Tuesday, November 21, 2017
Search

Spyware - search results

If you're not happy with the results, please do another search

Apple upgrades security after alleged Israeli group’s spyware attack on Arab activist

A botched hack attempt using “sophisticated spyware package” allegedly tailored by an Israeli group on the iPhone of an Arab activist has triggered Apple...

University of California installs secret spyware system

Via WSWS. This piece was reprinted by RINF Alternative News with permission or license. Norisa Diaz Over the last few months, reports have revealed that the...
video

Video: Das Spyware! Germany approves ‘Trojan Horse’ to monitor suspects

Germany's government has approved the use of a so called “trojan horse” software bug to monitor the computers and smartphones of police suspects. RT...

NSA chief declines comment on hard drive spyware reports – but insists programs lawful

The head of the National Security Agency refused to comment on Monday on reports that the U.S. government implants spyware on computer hard drives...

‘Resist Surveillance’: Human Rights Groups Launch Tool to Detect Spyware

Detekt finds traces of 'dangerous and sophisticated' technology used by repressive governments against journalists and human rights defenders, Amnesty International says Nadia Prupis Amnesty International released...

Spyware phone app CEO indicted for conspiracy

The head of a company that sells a spyware application for smartphones has been indicted and arrested for conspiracy and other charges related to...

No! Your data is not safe!: Hackers Used Government Spyware to Data-rob iCloud

Alfredo Lopez One sensationally reported incident this week exposes a dual threat: your data isn't safe on a corporate-controlled "cloud" and spying software made for...

Leaked Docs Show Spyware Used to Snoop on U.S. Computers

Software created by the controversial U.K. based Gamma Group International was used to spy on computers that appear to be located in the United...

Implanted Eyes: NSA Puts Radio Spyware Inside Computers

The headquarters of the National Security Agency at Fort Meade, Md. “We do not use foreign intelligence capabilities to steal the trade secrets of...

Dell’s Twitter Account Apologizes For The ‘Inconvenience’ Of Helping NSA Install Spyware

Mike MasnickTechdirtDecember 31, 2013 There are times when big brands with “social media people” might want...

UK spyware used against Bahraini activists — court witness

UK spy technology was used against British citizen in Bahrain, new evidence filed in a UK high court has claimed. Activists are calling for...

Google engineer finds British spyware on PCs and smartphones

Two security researchers have found new evidence that legitimate spyware sold by British firm Gamma International appears to be being used by some of...

Spyware on your phone?

How suspicious spouses, protective parents, and concerned companies are turning to cheap and hard-to-detect commerical spyware apps to monitor your mobile communications. Sometime in early...

FBI sought approval to use spyware

By John Leyden Analysis The FBI has reportedly sought the go-ahead to use a custom spyware package to bug terrorists and other national security suspects....

Were US journalists paid to peddle ‘Russiagate’? — RT US News

From lurid reports of Trumpian ‘golden showers’ in Moscow to unverified claims of Russia ‘hacking’ Hillary...

‘Not the Russians’: John McAfee talks hacking allegations, cybersecurity with Larry King (VIDEO)

Following the release of an FBI report outlining Russia’s alleged role in hacking the 2016 election,...

Ethiopia’s Invisible Crisis

Ethiopian Prime Minister Hailemariam Desalegn confers with President Barack Obama “Badessa” was a third-year engineering student in western Ethiopia in April 2014 when he and...

Defending Against Overreaching Surveillance in Ethiopia: Surveillance Self-Defense now Available in Amharic

From telecommunications infrastructure to TV and radio airwaves, the Ethiopian government’s controls over communications infrastructure in the country means that even the most private...

Surveillance Company Hacking Team Exposed

A 400 gigabyte trove of internal documents belonging to surveillance company Hacking Team has been released online. Hacking team sells intrusive hacking tools that have allegedly been used by...

