Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 4 / 6
106 résultats taggé spyware  ✕
Spyware Targeting Against Serbian Civil Society - The Citizen Lab https://citizenlab.ca/2023/11/serbia-civil-society-spyware/
28/11/2023 19:25:25
QRCode
archive.org
thumbnail

We confirm that two members of Serbian civil society were targeted with spyware earlier this year. Both have publicly criticized the Serbian government. We are not naming the individuals at this time by their request. The Citizen Lab’s technical analysis of forensic artifacts was conducted in support of an investigation led by Access Now in collaboration with the SHARE Foundation. Researchers from Amnesty International independently analyzed the cases and their conclusions match our findings.

CitizenLab EN 2023 Serbia Pegasus spyware homekit iOS
Spyware in Serbia: civil society under attack - Access Now https://www.accessnow.org/spyware-attack-in-serbia/
28/11/2023 19:23:19
QRCode
archive.org
thumbnail

Access Now and our partners have discovered that civil society in Serbia have been targeted with invasive spyware technology. Here’s what we know.

accessnow EN 2023 Serbia Pegasus spyware homekit iOS
Triangulation: validators, post-compromise activity and modules | Securelist https://securelist.com/triangulation-validators-modules/110847/
26/10/2023 17:49:57
QRCode
archive.org
thumbnail

In this report Kaspersky shares insights into the validation components used in Operation Triangulation, TriangleDB implant post-compromise activity, as well as details of some additional modules.
#2023 #APT #Apple #EN #Malware #Malware-Description #Triangulation #analysis #iOS #macOS #securelist #spyware

EN macOS spyware Apple Malware-Description 2023 analysis APT iOS Triangulation securelist Malware
PREDATOR IN THE WIRES: Ahmed Eltantawy Targeted with Predator Spyware After Announcing Presidential Ambitions https://citizenlab.ca/2023/09/predator-in-the-wires-ahmed-eltantawy-targeted-with-predator-spyware-after-announcing-presidential-ambitions/
23/09/2023 23:27:02
QRCode
archive.org
thumbnail

Between May and September 2023, former Egyptian MP Ahmed Eltantawy was targeted with Cytrox's Predator spyware via links sent on SMS and WhatsApp after Eltantawy publicly stated his plans to run for President in the 2024 Egyptian elections. As Egypt is a known customer of Cytrox's Predator spyware, and the spyware was delivered via network injection from a device located physically inside Egypt, we attribute the attack to the Egyptian government with high confidence.

CitizenLab EN 2023 spyware Egypt Predator CVE-2023-41991 CVE-2023-41992 CVE-2023-41993
0-days exploited by commercial surveillance vendor in Egypt https://blog.google/threat-analysis-group/0-days-exploited-by-commercial-surveillance-vendor-in-egypt/
23/09/2023 23:19:50
QRCode
archive.org
thumbnail

Last week Google’s Threat Analysis Group (TAG), in partnership with The Citizen Lab, discovered an in-the-wild 0-day exploit chain for iPhones. Developed by the commercial surveillance vendor, Intellexa, this exploit chain is used to install its Predator spyware surreptitiously onto a device.

In response, yesterday, Apple patched the bugs in iOS 16.7 and iOS 17.0.1 as CVE-2023-41991, CVE-2023-41992, CVE-2023-41993. This quick patching from Apple helps to better protect users and we encourage all iOS users to install them as soon as possible.

Google EN 2023 TAG Apple Android CitizenLab Predator spyware Intellexa CVE-2023-41993 CVE-2023-41991 CVE-2023-41992 Exploit Chain 0-days
Two spyware tied with China found hiding on the Google Play Store https://blog.pradeo.com/spyware-tied-china-found-google-play-store
07/07/2023 10:21:25
QRCode
archive.org
thumbnail

This week, our engine detected two spyware hiding on the Google Play Store and affecting up to 1.5 million users.

pradeo EN Android spyware GooglePlay
LetMeSpy, a phone tracking app spying on thousands, says it was hacked https://techcrunch.com/2023/06/27/letmespy-hacked-spyware-thousands/
27/06/2023 20:35:22
QRCode
archive.org
thumbnail

