Weaponised German surveillance malware used by intelligence agencies leaked by Wikileaks!

Discussion in 'Industry News' started by ArticStorm, Sep 17, 2014.

  1. ArticStorm

    ArticStorm Moderator Staff Member

    Joined:
    Jun 7, 2011
    Messages:
    7,571
    Likes Received:
    3,827
    Location:
    AudioSexPro
    [​IMG]

    Today, 15 September 2014, WikiLeaks releases previously unseen copies of weaponised German surveillance malware used by intelligence agencies around the world to spy on journalists, political dissidents and others.

    FinFisher (formerly part of the UK based Gamma Group International until late 2013) is a German company that produces and sells computer intrusion systems, software exploits and remote monitoring systems that are capable of intercepting communications and data from OS X, Windows and Linux computers as well as Android, iOS, BlackBerry, Symbian and Windows Mobile devices. FinFisher first came to public attention in December 2011 when WikiLeaks published documents detailing their products and business in the first SpyFiles release.

    Since the first SpyFiles release, researchers published reports that identified the presence of FinFisher products in countries aroud the world and documented its use against journalists, activists and political dissidents.

    Julian Assange, WikiLeaks Editor in Chief said: "FinFisher continues to operate brazenly from Germany selling weaponised surveillance malware to some of the most abusive regimes in the world. The Merkel government pretends to be concerned about privacy, but its actions speak otherwise. Why does the Merkel government continue to protect FinFisher? This full data release will help the technical community build tools to protect people from FinFisher including by tracking down its command and control centers."
    Code:
    https://wikileaks.org/spyfiles4/index.html
    PS: read the Support mails and also interesting are those video presentations or the pptx for training.
    i hope the malware reversers will do their job and reverse this things for us, that we can fight back by detecting them. :dancing:
    Thanks a lot for sharing WikiLeaks! :wink:

    [​IMG]
     
  2.  
  3. 2poor2

    2poor2 Producer

    Joined:
    Jul 13, 2014
    Messages:
    342
    Likes Received:
    88
    ahhh, those pigs...

    ahh, that video... dirty Schwein.

    i wonder how much symantec and other companies get paid, for not detecting such crap..

    just checked their xlsx file about antivirus... the little avast antivirus is the one who intercepts the malware, in most situations. incredible.
    and they use calc.exe and notepad.exe as some examples of infected files. damn, need to check my signature... and scan those 2 files.. we never know :)

    update: reading the 300 pages manual right now. wow... it's not every day we have access to such documents.
    i hope wikileaks isn't being monitored, and my ip is now know, as i have downloaded some documents...


    wow, just check this, on the manual:

    "3.6.1 Backwards Unicode names
    It is possible to camouflage file names with Unicode characters. For instance, a file may show up as exe.importantdocument.doc in the email client or in Windows Explorer. However, an executable (EXE) file that will still be treated as such by the system, and launched when double-clicked, is hidden behind this file name. Windows has supported fonts that read and are displayed from right to left since Windows Vista. Therefore it is called Right-To-Left technique.
    Giving a file such kind of filename – still treated as an .exe – might a target easier click this file.
    FinSpy offers this functionality within the creation of a Trojan.
    Example Document Name: cutiveSummary.doc
    "

    it looks like windows was coded in a way that such things can easily be done !
     
  4. Pipotron3000

    Pipotron3000 Audiosexual

    Joined:
    Mar 13, 2013
    Messages:
    1,228
    Likes Received:
    615
    My phone is on Firefox OS...
    But it is based on Android :rofl:

    No really, almost every country in the world use such techniques :dunno:
     
  5. Kookaboo

    Kookaboo Rock Star

    Joined:
    Jun 17, 2011
    Messages:
    1,456
    Likes Received:
    429
    Location:
    Here and there.
    Dead Kennedys - I spy


    Tone2 also used computer intrusion systems, software exploits and remote monitoring systems…
    :rofl: :rofl: :rofl:
     
  6. nadirtozenith

    nadirtozenith Rock Star

    Joined:
    Nov 20, 2011
    Messages:
    397
    Likes Received:
    325
    Location:
    navigating between nadir zenith vectoring upwards
    hello,

    it seems that no(fucking)body is innocent... *yes*
    the no(fucking)bodies in government positions quite certainly are not. *yes*
    from their viewpoint no(other)bodies might exist in innocence, be those political dissidents, fringe thinkers, free existences, simply any person who exists outside their circuit. *yes*

    it seems, them or us (again, then again, then again)... *yes*

    until?

    all the best for all of us... :bow:
     
  7. ArticStorm

    ArticStorm Moderator Staff Member

    Joined:
    Jun 7, 2011
    Messages:
    7,571
    Likes Received:
    3,827
    Location:
    AudioSexPro
    the big problem is that symantec or other need to buy it. one complete suite costs 300k+€. i bet the whole world is buying stuff from finfisher.

    i can laugh on the support mails they sent. makes them to complete noobs.
    list of good ideas to prevent them from sniffing your system
    do not upgrade your system daily, leave your notebook, smartphone not alone, check filesize and MD5/SHA-1 checksums, be careful downloading files in general.
    use a livelinux to work w/o swap.


    better it is, that you dont have a smartphone, like i do. i think its globally used, because i think most of the agents arent that smart as we think.
     
