FinFisher government spy tool found hiding as WhatsApp and Skype

Discussion in 'The Guru's Pub' started by Extraordinary, Sep 22, 2017.

  1. Extraordinary

    Extraordinary Guest

    Messages:
    19,558
    Likes Received:
    1,638
    GPU:
    ROG Strix 1080 OC
    [​IMG]

    Legitimate downloads of popular software including WhatsApp, Skype and VLC Player are allegedly being hacked at an internet service provider (ISP) level to spread an advanced form of surveillance software known as "FinFisher", cybersecurity researchers warn.

    FinFisher is sold to global governments and intelligence agencies and can be used to snoop on webcam feeds, keystrokes, microphones and web browsing. Documents, previously published by WikiLeaks, indicate that one tool called "FinFly ISP" may be linked to the case.

    The digital surveillance tools are peddled by an international firm called Gamma Group and have in the past been sold to repressive regimes including Bahrain, Egypt and the United Arab Emirates (UAE).

    In March this year, the company attended a security conference sponsored by the UK Home Office.

    This week (21 September), experts from cybersecurity firm Eset claimed that new FinFisher variants had been discovered in seven countries, two of which were being targeted by "man in the middle" (MitM) attacks at an ISP level – packaging real downloads with spyware.

    Companies hit included WhatsApp, Skype, Avast, VLC Player and WinRAR, it said, adding that "virtually any application could be misused in this way."

    When a target of surveillance was downloading the software, they would be silently redirected to a version infected with FinFisher, research found.

    When downloaded, the software would install as normal – but Eset found it would also be covertly bundled with the surveillance tool.

    The stealthy infection process was described as being "invisible to the naked eye."

    The seven countries were not named for security reasons, Eset said. WhatsApp and VLC Player did not respond to request for comment by the time of publication.

    A Microsoft spokesperson, referencing the Skype infections, told IBTimes UK: "Windows Defender antivirus cloud protection already automatically identifies and blocks the malware.

    "For non-cloud customers, we've deployed signatures to protect against this in our free antivirus software," the statement added.

    An Avast spokesperson said: "Attackers will always focus on the most prominent targets.

    "Wrapping official installers of legitimate apps with malware is not a new concept and we aren't surprised to see the PC apps mentioned in this report.

    "What's new is that this seems to be happening at a higher level.

    "We don't know if the ISPs are in cooperation with the malware distributors or whether the ISPs' infrastructure has been hijacked."

    The latest version of FinFisher was spotted with new customised code which kept it from being discovered, what Eset described as "tactical improvements." Some tricks, it added, were aimed at compromising end-to-end (E2E) encryption software and known privacy tools.

    One such application was Threema, a secure messaging service.

    "The geographical dispersion of Eset's detections of FinFisher variants suggests the MitM attack is happening at a higher level – an ISP arises as the most probable option," the team said.

    "One of the main implications of the discovery is that they decided to use the most effective infection method and that it actually isn't hard to implement from a technical perspective," Filip Kafka, a malware researcher at Eset, told IBTimes UK.

    "Since we see have seen more infections than in the past surveillance campaigns, it seems that FinFisher is now more widely utilised in the monitoring of citizens in the affected countries."

    Breaking encryption has become a major talking point of governments around the world, many of which conduct bulk communications collection. Politicians argue, often without evidence, that software from companies such as WhatsApp has become a burden on terror probes.

    One WikiLeaks document on FinFly ISP touted its ability to conduct surveillance at an ISP level.

    The software's brochure boasted: "FinFly ISP is able to patch files that are downloaded by the target on-the-fly or send fake software updates for popular software."

    It added that it "can be installed on an internet service provider's network" and listed one use case when it was previously deployed by an unnamed intelligence agency.

    Eset found that all affected targets within one of the countries were using the same ISP.

    "Unprecedented"
    "The deployment of the ISP-level MitM attack technique mentioned in the leaked documents has never been revealed – until now," the researchers said in their analysis.

    "If confirmed, these FinFisher campaigns would represent a sophisticated and stealthy surveillance project unprecedented in its combination of methods and reach."

    It remains unknown who was behind the fresh hacking campaigns, but FinFisher is almost exclusively tailored to government, police or intelligence agency use.

    "We cannot say for sure who is behind the campaign but the ISP re-direction could be a service ordered from FinFisher," Kafka said.

    "This question should be addressed to FinFisher.

    "We [have] very limited information on this, who specifically was targeted, but generally the targets were catered to what FinFisher is generally used for," he added.

    Gamma Group did not immediately respond to a request for comment from IBTimes UK.

