loading

The perfect choice of one-stop service for diversification of architecture.

Revealed: How Governments Can Take Control of Smartphones

Operating since 2001, the Milan-based Hacking Team employs over 50 people and offers clients the ability to “take control of your targets and monitor them regardless of encryption and mobility," while “keeping an eye on all your targets and manage them remotely, all from a single screen.” It’s the first time Remote Control Systems (RCS) malware has been positively linked with mobile phones and it opens up a new privacy threat potential to mobile phone users.“Our latest research has identified mobile modules that work on all well-known mobile platforms, including as Android and iOS,”wrote Kaspersky researcher Sergey Golovanov.“These modules are installed using infectors – special executables for either Windows or Macs that run on already infected computers. They translate into complete control over the environment in and near a victim’s computer. Secretly activating the microphone and taking regular camera shots provides constant surveillance of the target – which is much more powerful than traditional cloak and dagger operations.” Police can install the spy malware directly into the phone if there is direct access to the device, or if the owner of the phone connects to an already infected computer, according to Wired. Various softwares can also lure users to download targeted fake apps. Once inside an iPhone, for instance, it can access and activate all of the following: control of Wi-Fi, GPS, GPRS, recording voice, e-mail, SMS, MMS, listing files, cookies, visited URLs, cached web pages, address book, call history, notes, calendar, clipboard, list of apps, SIM change, live microphone, camera shots, support chats, WhatsApp, Skype, and Viber. While the malware can be spotted by some of the more sophisticated anti-virus software, it takes special measures to avoid detection – such as “scouting” a victim before installation, “obfuscating” its presence, and removing traces of its activity. Hacking Team has maintained that its products are used for lawful governmental interceptions, adding that it does not sell items to countries blacklisted by NATO or repressive regimes. Wired reported that there have been cases where the spying apps were used in illegal ways in Turkey, Morocco, and Saudi Arabia. Citizen Lab discovered spying malware hiding in a legitimate news app for Qatif Today, an Arabic-language news and information service that reports on events in Saudi Arabia's eastern Qatif region. It also argued that circumstantial evidence pointed to Saudi Arabia’s government using the spying malware against Shia protesters in the area.“This type of exceptionally invasive toolkit, once a costly boutique capability deployed by intelligence communities and militaries, is now available to all but a handful of governments. An unstated assumption is that customers that can pay for these tools will use them correctly, and primarily for strictly overseen, legal purposes. As our research has shown, however, by dramatically lowering the entry cost on invasive and hard-to-trace monitoring, the equipment lowers the cost of targeting political threats for those with access to Hacking Team and Gamma Group toolkits,” Citizen Lab said in its report. Hacking Team controls the spying malware remotely via command-and-control servers. Kaspersky has discovered more than 350 such servers in more than 40 countries. A total of 64 servers were found in the US – more than in any other country. Kazakhstan came in second, with a total of 49 servers found. Thirty-five were found in Ecuador and 32 in the UK.

Revealed: How Governments Can Take Control of Smartphones 1

GET IN TOUCH WITH Us
recommended articles
Related Blogs blog
Passengers Play Mobile Phones on the Plane! One Person Is Willful and One Plane Is Delayed. the Puni
One person willfully delayed one plane, which happened on the flight on August 19. It is because passengers willfully want to play with their mobile phones that the ...
Huawei Changxiang Z 5g How About 5g Mobile Phone Huawei Changxiang Z Dismantling 1318 Components of
Huawei Changxiang Z starts at 1699. It is equipped with Tianji 800 processor and focuses on the concept of "1000 yuan 5g". I believe many small partners have long un...
Why Hasn't the Hongmeng System Moved_ When Will Huawei Hongmeng System Mobile Phones Be Available
Why hasn't the Hongmeng system movedWhen it comes to mobile phone systems, we all know that among the current smart phone systems, the most on the market are Apple's...
The Cold Winter of Mobile Phone Is Approaching. Can Apple Grasp 5g Life-saving Straw
While we still maintain our enthusiasm for the mobile phone market in the rapid progress and sharp marketing methods of Huawei, Xiaomi and oppo, the cold winter of t...
Mobile Phone Battery Universal Charger Failed
November 23, 2009 8:36:51The Provincial Administration for Industry and Commerce sampled 40 batches of chargers produced by 26 enterprises, focusing on safe use proj...
Gallium Nitride Charger Is Recommended As an Essential Charging Partner for Mobile Phone Tablet
Now, digital consumer electronic products have become an indispensable tool in people's daily life, such as mobile phones, tablets, notebooks and so on. However, wit...
Is the Picture Taken by a 100 Million Pixel Mobile Phone Really Better Than That Taken by an Ordinar
Mobile phone pixels have always been a hot topic and one of the main needs of many users. However, there is a problem. It seems that we have entered a misunderstandi...
Analysis on the Development of Folding Mobile Phone in the Future
Speaking of folding devices, it is no stranger to the post-80s and post-90s. When the tide of smart phones has not swept the mobile phone circle, flip design is one ...
Can the New Generation 5g Mobile Phone Help Gree Mobile Phone Open a New Situation?
No one can rank ahead of Dong Mingzhu in terms of perseverance.Recently, without any preheating, a new product called "DASONG 5g mobile phone" quietly logged into Gr...
Who Will Solve the Face Information Security Concerns Caused by "mobile Phone Theft"?
A month ago, an article "the black industrial chain of stealing personal information and realizing fund theft due to the theft of a mobile phone" (the original autho...
no data
Customer service
detect