  8. mono

    mono Audiosexual

    Joined:
    Jul 23, 2014
    Messages:
    1,062
    Likes Received:
    622
    Location:
    Floating Amongst the Stars
    I just downloaded some of the files from wikileaks and they have a virus in them ?
    read the small print befor you download anything ha ha. :unsure:
     
  9. ArticStorm

    ArticStorm Moderator Staff Member

    Joined:
    Jun 7, 2011
    Messages:
    7,571
    Likes Received:
    3,827
    Location:
    AudioSexPro
    because its malware they have included. there is also a torrent with the full suite approx 39GB.
     
  10. Olymoon

    Olymoon Moderator

    Joined:
    Jan 31, 2012
    Messages:
    5,782
    Likes Received:
    4,448
    Money makes the world go around , Until we stop that, all the rest will remain as is.
     
  11. mono

    mono Audiosexual

    Joined:
    Jul 23, 2014
    Messages:
    1,062
    Likes Received:
    622
    Location:
    Floating Amongst the Stars
    Time to recheck your virus programs .

    30 out of 52 so far.

    https://www.virustotal.com/en/file/dd97ddf862523088d7de4817c083c78539a4c6e503f14fdc4f3f8006e8e573da/analysis/1410964126/

    These are all now on my black list,

    AVware
    AegisLab
    AhnLab-V3
    Bkav
    ByteHero
    CAT-QuickHeal
    CMC
    ClamAV
    Cyren
    DrWeb
    F-Prot
    Jiangmin
    Kingsoft
    Malwarebytes
    Microsoft
    Panda
    Qihoo-360
    Rising
    SUPERAntiSpyware
    TheHacker
    TotalDefense
    VIPRE
    ViRobot
    Zillya
    Zoner
    =====

    @ArticStorm 39gb i'm thinking of collecting viruses as a hobby now,
     
  12. ArticStorm

    ArticStorm Moderator Staff Member

    Joined:
    Jun 7, 2011
    Messages:
    7,571
    Likes Received:
    3,827
    Location:
    AudioSexPro
    those are not viruses, those are malware/trojan and when you read about something like malware reversing, you would know that you have to run the stuff inside a VM and there you can also reverse it with IDA and a remote debugger.

    but good to see, some AV programs already detecting the trojans/malware.
    maybe you can check the other files too?

    i still see this a bit problematic for OSX and Linux there are no AV software or for smartphones, tablets, etc.
     
  13. lerkjurk

    lerkjurk Platinum Record

    Joined:
    May 22, 2014
    Messages:
    403
    Likes Received:
    297
    Location:
    Behind you

    Linux has www.clamav.net If youre on windows and want to try out clam, get ClamWin (& ClamSentinal for realtime scanning).
     
  14. Catalyst

    Catalyst Audiosexual

    Joined:
    May 28, 2012
    Messages:
    5,810
    Likes Received:
    802
    Yep these were the guys Jacob Applebaum was talking about in his Infect To Protect video floating around here somewhere. There's even an advertisement video that they use to entice prospective buyers and it's sickening. All part of the fucking circus we call planet Earth.
     
  15. 2poor2

    2poor2 Producer

    Joined:
    Jul 13, 2014
    Messages:
    342
    Likes Received:
    88
    and maybe we are so occupied with our vst plugins, that we don't even realize that there's probably a big market for this kind of software, and actually, there are hundreds of companies with hundreds of similar products fighting each other, making huge $price cuts, to expect to grab the next 10 million euros contract, sell some hundreds licenses to X country/government, etc etc.
     
  16. lerkjurk

    lerkjurk Platinum Record

    Joined:
    May 22, 2014
    Messages:
    403
    Likes Received:
    297
    Location:
    Behind you
    Fair warning about ClamAV, its in momo's list of "didnt detect" this german software, although this is more malware than virus, which is what clamAV is. Maybe now that this stuff leak they will detect it, i hope.
     
  17. mono

    mono Audiosexual

    Joined:
    Jul 23, 2014
    Messages:
    1,062
    Likes Received:
    622
    Location:
    Floating Amongst the Stars
    After scanning all files now,
    and the new files where only seen as spy-ware by three virus programs,<<<<<<< yes 3 out of 52 ?
    so there all in on it,or the malware/trojan is so good they cant stop it,
    here is a new program that is in beta and is free,
    its one out of the three programs that new what the files where,

    http://www.nanoav.ru/



    just to add these spyware files are used by police world wide and pose no real threat to most people
    as we have nothing to hide apart from the fact that we dont like people been abull to spy
    on us without our consent,what defeats the purpose of spyware.
    if you spend a lot of time on the web or just want to check your pc i would run a scan
    to be safe as you never know who else they would sell their spyware to
    as in this day and age like any other, money talks.
    i found 7 trojans on my pc from torrents i downloaded so now ill download torrents in-to my sandbox :wink:
     
Loading...
Similar Threads - Weaponised German surveillance Forum Date
SINEE Online Masterclass w Robert Babicz TUTORiAL - GERMAN Education Jun 15, 2023
Meet the german music genius Helge Schneider Music Nov 30, 2022
Most Complex Song / Chords Ever ...German DE Oct 4, 2022
Neue Deutsche Welle / New German Wave (Videos / Infos) Music Jul 15, 2022
Selling used computer parts in Germany Selling / Buying Jun 1, 2022
Loading...