By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    What is a Keylogger -Kaspersky Daily
    12 months ago
    An Interactive Map of Online Threats
    12 months ago
    KIS for Android: Secret Code vs. PIN
    12 months ago
    Latest News
    Two privilege escalation vulnerability in Simple Membership Plugin
    11 hours ago
    Wordfence Intelligence Weekly WordPress Vulnerability Report (September 11, 2023 to September 17, 2023)
    7 days ago
    Exploring Winrar Vulnerability (CVE-2023-38831) | McAfee Blog
    1 week ago
    Two PHP Object Injection Vulnerabilities Fixed in Essential Blocks
    1 week ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    ✅How To Fix Error PS1 Can Not Be Loaded Because Running Scripts Is Disabled On This System
    12 months ago
    Windows 10 22H2 releases as a preview for testers
    12 months ago
    How to check for app updates on Windows 11
    12 months ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    7 months ago
    Now you can speed up any video in your browser
    7 months ago
    How to restore access to a file after EFS or view it on another computer?
    8 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    8 months ago
  • How To
    How ToShow More
    How to get the latest Windows 11 innovations
    14 hours ago
    Dynamic Lighting is now available on Windows 11
    14 hours ago
    Writing poems using LLama 2 on Workers AI
    Writing poems using LLama 2 on Workers AI
    14 hours ago
    serverless GPU-powered inference on Cloudflare’s global network
    serverless GPU-powered inference on Cloudflare’s global network
    14 hours ago
    You can now use WebGPU in Cloudflare Workers
    You can now use WebGPU in Cloudflare Workers
    14 hours ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    Hacker who stole 10 million euros in IOTA cryptocurrency arrested
    10 months ago
    How to see deleted notifications on Android
    11 months ago
    How to install winget on Windows 11, 10
    10 months ago
    Latest News
    How to install September 2023 update with 23H2 features for Windows 11
    19 hours ago
    How to uninstall September update (KB5030310) from Windows 11
    19 hours ago
    How to remove the quiet mode icon in the corner of the iPhone 15 screen ProiPhone 15 Pro and iPhone
    2 days ago
    Sberbank has figured out how to effectively catch scammers – it will listen to everything you
    2 days ago
  • Glossary
  • My Bookmarks
Reading: The phenomenon of legal malware and cyber-mercenaries
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
ThreatsWordpress Threats

The phenomenon of legal malware and cyber-mercenaries

Vitus White
Last updated: 13 October
Vitus White 12 months ago
Share
6 Min Read

We are living in a fascinating time where PCs and networks are becoming increasingly integrated in our everyday lives. Only a short time ago they were taking over offices and production facilities, then they entered our living rooms and kitchens, and today almost everyone on the planet carries a moderately powerful connected PC right in their pocket. We are now entering a beautiful era of the Internet of Things where almost everything will be connected.

The more we entrust our everyday routines to computers, the more attractive they become for those that love digging into others’ secrets—bad guys (cybercriminals) and good guys (law enforcement officials who use hacking tactics for justified reasons) alike.

If we ignore their presumably contrary motivations, there is another interesting feature that we can use to tell them apart: Hacking and espionage are hardly crimes for the secret service, but instead are a part of their everyday work.

The phenomenon of legal malware

A key trend in today’s world of cybercriminal business is the legalization of cybercrime, which is positioned differently in the infosec market. For instance, selling zero day vulnerabilities (i.e. vulnerabilities with no security solutions put in place) is becoming increasingly prominent.

The legalization of cybercrime is becoming a trend in the world of cybercriminal business.

Now anyone (those that can afford certain vulnerabilities that can have more than five zeros on the price tag) can purchase an exploit and use it when appropriate—ideally, when protecting their assets, but practically, for almost anything. The trading of such vulnerabilities can be compared to the missile or sophisticated explosives trade.

Furthermore, some companies offer full-feature software bundles that can infiltrate networks and, after obtaining control of the victim’s PC, monitor their activities. We have talked about the highest-end spying Trojan – well, this case can be compared to selling fully packed VFs.

FinFisher-1

The Banner of FinFisher advertises their perfectly legal means of intrusion and remote monitoring.

Companies offering such services range from the largest defense industry conglomerates reporting to governments, to modestly sized independent companies.

