Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Government IT

They're Spying On You: Hacking Team Mobile Malware, Infrastructure Uncovered 48

msm1267 (2804139) writes Controversial spyware commercially developed by Italy's Hacking Team and sold to governments and law enforcement for the purpose of surveillance has a global command and control infrastructure. For the first time, security experts have insight into how its mobile malware components work. Collaborating teams of researchers from Kaspersky Lab and Citizen Lab at the Monk School of Global Affairs at the University of Toronto today reported on their findings during an event in London. The breadth of the command infrastructure supporting Hacking Team's Remote Control System (RCS) is extensive, with 326 servers outed in more than 40 countries; the report also provides the first details on the inner workings of the RCS mobile components for Apple iOS and Android devices. Adds reader Trailrunner7: [T]he report also provides the first details on the inner workings of the RCS mobile components for Apple iOS and Android devices. The new modules enable governments and law enforcement officers with extensive monitoring capabilities over victims, including the ability to report on their location, steal data from their device, use the device's microphone in real time, intercept voice and SMS messages sent via applications such as Skype, WhatsApp, Viber, and much more.
This discussion has been archived. No new comments can be posted.

They're Spying On You: Hacking Team Mobile Malware, Infrastructure Uncovered

Comments Filter:
  • by Anonymous Coward

    ...it's to keep us FREE! They said so.

  • by Squidlips ( 1206004 ) on Tuesday June 24, 2014 @11:03AM (#47306243)
    For our own protection of course. And that someday is coming soon. How much longer can Richard Stallman and I hold out on owning one of these dream (Stalin's) -machines?
    • by Anonymous Coward

      Stallinman is communist anyway.

    • by tlhIngan ( 30335 )

      For our own protection of course. And that someday is coming soon. How much longer can Richard Stallman and I hold out on owning one of these dream (Stalin's) -machines?

      Is it any surprise they're in Italy? Where the per-capita cellphone ratio is over 2? Yes, they really like their cellphones, and most people have two, or three. Work phone, play (domestic life) phone, and a third just because ("mistress" phone).

      Heck, the worldwide number of cellphones has recently exceeded the population of the world.

      And eve

    • by antdude ( 79039 )

      I hope not. I still don't own a mobile phone like Richard Stallman. If it is enforced, will we get a cellphone for free? Was landline phone service ever required for Americans from the laws?

  • So: how to prompt such malware to uninstall itself on one's devices?
    • Better to not install it in the first place. The article mentions targeted attacks: "Once the sample is ready, the attacker delivers it to the mobile device of the victim. Some of the known infection vectors include spearphishing via social engineering – often coupled with exploits, including zero-days; and local infections via USB cables while synchronizing mobile devices". Sounds like stuff you can avoid with some care. They also mention that the trojan will not work on un-jailbroken iOS devices.
      • by Noah Haders ( 3621429 ) on Tuesday June 24, 2014 @11:38AM (#47306549)
        iOS malware only works on jailbroken devices!! FTFA:

        Taking a deeper dive into the malware, Kaspersky and Citizen Lab learned that the iOS version of the RCS Trojans hits only jailbroken devices. Pristine iPhones are also vulnerable if an attacker can remotely run a jailbreaking tool such as Evasi0n and then load the malware implant.

        So I know there will be a lot of shouts here of 'see! iOS is vulnerable just like android!" this only works for people who have chosen to expose themselves to malware. also raises a lot of questions about who are the secret teams behind these jailbreaking kits. Especially with the new news of the new jailbreaking kit out of china [cnet.com].

        don't jailbreak, don't get pwned.

        • And you also answer the question by way of spreading FUD about taking control of one's own general purpose computer like a complete jackass.

          My question was: given that the researchers identified ways to uninstall/trigger wipes of the malware from one's phone, how does one go about doing so? "Don't jailbreak an iphone." is not an adequate answer to that question.

          • Actually the FUD is in the summary, where it says that android and iOS phones are vulnerable. it's more accurate to say androids and jailbroken iPhones. if you haven't jailbroken your iPhone, then according to this research it is not vulnerable. This is just anti-apple FUD to tear them down.