Israel Spied on Hotels Used for Iran Nuclear Talks

by Stephen Lendman (RINF) - It's not the first time Israeli spying on Iran nuclear talks was discovered. An earlier article discussed the following: On March...

‘Weaponizing Vulnerabilities’: New Snowden Doc Reveals Spy Agencies Targeted Smartphones

The 'Five Eyes' alliance exploited weaknesses in popular browser and planned to hijack links to app stores to implant spyware on mobile phones, new...

5 Ways Mass Surveillance Is Destroying the US Economy

Via Washington's Blog with permission Prosperity Requires Privacy Privacy is a prerequisite for a prosperous economy. Even the White House admits: People must have confidence that data will travel...

Edward Snowden shuns iPhones due to secret software that can be remotely activated to...

The iPhone has secret spyware that lets governments watch users without their knowledge, according to Edward Snowden's lawyer. The NSA whistleblower doesn’t use a phone...

Obama calls for more cybersecurity information sharing

President Barack Obama followed up Monday's speech about data breach notification with another speech Tuesday encouraging companies to share information about cyberattacks. In an address...

Is Barack Obama Attempting To Harass And Intimidate Media Personalities On His ‘Enemies List’?

Michael T. Snyder RINF Alternative News Someone is attempting to harass and intimidate media personalities that are very critical of Barack Obama and his administration. Whoever...

FBI says agent impersonated AP journalist in 2007 sting op

The Associated Press issued a harsh denunciation of the Federal Bureau of Investigation (FBI) after the internal intelligence agency admitted one of its agents...

The Dubious ‘Internet Safety Software’ That Hundreds of Police Agencies Have Distributed to Families

DAVE MAASS For years, local law enforcement agencies around the country have told parents that installing ComputerCOP software is the “first step” in protecting their children...

Illegal Wiretapping Is Illegal, Even for Governments

NATE CARDOZO Earlier this week, EFF told the U.S. District Court for the District of Columbia that Ethiopia must be held accountable for its illegal wiretapping of...

NSA partnering with Saudi regime ‒ Snowden leak

The National Security Agency has increasingly been working hand-in-glove with the repressive Saudi Arabian government since 2013, sharing intelligence and assisting with surveillance, according...

White House tracking website visitors with online ‘fingerprinting’

The White House is tracking visitors to its website, despite proudly promising that WhiteHouse.gov complies with federal privacy laws and does not use cookies....

Cybersecurity bill will expand surveillance powers of US military and intelligence agencies

Thomas Gaist The Senate Intelligence Committee voted 12-3 last week in favor of the Cybersecurity Information Sharing Act (CISA) of 2014, new legislation that massively...

Video: NH Republican Gubernatorial Candidate Called Tea Party Members “Teabaggers”

Annabelle Bamforth via Ben Swan Video has surfaced of Walter Havenstein, the GOP establishment’s pick to challenge Maggie Hassan (D-NH) in the upcoming New Hampshire...

UK tax office unlawfully hid export data of cyber-espionage tech to dictatorships

The UK's tax office acted in "irrationally" and unlawfully, according to the UK High Court, after it systematically refused to discuss the status of...

Judicial Watch Played Into The Government’s Hands – Americans Are Blinded By Agendas

Judicial Watch Played Into The Government’s Hands Americans Are Blinded By Agendas Paul Craig Roberts Disinformation succeeds because so many people and interest groups across the political spectrum find that it serves their agendas as well as the agenda of…

The post Judicial Watch Played Into The Government’s Hands — Americans Are Blinded By Agendas appeared first on PaulCraigRoberts.org.

Surveillance Valley Has Put a Billion Bugs in a Billion Pockets

While Google is notoriously private, one thing we do know is that the company has a nasty reputation for repeatedly making a farce of...

Snowden reveals Massive National Security Agency Hacking Uunit

The US National Security Agency (NSA) runs an Office of Tailored Access Operations (TAO), described by Germany's Der Spiegel as the “NSA's top operative...