 The latter would not, of course, sell malware to anyone, but their customer list is much more diverse: beyond secret service organizations, it includes major corporations. The services of such ‘mercenaries’ are actively purchased by third-world governments like Pakistan and Nigeria.

hacking-team-123

Galileo is powered by Hacking Team- another legal developer for cyber espionage

Also, it is important to note that the actual buyer of cyber-espionage services is not necessarily the formal one: there was a case in which surveillance and filtering solutions were sold to the UAE but ended up in embargoed Syria.

One way or another, Kaspersky Lab’s experience proves that privately developed legal malware could potentially end up not only in the ‘good’ hands of secret service (how good they actually are is not the main topic of this article), but also in the hands of very pragmatic third parties. In other words, even if you’re are not at all relevant to the criminal world or the political realm, and are just an ordinary person, one of these days you could find yourself in the midst of it all.

How dangerous is it?

Significantly. Malware like this is created for those with a very generous budget. It is at a very advanced level that has nothing to do with teenage misbehaviors or petty criminals trying to steal a hundred bucks from your credit card.

Some insights from the developers of such malware that slipped on Wikileaks, state that a traditional antivirus does not pose even the tiniest threat to their products.

The developers of legal malware use a great deal of advanced technologies in their products that can fool a virus analyst and prevent him from looking under the hood.

What can be done about it?

Practices do prove that such technologies do have their limitations: There is no magic allowing one to break stealthily into any system but, rather, it is a sample of an usual malware.

Consequently, that means heuristic algorithms (a method of detection based on searching for suspicious attributes relevant to malware) employed in Kaspersky Lab’s solutions are very likely able to filtrate the workings of cyber-mercenaries.

Kaspersky heuristics are able to successfully catch creative mercenaries

Tweet

For example, our research of products by FinFisher (one of the most prominent players in the legal cyber-weapon market) proved that contrary to FinFisher’s statement, heuristic analyzers that are deployed in our products as of Kaspersky Antivirus 6 (MP4), have successfully dealt with such threats.

That means that one has to resort to an antivirus that employs a set of technologies that can battle highly sophisticated threats, considering the high likelihood that some dubious ‘anti-cybercriminal’ tool could end up in wrong hands.


Source: kaspersky.com

Translate this article

TAGGED: Malware, Security, Software, Threat, Threats, Vulnerabilities
Vitus White October 13, 2022 October 7, 2022
Share This Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

Two privilege escalation vulnerability in Simple Membership Plugin
Two privilege escalation vulnerability in Simple Membership Plugin
Wordpress Threats 14 hours ago
How to get the latest Windows 11 innovations
Windows 14 hours ago
Dynamic Lighting is now available on Windows 11
Windows 14 hours ago
Writing poems using LLama 2 on Workers AI
Writing poems using LLama 2 on Workers AI
Apps 14 hours ago
serverless GPU-powered inference on Cloudflare’s global network
serverless GPU-powered inference on Cloudflare’s global network
Apps 14 hours ago

You Might Also Like

Two privilege escalation vulnerability in Simple Membership Plugin
Wordpress Threats

Two privilege escalation vulnerability in Simple Membership Plugin

14 hours ago
Windows

How to get the latest Windows 11 innovations

14 hours ago
Writing poems using LLama 2 on Workers AI
Apps

Writing poems using LLama 2 on Workers AI

14 hours ago
serverless GPU-powered inference on Cloudflare’s global network
Apps

serverless GPU-powered inference on Cloudflare’s global network

14 hours ago
Show More

Related stories

How to upgrade to Windows 11 23H2 with Installation Assistant
Critical Vulnerability in Forminator Plugin
How to blur image background in Photos for Windows 11
How to download official Windows 11 23H2 ISO file
PHP Object Injection Vulnerability in Flatsome Theme
How to download Windows 11 22H2 ISO after 23H2 releases
Previous Next

10 New Stories

You can now use WebGPU in Cloudflare Workers
How to install September 2023 update with 23H2 features for Windows 11
How to uninstall September update (KB5030310) from Windows 11
Traffic anomalies and notifications with Cloudflare Radar
Sippy helps you avoid egress fees while incrementally migrating data from S3 to R2
the modern way to connect and protect your clouds, networks, applications and users
Previous Next
Hot News
Two privilege escalation vulnerability in Simple Membership Plugin
How to get the latest Windows 11 innovations
Dynamic Lighting is now available on Windows 11
Writing poems using LLama 2 on Workers AI
serverless GPU-powered inference on Cloudflare’s global network
10alert.com10alert.com
Follow US
© 10 Alert Network. All Rights Reserved.
  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?