Menu
Police turning to mobile malware for monitoring, study says

Police turning to mobile malware for monitoring, study says

The U.S. has the most command-and-control servers for a product made by Italy's Hacking Team

The Remote Control System, from an Italian security company called Hacking Team, is designed in part to help law enforcement and governments monitor the mobile devices of targets.

The Remote Control System, from an Italian security company called Hacking Team, is designed in part to help law enforcement and governments monitor the mobile devices of targets.

Governments are increasingly using spyware for mobile devices to monitor targets, raising questions over the possible misuse of such tools, a new study suggests.

The Citizen Lab, part of the Munk School of Global Affairs at the University of Toronto, and Kaspersky Lab both published analyses on Tuesday of a surveillance product called Remote Control System (RCS) from Hacking Team in Italy.

Hacking Team is one of a handful of companies, including the Gamma Group, specializing in what are essentially malicious software programs designed to intercept data but intended for governments and law enforcement.

The Citizen Lab has long expressed concern in other published research over the use of the tools by governments, which it has concluded have been employed to suppress speech and monitor political opponents in the past.

Over time, the cost of the spying toolkits has fallen and they are now within reach of nearly all governments, the Citizen Lab said in its writeup.

"By dramatically lowering the entry cost on invasive and hard-to-trace monitoring, the equipment lowers the cost of targeting political threats for those with access to Hacking Team and Gamma Group toolkits," the group wrote.

The latest research looks into the exploitation techniques for an Android component of RCS and the command-and-control infrastructure behind it.

The Citizen Lab identified a suspicious Android APK (application installation package) that was a functional copy of the news application "Qatif Today" intended for people in Saudi Arabia. A version of it had been modified to also deliver a payload created by Hacking Team.

A link to what appeared to the malicious APK was tweeted, which led to a Dropbox file that is now gone, The Citizen Lab wrote. If installed, the Hacking Team module requests permissions such as reading and writing SMSes, monitoring GPS location and the ability to process calls.

The Citizen Lab found other Android Hacking Team Android implants that tried to access local stores of chats in applications such as Facebook, Viber, Skype, Line and QQ.

A source leaked to The Citizen Lab a group of documents that describes how the RCS works, giving the research group broad insight into how tracking targets works. The group cautioned the documents have not been verified, but the information did not contradict its own RCS research.

Kaspersky Lab wrote on its blog that it uncovered "a huge infrastructure that is used to control the RCS malware implants."

Kaspersky scanned the entire IPV4 Internet address space, using a special "fingerprinting" method it developed that can identify RCS command-and-control servers.

It found 64 RCS command-and-control servers in the U.S., the most of any country, followed by 49 in Kazakhstan, 35 in Ecuador and 24 in the U.K. Other countries with double-digit numbers of control servers included Canada, China and Colombia.

Some of the IP addresses connected with those servers appeared to be government owned, Kaspersky said. It's unlikely law enforcement agencies would locate those command servers in other countries "in order to avoid cross-border legal problems and the seizure of servers," the company wrote.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags securitymobile securitymobileHacking Teammalware

Featured

Slideshows

Sizing up the NZ security spectrum - Where's the channel sweet spot?

Sizing up the NZ security spectrum - Where's the channel sweet spot?

From new extortion schemes, outside threats and rising cyber attacks, the art of securing the enterprise has seldom been so complex or challenging. With distance no longer a viable defence, Kiwi businesses are fighting to stay ahead of the security curve. In total, 28 per cent of local businesses faced a cyber attack last year, with the number in New Zealand set to rise in 2017. Yet amidst the sensationalism, media headlines and ongoing high profile breaches, confusion floods the channel, as partners seek strategic methods to combat rising sophistication from attackers. In sizing up the security spectrum, this Reseller News roundtable - in association with F5 Networks, Kaspersky Lab, Tech Data, Sophos and SonicWall - assessed where the channel sweet spot is within the New Zealand channel. Photos by Maria Stefina.

Sizing up the NZ security spectrum - Where's the channel sweet spot?
Kiwi channel comes together for another round of After Hours

Kiwi channel comes together for another round of After Hours

The channel came together for another round of After Hours, with a bumper crowd of distributors, vendors and partners descending on The Jefferson in Auckland. Photos by Maria Stefina.​

Kiwi channel comes together for another round of After Hours
Consegna comes to town with AWS cloud offerings launch in Auckland

Consegna comes to town with AWS cloud offerings launch in Auckland

Emerging start-up Consegna has officially launched its cloud offerings in the New Zealand market, through a kick-off event held at Seafarers Building in Auckland.​ Founded in June 2016, the Auckland-based business is backed by AWS and supported by a global team of cloud specialists, leveraging global managed services partnerships with Rackspace locally.

Consegna comes to town with AWS cloud offerings launch in Auckland
Show Comments