• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • March 5th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Surveillance

An Alarming Number of Governments are using FinFisher Malware: Report

October 25th, 2015 Agan Uzunovic Malware, Security, Surveillance 0 comments
An Alarming Number of Governments are using FinFisher Malware: Report
Share on FacebookShare on Twitter

According to a study carried out by the Citizen Lab (a research department at the University of Toronto), FinFisher is the most used spyware by many government agencies around the world.

Finfisher was developed by a German security company (FinFisher GmBH). The company has been selling this spyware to many law enforcement agencies from many different parts of the world.

FinFisher used in the past for illegal government surveillance:

This spyware is used illegally because it’s been sold to only law enforcements agencies in many states like Ethiopia and Bahrain have been found using the Spyware illegally. States like these have been using this spyware as a way of keeping the people who oppose the state’s policies quiet.

Image Source: Citizenlabs

Image Source: Citizen lab

Spyware’s way of working:

The spyware has a complete system by which it transfers all the information from the spied PC to the agencies. It all starts from the spyware picking up the information from the PC then sending data to a C&C server through proxies.

This works nearly the same way Tor system works but minus the complex encryptions.

Citizen lab, in the past, were unable to differentiate the FinFisher replays and C&C server, but they are now able to differentiate and also many FinFisher network all around the world.

[fullsquaread][/fullsquaread]

 FinFisher spyware infrastructure:

According to Citizen Lab, FinFisher has reached 32 countries so far. 135 instances of the spyware have been observed (Including both the replays and servers).

The 32 countries that currently deploy FinFisher are as follows:

Screen Shot 2015-10-24 at 11.41.19 PM

Among the above-mentioned countries, Pakistan was the only one where civil society challenged the use of Finfisher spyware in the court.

Furthermore, Citizen Lab was also able to trace the IP addresses of C&C servers which belonged to 10 different agencies. What’s even worse is that the relay servers of different countries are located in other countries, which can allow one country’s agency to look into another’s.

The graph shows countries using FinFisher malware:

finfisher-malware-top-among-governments-4

Image Source: Citizen lab

“The market for intrusion software like FinFisher is challenging to track because of the key players, from government customers to software developers, have a strong interest in keeping transactions private,” said the Citizen Lab researchers.

2014 data breach helped the company gain more deals:

FinFisher GmBH was hacked in 2014 and some 40 GB data from the company was leaked. But, it wasn’t enough to find useful stuff regarding the widespread use of their spyware.

But, interestingly, it did increase the demand for the spyware as more countries demand for spying increase with each passing day. Wikileaks document also referred to this in its recent leaks.

[fullsquaread][/fullsquaread]

Note:

While researching about FinFisher spyware we ended up reading how a researcher deleted this software from his system. You should go through it as a safety precaution.

[src src=”Source” url=”https://citizenlab.org/2015/10/mapping-finfishers-continuing-proliferation/”]Citizenlab[/src] 

  • Tags
  • Encryption
  • Finfisher
  • Germany
  • government
  • Malware
  • Privacy
  • Spyware
  • Surveillance
  • Tor
Facebook Twitter LinkedIn Pinterest
Previous article Searching for Java, MSN 7, Windows 8 etc on Google Can Lead You to Malware
Next article Anonymous Targets Thai Govt, Leaks Data from State-owned Telecom Firm
Agan Uzunovic

Agan Uzunovic

Agan Uzunovic is a Bosnian journalist who is working for the country's largest newspaper. He has a keen interest in reporting on activism and hacktivism. He is also a contributor at U.S based Revolution News media. Agan reports and writes for HackRead on IT security related topics.

Related Posts
IT Security firm Qualys extorted by Clop gang after data breach

IT Security firm Qualys extorted by Clop gang after data breach

Marketing firm CallX exposed customers data including call recordings

Marketing firm CallX exposed customers data including call recordings

Flaw allowed bypassing verification code, log in to any Microsoft account

Flaw allowed bypassing verification code, log in to any Microsoft account

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Top Russian hacker forums Maza, Verified hacked; data leaked online
Hacking News

Top Russian hacker forums Maza, Verified hacked; data leaked online

IT Security firm Qualys extorted by Clop gang after data breach
Cyber Crime

IT Security firm Qualys extorted by Clop gang after data breach

Marketing firm CallX exposed customers data including call recordings
Leaks

Marketing firm CallX exposed customers data including call recordings

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us