM cards inserted in infected devices and track users' locations via GPS.
In its blog post, Kaspersky said that over 320 command-and-control servers for RCS had been detected throughout the globe, including 64 in the U.S. (where the most servers were pinpointed).
The firm would not confirm that the existence of servers meant that a country was operating the control hub, but did say that the findings provided a “good indication of who owns them," Kaspersky's blog post said.
In some cases, HackingTeam's mobile trojans were installed on mobile devices connected to infected Windows and Mac computers, the firm found. But those looking to spy on mobile users, can also install the malware via remote admin access.
In total, Kaspersky detected 17 malicious RCS modules designed for iOS, Windows Phone, Android, and BlackBerry devices.
In Tuesday email correspondence to SCMagazine.com, Sergey Golovanov, principal security researcher at Kaspersky Lab, spoke to the nearly limitless scope of surveillance provided to RCS users.
“The attacker, based on previous knowledge, works on a template factory scheme which is customized for each victim,” Golovanov wrote. “The customization itself depends on the attackers need. It is not limited to any technical feature but to the intention of the attacker. In other words, there is no limit for the attacker while targeting a journalist or a politician. Only the attacker decides what to do and how far to go while spying on each victim.”
After tracking the spyware since 2011, researchers were finally able to shed more light on the tool's pervasive use.
“What we understood when we discovered so many servers across the globe, is that a lot of countries and governments around the world use HackingTeam solutions,” Golovanov continued. “It just means that we clearly live in the time of global surveillance, where even the smallest countries are big players.”
http://www.scmagazine.com/hackingteam-tool-makes-use-of-mobile-malware-targeting-all-major-platforms/article/357652/
--------------------
Ja veel üks link lisaks:
HackingTeam, new revelations on the surveillance network
Kaspersky Lab and Citizen Lab have released the results of their analysis on the global C2 infrastructure used by the Italian firm HackingTeam.
Security experts from Kaspersky Lab and Citizen Lab at the Munk School of Global Affairs at the University of Toronto have released the results of their analysis on the global command and control infrastructure used by the Italian firm HackingTeam to manage its spyware instances all over the world.
Many times security experts accused HackingTeam to provide its spyware to authoritarian regimes and law enforcement for the purpose of surveillance.
According the researchers that presented their findings during an event in London, the command infrastructure supporting HackingTeam’s Remote Control System (RCS) is composed by 326 servers distributed in more than 40 countries. The majority of the C&C servers were hosted in the United States, Kazakhstan, Ecuador and UK.
Edasi jutt juba lingil:
http://securityaffairs.co/wordpress/26064/intelligence/hackingteam-c2-revealed.html
|
|
tagasi üles |
|
 |
|
lisa lemmikuks |
|
|
sa ei või postitada uusi teemasid siia foorumisse sa ei või vastata selle foorumi teemadele sa ei või muuta oma postitusi selles foorumis sa ei või kustutada oma postitusi selles foorumis sa ei või vastata küsitlustele selles foorumis sa ei saa lisada manuseid selles foorumis sa ei või manuseid alla laadida selles foorumis
|
|
Hinnavaatlus ei vastuta foorumis tehtud postituste eest.
|