[Chapter-delegates] HK Protesters Targeted with Spyware
Ariel Manoff
amanoff at vmf.com.ar
Sun Oct 5 14:49:43 PDT 2014
+1
Héctor Ariel Manoff
Vitale, Manoff & Feilbogen
Viamonte 1145 10º Piso
C1053ABW Buenos Aires
República Argentina
Te: (54-11) 4371-6100
Fax: (54-11) 4371-6365
E-mail: amanoff at vmf.com.ar
Web: http://www.vmf.com.ar
-----Mensaje original-----
De: Chapter-delegates [mailto:chapter-delegates-bounces at elists.isoc.org] En nombre de Winthrop Yu
Enviado el: jueves, 02 de octubre de 2014 21:44
Para: ISOC Chapter Delegates
Asunto: Re: [Chapter-delegates] HK Protesters Targeted with Spyware
+1 Chester!
On 10/2/2014 2:58 PM, chester at soong.net wrote:
> Dear All,
>
> I joined the protest for 3 days and some of my friends in the IT
> profession were there on the most violent day and being pepper-sprayed, hit, and tear-gased!
>
> We did worry about that but the Chief Executive of HK can, under his
> authority, to shut down and intercept all telecommunications on an
> executive order. So most of us have turned to Firechat now, and we
> almost held a talk with Micha Benoliel as he happened to be in HK.
> Now, it is not about getting your phone hacked or communications
> sniffed anymore. It has gone back to traditional government
> suppressing of protests with people infiltrating into the largely
> peaceful protests and stir up unrests! Honestly, I worry about how
> this will end. This has gone beyond the Internet, but it has helped us so far in spreading the truth and unveiling the issues.
>
> Regards,
>
>
> Chester
>
> On Wed, 1 Oct 2014 20:17:16 -0400
> Glenn McKnight <mcknight.glenn at gmail.com> wrote:
>> Protesters in Hong Kong calling for democracy reforms are being
>> targeted by spyware that can affect both iPhones and smartphones
>> running Google’s Android software, a security company claims.
>>
>> However the iPhone users among the thousands of protesters should be
>> safe if they have not bypassed Apple’s security system to “jailbreak”
>> their phones to install unapproved apps.
>>
>> The discovery marks the second time that the demonstrators’ phones
>> appear to have been targeted since the protests began last week.
>>
>> Dubbed Xsser mRAT by Israeli firm Lacoon Mobile Security, the malware
>> is being run from the same server as a malicious program targeting
>> Android phones spotted last week
>> <http://www.scmp.com/news/hong-kong/article/1594667/fake-occupy-central-app-targets-activists-smartphones>.
>>
>> That masqueraded as an app for the Occupy Central pro-democracy
>> movement and was spread via messages on the cross-platform Whatsapp
>> messaging system which urged readers to “Check out this Android app
>> designed by Code4HK for the coordination of Occupy Central!”. Protest
>> organisers said none of its members had developed or distributed the application.
>>
>> Lacoon said the Chinese government, which has been accused of various
>> digital attacks on activists in recent years, was likely coordinating
>> the attacks – though there is no proof the iPhone malware has
>> infected any of the protesters’ phones. Only those which have been
>> “jailbroken” by the owner to circumvent Apple’s normal security
>> against unauthorised apps are vulnerable. However some users in Asia
>> have jailbroken their iPhones in order to install local apps that are
>> not approved for Apple’s App Store, or run special software. The
>> malware does not itself appear to be able to jailbreak the iPhones.
>>
>> The version targeting Android smartphones can spy on the user because
>> it masquerades as an app for organising the protest - and requests
>> access to the owner’s phone address book, web browsing history,
>> location, text messages, and phone call log. It can also record
>> audio. Those details can then be sent to a web server in South Korea
>> which appears to be controlled by a source in mainland China. If
>> successfully installed, the iPhone malware collects the same data.
>>
>> “Cross-platform attacks that target both iOS [iPhone] and Android
>> devices are rare, and indicate that this may be conducted by a very
>> large organisation or nation state,” Lacoon co-founder Ohad Bobrov
>> said in ablog post
>> <https://www.lacoon.com/lacoon-discovers-xsser-mrat-first-advanced-ios-trojan/>.
>> “The fact that this attack is being used against protesters and is
>> being executed by Chinese-speaking attackers suggests it’s first iOS
>> trojan linked to Chinese government cyber activity.”
>>
>> The US-based Electronic Frontier Foundation noted the likelihood of
>> anyone involved in the Hong Kong protests getting infected was not
>> high, given iOS devices had to be jailbroken and Android users still
>> had to be tricked into downloading the malicious software, which was
>> not on the official Google Play market and was not spreading on its own.
>>
>> The EFF also said that just because the iOS and Android malware are
>> run from the same servers does not mean they are both are aimed at
>> Hong Kong protesters.
>>
>> Claudio Guarnieri, a security expert now working to help activists
>> across the globe, said over Twitter the iOS malware didn’t seem
>> unique and was certainly not advanced as Lacoon had suggested, nor
>> was there any evidence it was hitting Hong Kong protesters.
>>
>> But onlookers are still concerned about the range of malware
>> targeting activists over different platforms. Security firm Kaspersky
>> Lab confirmed it had also seen various examples of malicious apps for
>> iOS and Android, as well as spyware samples for other platforms,
>> related to the Hong Kong protests.
>>
>> “Since nearly every part of our lives now has a digital aspect to it,
>> it’s no surprise, in a situation like this, to discover that there
>> are those who wish to steal information from those involved. It is
>> not the first nor the last attack of this kind. We previously
>> observed both targeted and cybercriminal attacks against mobile
>> users. This is unlikely to stop anytime soon, on the contrary, we are
>> witnessing a steady growth of mobile malware,” said David Emm, principal security researcher at Kaspersky Lab.
>>
>> Guarnieri told the Guardian attacks over mobile on activists “have
>> been happening for a while already and certainly won’t stop”.
>>
>> “By experience I see many activists putting an inherent trust in
>> their phones while growing a distrust in their computers, and that
>> leads sometimes to irresponsible use of both those technologies.”
>>
>> In June, so-called “lawful interception” technology was seen posing
>> as a genuine Android news app, which appeared to be targeting people
>> linked to political protest in eastern Saudi Arabia
>> <http://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/>.
>>
>> Analyses of government-grade iOS malware date back to at least 2012.
>> Glenn McKnight
>> mcknight.glenn at gmail.com
>> skype gmcknight
>> twitter gmcknight
>> .
>
> _______________________________________________
> As an Internet Society Chapter Officer you are automatically
> subscribed to this list, which is regularly synchronized with the
> Internet Society Chapter Portal (AMS): https://portal.isoc.org
_______________________________________________
As an Internet Society Chapter Officer you are automatically subscribed to this list, which is regularly synchronized with the Internet Society Chapter Portal (AMS): https://portal.isoc.org
---
Este mensaje no contiene virus ni malware porque la protección de avast! Antivirus está activa.
http://www.avast.com
More information about the Chapter-delegates
mailing list