            in terms of avoiding malware, the suggestion "don't jailbreak your iPhone" is actually an excellent suggestion. Kinda like a strategy to avoid STDs: "don't sleep with whores". for all that slashdot raves about the safet
            • I notice that you are still not answering the question How to wipe an infected device. Is basic reading comprehension too challenging for you?
              • short answer, you can never know that the phone has been sanitized. First, you'll never even know if you've been infected. Then, even if you go back to a full phone wipe, who knows what was planted in the BIOS or something. Basically, you have to throw out the phone, because it's been pwned 4evar.
        • by AHuxley ( 892839 )
          Re "don't jailbreak, don't get pwned." would be great if the jailbreak aspect was complex and had a few GUI steps that a user would see or have to be fooled into doing.
          Another computer or person can "jailbreak" a device of interest in a way that the person been watched would not be aware of.
          ie you get the users password and its a background like task that is never noticed. ie infect the computer, then you get details on the connected devices, then you can jailbreak. No user interaction needed :)
      • Way to not answer the question by way of spreading FUD about taking control of one's own general purpose computer, jackass. My question was: given that the researchers identified ways to uninstall/trigger wipes of the malware from one's phone, how does one go about doing so? "Don't jailbreak an iphone." is not an adequate answer to that question.
        • by AHuxley ( 892839 )
          What are the options for a uninstall/trigger wipe?
          Could a unique telco call carry the needed 'off' layer without "ringing"/user been notified?
          Could wifi be turned on and a site visit in range send the "off" instruction from a street, shop, cafe?
          Could net connection be used to send the "off" instruction?
          Could malware in a users computer be waiting to issue that command next time connected?
          Consumer devices have many options to connect :)
  • That's it (Score:5, Funny)

    by symes ( 835608 ) on Tuesday June 24, 2014 @11:06AM (#47306267) Journal

    I'm dusting off my old Motorola 8000 DynaTAC.

  • Interesting choice of words there. 'Victims' and 'suspects' carry pretty different implications with them.
    • Perspective - one side's Freedom Fighter is another's Terrorist. cf: LEO::Jack-booted Thug

    • Interesting choice of words there. 'Victims' and 'suspects' carry pretty different implications with them.

      It makes sense the way it's used. If someone is a "suspect" according to their government, that is someone suspected of a crime, then that government probably has straight-up legal means of eavesdropping on them. OTOH, someone who is being spied on via a surreptitiously installed piece of malware might be more properly called a "victim," since the implication is that the spying is being done in an extrajudicial manner by governments or other parties.

      Of course, one could be both victim and suspect. Or be spi

  • by Anonymous Coward

    Because Windows Phone is THE ONLY secure smart phone you can buy!

  • How do you think an upgrade / restore will deal with this? The article says that non-jailbroken devices are safe, unless a connected computer jailbreaks it first. Don't Apple have means to discover if a device has been jailbroken, and thus remove all such malware during a proper upgrade or restore? What do you guys think? And, what about how to discover such a hack, now that they are known?
    • The one time I jailbroke my phone, I couldn't update it to the newest iOS. This attack seems rather easy to notice if your phone suddenly refuses to allow any updates.
    • by grub ( 11606 )
      Some apps have jailbreak detection and will not run, or issue a warning, on jailbroken iOS devices. An app called "Divide" used for keeping work data via MS Exchange (mail, contacts, calendar, etc.) separate from your normal stuff is one.
  • I call Alarmism (Score:4, Interesting)

    by wannabgeek ( 323414 ) on Tuesday June 24, 2014 @11:21AM (#47306373) Journal

    I did RTFA and found this gem: "the iOS version of the RCS Trojans hits only jailbroken devices". Also
    “Once the sample is ready, the attacker delivers it to the mobile device of the victim. Some of the known infection vectors include spearphishing via social engineering – often coupled with exploits, including zero-days; and local infections via USB cables while synchronizing mobile devices,”

    So, ya, while this is bad, it is not in the same league as what NSA's surveillance of everyone and everything is.

  • Pigs at the trough (Score:4, Insightful)

    by Squidlips ( 1206004 ) on Tuesday June 24, 2014 @11:29AM (#47306455)
    So with so many bad actors all stealing our cellphone data, how do they avoid stepping on each others toes? It must get crowded on our cellphones with all the malware competing for our data. Oink, oink
    • They don't. They operate at different levels, so they may be listening to an extra "backup" data flow. I rather think they use each other. It is too convenient for "intelligence" agencies not to tap into the already existing camera and audio feed from another spy.
    • by AHuxley ( 892839 )
      Some get given a free mirror of your nations backhaul (NSA, GCHQ).
      Some get given a free mirror of your cities telco towers (federal law enforcement, your mil).
      Some have to use devices at the street level that become a fake cell tower to track people.
      At every level of international, national or local clandestine surveillance you have groups, individuals and multinationals with products and survives to sell, rent or service.
      Your average telco is also bound by international conventions to use standard junk
  • What more do you want to know about her, myself, and my lolcat?
  • By downloading IONU's app, or installing it on your computer, you don't have to worry about who will see your messages. IONU offers an encrypted messaging service so you can ensure that your message doesn't end up in someone else's hands. Learn more about IONU and download it here: https://ionu.com/download [ionu.com]

"More software projects have gone awry for lack of calendar time than for all other causes combined." -- Fred Brooks, Jr., _The Mythical Man Month_

Working...