Feeds

FinFisher spyware goes global, mobile and undercover

Report claims to have found C&C servers in 25 countries

SANS - Survey on application security programs

Security researchers have warned that the controversial FinFisher spyware has been updated to evade detection and has now been discovered in 25 countries across the globe, many of them in APAC.

FinFisher, also known as FinSpy, is produced by Anglo/German firm Gamma International and marketed as a “lawful interception” suite designed for law enforcers to monitor suspected criminals.

However, it’s alleged to have been used by repressive regimes in countries like Bahrain and Egypt to target human rights activists and other enemies of the state.

The British government has already apparently told Gamma it needs a license to export the software outside the EU, while human rights groups last month requested that the OECD investigate whether the firm violated its guidelines by failing to carry out due diligence on how the software would be used in Bahrain.

Now, researchers at Toronto University’s Munk School of Global Affairs, who have been tracking the use of this surveillance-ware for over a year, say they’ve found 36 new command and control servers, 30 of which are new, in 19 countries.

This brings the total number of countries where the spyware has been found to 25, they said.

The researchers also claimed that as of October last year “the behavior of FinSpy servers began to change”, in a bid to evade detection.

There’s a heavy APAC bias to the countries where servers have been found, with Australia, Bahrain, Bangladesh, India, Malaysia, Singapore, and Vietnam all on the list.

The report has a handy map showing the breakdown of countries and a list of the newly found servers and related ISPs.

The researchers added the following caveat:

Importantly, we believe that our list of servers is incomplete due to the large diversity of ports used by FinSpy servers, as well as other efforts at concealment. Moreover, discovery of a FinSpy command and control server in a given country is not a sufficient indicator to conclude the use of FinFisher by that country’s law enforcement or intelligence agencies. In some cases, servers were found running on facilities provided by commercial hosting providers that could have been purchased by actors from any country.

In the case of Vietnam, the report details the discovery of a mobile version of FinSpy featuring GPS tracking and the ability to snoop on conversations close to the handset, as well as pilfering text messages from the device.

In Indonesia, meanwhile, the three ISPs involved are under investigation by the authorities on suspicion of spying on their customers, according to TechInAsia.

Kenny Lee, principal for Verizon APAC’s Investigative Response unit, cautioned that “just because a piece of software is found within a particular country, doesn’t necessarily mean it originates from that country”.

“As we have seen time and time again, anyone anywhere could have set up the server,” he told The Reg, adding that corporates should always be alert to the risks posed by spyware.

He recommended IT admins monitor event logs for suspicious activity, eliminate any unnecessary data from the organisation, and “ensure fundamental and common sense security countermeasures are in place and functioning correctly”.

In light of the findings, the report calls for a “policy debate about surveillance software and the commercialisation of offensive cyber capabilities”.

It should be noted that, as mentioned in the report, Gamma International has repeatedly denied any links to the spyware and servers revealed by Munk School researchers.

However, it was named on a recent report from Reporters Without Borders as one of five corporate “enemies of the internet” which has produced technology “which has repeatedly been discovered in countries who mistreat journalists”. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.