    This is not the first time that the company, which has offices in Europe, has been linked to questionable business practices.

    In 2013, tech firm Mozilla sent it a cease and desist letter after its software was caught posing as a version of its Firefox browser.

    "We cannot abide a software company using our name to disguise online surveillance tools that can be – and in several cases actually have been – used by Gamma's customers to violate citizens' human rights and online privacy," it complained in a blog post.

    The same year, Reporters without Borders branded Gamma Group as one of the "Corporate Enemies of the Internet" in an annual report. The creepy and invasive spyware can also be spread via more traditional means – malicious email attachments, for example.

    Back in 2011, it emerged that Gamma International, a UK subsidiary, was selling a malware Trojan disguised as an update for Apple's iTunes media player.

    Before being patched, the gaping vulnerability had been exploited for approximately three years, found security journalist Brian Krebs at the time.

    http://www.ibtimes.co.uk/are-you-be...-spy-tool-found-hiding-whatsapp-skype-1640263
     
    vonSternberg and fantaskarsef like this.
  2. fantaskarsef

    fantaskarsef Ancient Guru

    Messages:
    15,750
    Likes Received:
    9,641
    GPU:
    4090@H2O
    We need the puke smiley for this one.
     
    Extraordinary likes this.
  3. Extraordinary

    Extraordinary Guest

    Messages:
    19,558
    Likes Received:
    1,638
    GPU:
    ROG Strix 1080 OC
    [​IMG]
     
  4. lucidus

    lucidus Ancient Guru

    Messages:
    11,808
    Likes Received:
    1,384
    GPU:
    .
    Lol ... I'm sure UAE bought this bug too. iOS 9's final update was also to fix an Israeli developed spying tool deployed by them. I hope my PC is clean :p
     

  5. allesclar

    allesclar Ancient Guru

    Messages:
    5,771
    Likes Received:
    177
    GPU:
    GeForce GTX 1070
    Privacy really is beginning to become a thing of the past lol
     
  6. fantaskarsef

    fantaskarsef Ancient Guru

    Messages:
    15,750
    Likes Received:
    9,641
    GPU:
    4090@H2O
    So let's just spam them with the words "BOMB", "NUCLEAR", "CIA", "TERRORISM" and a final "FU CIA B147C35" so they die on overload. Choke on it!
     
  7. Evildead666

    Evildead666 Guest

    Messages:
    1,309
    Likes Received:
    277
    GPU:
    Vega64/EKWB/Noctua
    Its not like the "old" days, where trigger words would make them use bandwidth or storage or something.

    They already collect everything, everywhere, and then mine that for useful information.
    With an all-digital setup, its just 1's and 0's.
    Analogue Phone lines had to be tapped, and/or recorded.

    The safest way of communicating today, and causing the most trouble for "them" is to use snail mail, with an anti-stat bag inside the envelope.
    they(d have to open the letter, as i don't think they'd be able to xray it.
    Thats a manual process, which costs a lot of money, as you have to employ people to do it.
    also, people are fallible, and speak. Some of them could speak to the press.

    Then again, they have so much data, they can't mine it properly.

    It amazing how all this surveillance has made our world the safest it has ever been /s
     
  8. thatguy91

    thatguy91 Guest

    Since this new method is a applied at ISP level, imagine the backlash that would occur if those ISP's became known. Would the ISP's be able to sue those that orchestrated it?
     
  9. Evildead666

    Evildead666 Guest

    Messages:
    1,309
    Likes Received:
    277
    GPU:
    Vega64/EKWB/Noctua
    I would expect the ISP's to be held to National Security Letters, and not even be able to acknowledge that they have received them.

    It doesn't matter what country you are in.
    The NSA doesn't spy on Americans. They have the Brits doing that for them.
    They spy on the Brits, because they also aren't allowed to spy on their own people.
    Everyone knowingly spys on their neighbors/allies, because the laws don't allow them to do it themselves.
    The targeted countries can then send feedback, when its too obvious, or getting public, or whatever.
    You just don't get that type of feedback from enemies :)
     
  10. Vibe

    Vibe Master Guru

    Messages:
    277
    Likes Received:
    50
    GPU:
    1080 gtx
    I'm just going to put this piece of tape over my laptop's webcam now.....
     

  11. fantaskarsef

    fantaskarsef Ancient Guru

    Messages:
    15,750
    Likes Received:
    9,641
    GPU:
    4090@H2O
    Yeah it's not like in the old days where people weren't spied on generally because it was neither necessary nor helpful (which today is still not guaranteed).
     

Share This Page