The NSA can hijack your Wi-Fi from 8 miles away

Sarah Weber If you're already hyperventilating over a report published this weekend offering new details on National Security Administration spying, an enlightening presentation by the...

Is The NSA Quartering “Digital” Troops Within Our Homes?

Are “Digital” Troops Being Sent Into Our Digital Devices Like British Troops Were Sent Into American Colonists' Homes? Washington's Blog We...

iSpy? Apple Denies Assisting NSA with iPhone “Back Door”

Apple, the company giant behind the iconic iPhone, declared on Monday that is has never assisted the NSA in its efforts to create "back...

Apple Says It Knows Nothing About Your iPhone Spying On You

Kurt Nimmo So, it turns out the NSA can drop in on your Apple iPhone anytime it wants to. Thanks to the best...

NSA has complete control of your iPhone, can activate your microphone and camera without...

Joshua CookBen Swann.comDecember 31, 2013 Leaked documents now show what we all suspected: the NSA can...

Snowden reveals massive National Security Agency hacking unit

By Robert Stevens 31 December 2013 The US National Security Agency (NSA) runs an Office of Tailored Access Operations (TAO), described by Germany's Der Spiegel as the...

New Snowden document reveals NSA’s international malware operation

By Kevin Reed28 November 2013 A presentation slide provided by Edward Snowden and published by the Dutch media outlet NRC on November 23 shows...

32 Privacy Destroying Technologies That Are Systematically Transforming America Into A Giant Prison

If you live in the United States, you live in a high tech surveillance grid that is becoming more oppressive with each passing day.  In America today, the control freaks that run things are completely obsessed with watching, tracking, monitoring and recording virtually everything that we do.  If we continue on the path that [...]

Security at the JFK Thing in Dealey Plaza Was “Piss-Poor.” That’s Because It...

Jim SchutzeThe Dallas ObserverNovember 25, 2013 The only truth-teller Friday was Alex Jones, who said the whole thing was a lie. By now all of...

Stupid Government Policy Is More Dangerous than Terrorism

The Shocking Reasons that Americans Are Right to Be More Afraid of Bad Government Policy than Terrorism Preface: I am not so much anti-government as...

Stupid Government Policy Is More Dangerous than Terrorism

The Shocking Reasons that Americans Are Right to Be More Afraid of Bad Government Policy than Terrorism Preface: I am not so much anti-government as anti-stupid policy. (Moreover, the problem is not solely “bad government” or “corrupt corporations”. The deeper … Continue reading

Stupid Government Policy Is More Dangerous than Terrorism was originally published on Washington's Blog

Nokia and Samsung say they can’t track powered-down phones despite NSA claims

Tom Warren The Verge November 12, 2013 The Washington Post claimed that the National Security Agency (NSA) had developed a method nine years ago to locate cellphones...

Made-in-China kitchen appliances found to contain hidden Wi-Fi circuitry that installs malware on your...

J.D. HeyesNatural NewsNovember 6, 2013 As the author of the insightful, prophetic book “1984,” even George Orwell's discussed “surveillance society” wasn't so sinister as to...

NSA’s Path to Totalitarianism

The New York Times, a recipient, along with the Guardian, of Snowden's disclosures about the illegal activities of Obama and USG, is breaking out,...

Dark Mail Alliance ‘fighting to bring privacy back’ by reinventing email encryption

Published time: October 31, 2013 01:06 AFP Photo Two US companies that have become symbols for the fight against ongoing National Security Agency surveillance...

RINFORMATION

USA Topics 9/11 Agenda 21 Assassinations Banks Bush, George Jr Boston Bombings Bohemian Grove CIA Cointelpro Corruption DARPA Democrats Disinformation Congress Drones Eugenics FBI Federal Reserve Guantanamo HAARP ...

Computer retailer settles charges of spying through webcams

The rent-to-own retailer Aaron's Inc. has reached a settlement with the Federal Trade Commission concerning allegations that it used software installed on its computers...

Welcome to Post-Constitution America: The Weapons of War Come Home

Peter Van BurenRon Paul InstituteAug 8, 2013 On July 30, 1778, the Continental Congress created the...

Welcome to Post-Constitution America

http://www.truthdig.com/report/item/welcome_to_post-constitution_america_20130805/ Posted on Aug 5, 2013 By Peter van...

FBI using hacker techniques to spy on Americans

  By ...

FBI let informants commit 5,600 crimes

The FBI let its informants commit over 5,600 crimes in one year.Newly disclosed documents show the Federal Bureau of Investigation in the US allowed...

FBI Taps Hacker Tactics to Spy on Suspects

Jennifer Valentino-Devries and Danny Yadron The Wall Street Journal August 2, 2013 Law-enforcement officials in the U.S. are expanding the use of tools routinely...

FBI using hacker tactics for spying

A report shows the FBI uses hacking techniques for spying purposes.The Federal Bureau of Investigation in the US is using tools and tactics routinely...

You Selling to Me?

Last week you wanted to buy an air ticket. You looked at the price on the airline’s website, searched the net for a better...

Bin Laden's AK-47 displayed in CIA museum

The CIA’s museum in Langley, Virginia, recently acquired a new artifact: the AK-47 of Osama bin Laden, a weapon that was found beside the...

German intelligence services work closely with NSA

  By ...

Is the Government Spying On You Through Your Own Computer’s Webcam Or Microphone?

Washington’s BlogJune 25, 2013 We documented earlier today that - if you are near your smart...

Is the Government Spying On You Through Your Own Computer’s Webcam Or Microphone?

Government — Or Private Individuals — May Be Watching and Listening We documented earlier today that - if you are near your smart phone —...

Cell Phone Users Beware: How to Protect Yourself from Government Spying

Unless You Know About This Spying Method, You Might Say Something Which Could Get You In Hot Water Given that the NSA is tapping into...

Cell Phone Users Beware: How to Protect Yourself from Government Spying

Unless You Know About This Spying Method, You Might Say Something Which Could Get You In Hot Water Given that the NSA is tapping into...

The SINGLE Most Important Step to Protect Yourself from Government Spying

Washington’s BlogJune 24, 2013 Given that the NSA is tapping into your phone calls and spying...

“Conspiracy of Secrecy”: System Failure, Cyber Threats and Corporate Denial

“Computer commands can derail a train or cause a gas pipeline to burst,” warned former Bush administration counter-terrorism chief Richard Clarke in Cyber War,...

Terms & Conditions

Introduction These terms and conditions govern your use of this website; by using this website, you accept these terms and conditions in full.  If you...

The Obama Regime: What the NSA Revelations Tell Us about America’s Police State

Ongoing revelations by The Guardian and The Washington Post of massive, illegal secret state surveillance of the American people along with advanced plans for...

Spies Without Borders: Using Domestic Networks to Spy on the World

Much of the U.S. media coverage of last week’s NSA revelations has concentrated on its impact on the constitutional rights of U.S.-based Internet users....

Spies Without Borders: Using Domestic Networks to Spy on the World

Much of the U.S. media coverage of last week’s NSA revelations has concentrated on its impact on the constitutional rights of U.S.-based Internet users....

‘NetTraveler’ cyber-spy network compromised over 350 high-profile victims — Kaspersky report

Kaspersky Lab has discovered a years-long cyber-espionage operation that victimized hundreds of high-profile targets in 40 countries. The malware, known as NetTraveler, was used...

‘Iran ready to counter US cyber threats’

Iran has been the target of several cyberattacks over the past few years. (File photo)An Iranian lawmaker says the country has what it takes...

US claims Chinese military is on new cyber offensive against America

Officials within the United States government say hackers from China have renewed their assault on US targets only three months after a highly-touted investigation...

US claims Chinese military is on new cyber offensive against America

Officials within the United States government say hackers from China have renewed their assault on US targets only three months after a highly-touted investigation...

The US Government Might Be the Biggest Hacker in the World

Cyber crime is big business in the US. It’s used to spy, steal, harass competition, political opponents, or to stage an attack and blamed...

'Iran N-sites immune to quake, cyber raid'

Iranâ„¢s nuclear facilities are fully safeguarded against the most powerful earthquakes and any potential cyber attacks, head of Iran's Environment Protection Organization (IEPO) says. Å“The...

MiniDuke: New cyber-attack ‘hacks governments’ for political secrets

Published time: February 27, 2013 21:35

Image from flickr.com user@dustball

The governments of at least 20 countries may have fallen victim to a sophisticated new cyber-attack. Security experts believe the hackers are attempting to steal political intelligence.

The governments of at least 20 countries may have fallen victim to a sophisticated new cyber-attack. Security experts believe the hackers are attempting to steal political intelligence.

Computer security firms Kaspersky Lab and CrySyS Lab discovered that the malware, dubbed "MiniDuke," targeted government computers in the Czech Republic, Ireland, Portugal and Romania along with think tanks, research institutes and healthcare providers in the United States.

“The technical indicators from our analysis show this is a new type of threat actor that hasn't been seen before,” Kurt Baumgartner, a senior security researcher with Kaspersky Lab, told RT.

Although experts avoid speculating on who the attackers may be, Baumgartner clarified that “based on the target victims and the functionality of the malware” the objective of MiniDuke’s authors is “to collect geopolitical intelligence.”

The threat operates on low-level code to stay hidden, and uses Twitter and Google to get instructions and updates. It allegedly infected PCs when ‘victims’ opened a cleverly disguised Adobe PDF attachment to an email.

“The high level of encryption in the malware and the flexible system it used to communicate with the C2 via Twitter and Google indicates this was a strategically planned operation,” Baumgartner said.

The PDF documents were specifically tailored to their targets, according to the researchers. The attachments referred to highly relevant topics subjects like “foreign policy,” a “human rights seminar,” or “NATO membership plans."

When the files were opened, MiniDuke would install itself on the user's computer.

So far it is only known that the malware then connects to two servers, one in Panama and one in Turkey, but security researchers say there are no clear indications of who was behind the online attacks.

According to Karpersky Lab the spyware was written in “assembler language,” a low-level code where each statement corresponds to a specific command, and is very small in size, only 20 kilobytes. Assembler language codes are written specifically for each system they are meant to attack, as opposed to higher-level codes, which can infect multiple types of technologies.

The way the malware was created and used indicates that the attackers “have knowledge from the elite, ‘old school’  type of malicious programmers who were extremely effective at creating highly complex viruses in the past,” Baumgartner says. “MiniDuke’s attackers have combined these skills with the newly advanced sandbox-evading exploits to target high-profile victims, which is unique and something we haven’t seen before.”

MiniDuke is a three-stage attack, technology news and information website, Arstechnica, explains. First it tricks a victim into opening an authentic-looking PDF document, and then infected machines start using Twitter or Google “to retrieve encrypted instructions showing them where to report for additional backdoors.”

"These accounts were created by MiniDuke’s Command and Control (C2) operators and the tweets maintain specific tags labeling encrypted URLs for the backdoors,” Kaspersky Lab said in a statement. “Based on the analysis, it appears that the MiniDuke’s creators provide a dynamic backup system that also can fly under the radar - if Twitter isn’t working or the accounts are down, the malware can use Google Search to find the encrypted strings to the next C2.

Stages two and three are hidden inside a GIF image file which is downloaded from the command server and “disguised as pictures that appear on a victim’s machine.”

Image from securelist.com

Eugene Kaspersky, founder and chief executive of Kaspersky Lab, compared the highly-advanced MiniDuke to “malicious programming from the end of the 1990s and the beginning of the 2000s”, saying it has the potential to be "extremely dangerous" because it was an "elite, old-school" attack.

"This is a very unusual cyber-attack," the statement emailed to RT read.

"I remember this style of malicious programming from the end of the 1990s and the beginning of the 2000s. I wonder if these types of malware writers, who have been in hibernation for more than a decade, have suddenly awoken and joined the sophisticated group of threat actors active in the cyber world. These elite, “old school” malware writers were extremely effective in the past at creating highly complex viruses," Kaspersky's CEO added.

Neither Kaspersky nor CrySyS is disclosing what the malware does once it takes hold of a victim until they have had a chance to privately warn infected organizations, Arstechnica reported.

According to the technology news and information website, at least 60 victims have been affected. Kaspersky has identified at least 23 affected countries, including the US, Hungary, Ukraine, Belgium, Portugal, Romania, the Czech Republic, Brazil, Germany, Israel, Japan, Russia, Spain, the UK, and Ireland.

Revelations about the new malware come two weeks after Silicon Valley security firm FireEye discovered security flaws in Reader and Acrobat software.

Leaked document sample. Image from securelist.com


29 Signs That The Elite Are Transforming Society Into A Total Domination Control Grid

Michael Snyder, Activist Post |  The elite want to tightly control almost everything that we do, say and think. When most people think of "tyranny", they...

Dutch gov can break in and destroy computers

Door Ot van Daalen | On 15 October, the Dutch ministry of Justice and Security proposed powers for the police to break into computers, install...

FTC admits laptop firms spied on users, stole private data & took photos

DAVID KRAVETS | Seven rent-to-own companies and a software maker are settling charges with the Federal Trade Commission that rental computers illegally used spyware that took...

Exposed: Government-Distributed Cyber-Spy Trojans

Robert Lemos | After pro-democracy activists in Bahrain are hit by email attacks that would have installed spyware, a spreading investigation reveals more details about corporate-made...

Why App Stores Work

by Tavis J. Hampton
It seems everyone wants an app store now. You cannot turn on the TV or the web and not see or hear someone talking about apps and app stores. A lot of the app store popularity...

High-Tech Technology — Are You Safe?

by Melissa Dean
The Smartphone craze has gotten to the point where Smartphones are outselling conventional PCs. It is OK to be crazy about your Smartphone or to want to own one – after all, jumping on the bandwagon is...

US cybersecurity plan poses new war threats

By Tom Eley | President Barack Obama announced on Friday the creation of a new “cyber czar” position. The Cybersecurity Coordinator, who is yet to...

Data Mining Your Life

By Carlton Meyer | Few Americans pay attention to the Bush administration’s effort to better monitor terrorist communications. In short, federal authorities want to...

Did BT spy on 36,000 customers?

By MATTHEW HICKLEY BT tested secret "spyware" on tens of thousands of its broadband customers without their knowledge, it admitted yesterday. It carried out covert trials...

Wanted By The FBI: Everyone’s Data

By LEONARD PITTS JR. In the beginning was the fingerprint. It was in the 19th century that scientists realized the ridged whorls on the tip of...

Wal-Mart Spying: Good, Bad, Or Just The Future?

Mel Duvall Wal-Mart is used to finding its name on the front page of The New York Times and The Wall Street Journal, but in...

Sears Spying On Its Users & Reveals Their Data

Weren't we just discussing the idea of criminal liability for egregious security problems with data? And... weren't we also just discussing Sears' offering to...

Check your privacy

If your organisation is using CCTV, substance-abuse testing, or checking staff email chat, maybe you should do a Privacy Impact Assessment (PIA). So the...

9/11 And Other Optical Illusions

Peter Zaza There's a wonderful optical illusion which involves a graphic of a ballerina spinning around on one leg. It's called "The Spinning Silhouette Optical...