A data breach reveals the spyware is built by a Polish developer

techcrunch EN 2023 LetMeSpy phone spyware hacked databreach
Dissecting TriangleDB, a Triangulation spyware implant https://securelist.com/triangledb-triangulation-implant/110050/
21/06/2023 13:40:21
QRCode
archive.org
thumbnail

In researching Operation Triangulation, we set ourselves the goal to retrieve as many parts of the exploitation chain as possible. As of now, we have finished analyzing the spyware implant and are ready to share the details.
#2023 #APT #Apple #EN #Malware-Descriptions #Spyware #Targeted-attacks #Triangulation #iOS #malware #securelist

Apple Triangulation iOS 2023 Malware-Descriptions malware EN Spyware securelist APT Targeted-attacks
“Clickless” iOS exploits infect Kaspersky iPhones with never-before-seen malware | Ars Technica https://arstechnica.com/information-technology/2023/06/clickless-ios-exploits-infect-kaspersky-iphones-with-never-before-seen-malware/
02/06/2023 13:27:34
QRCode
archive.org
thumbnail

"Operation Triangulation" stole mic recordings, photos, geolocation, and more.

arstechnica EN 2023 Triangulation iOS Apple kaspersky Russia spyware NSA
A Matter of Triangulation. https://eugene.kaspersky.com/2023/06/01/a-matter-of-triangulation/
02/06/2023 09:08:34
QRCode
archive.org
thumbnail

Hi all, Today we have very big and important news. Kaspersky experts have discovered an extremely complex, professionally targeted cyberattack that uses Apple’s mobile devices. The purpose of this attack is the inconspicuous introduction of spyware into the iPhones of employees of the company – both top and middle-management. The attack is carried out using

kaspersky EN 2023 iOS 0-Click Triangulation iphone spyware Apple
Mercenary mayhem: A technical analysis of Intellexa's PREDATOR spyware https://blog.talosintelligence.com/mercenary-intellexa-predator/
28/05/2023 13:46:37
QRCode
archive.org
thumbnail

We would like to thank The Citizen Lab for their cooperation, support and inputs into this research.

  • Commercial spyware use is on the rise, with actors leveraging these sophisticated tools to conduct surveillance operations against a growing number of targets. Cisco Talos has new details of a commercial spyware product sold by the spyware firm Intellexa (formerly known as Cytrox).
  • Our research specifically looks at two components of this mobile spyware suite known as “ALIEN” and “PREDATOR,” which compose the backbone of the spyware implant. Our findings include an in-depth walkthrough of the infection chain, including the implants’ various information-stealing capabilities.
  • A deep dive into both spyware components indicates that ALIEN is more than just a loader for PREDATOR and actively sets up the low-level capabilities needed for PREDATOR to spy on its victims.
  • We assess with high confidence that the spyware has two additional components — tcore (main component) and kmem (privilege escalation mechanic) — but we were unable to obtain and analyze these modules.
  • If readers suspect their system(s) may have been compromised by commercial spyware, please consider notifying Talos’ research team at talos-mercenary-spyware-help@external.cisco.com to assist in furthering the community’s knowledge of these threats.
talosintelligence EN 2023 PREDATOR spyware Intellexa ALIEN analysis Android
Inner workings revealed for “Predator,” the Android malware that exploited 5 0-days https://arstechnica.com/information-technology/2023/05/inner-workings-revealed-for-predator-the-android-malware-that-exploited-5-0-days/
28/05/2023 13:46:18
QRCode
archive.org
thumbnail

Spyware is sold to countries including Egypt, Indonesia, Oman, Saudi Arabia, and Serbia.
Smartphone malware sold to governments around the world can surreptitiously record voice calls and nearby audio, collect data from apps such as Signal and WhatsApp, and hide apps or prevent them from running upon device reboots, researchers from Cisco’s Talos security team have found.

arstechnica EN 2023 Smartphone PREDATOR 0-days spyware Android
Armenia spyware victims: Pegasus hacking in war https://www.accessnow.org/publication/armenia-spyware-victims-pegasus-hacking-in-war/
25/05/2023 23:45:14
QRCode
archive.org
thumbnail

A joint investigation by civil society and independent researchers has uncovered hacking of Armenia spyware victims with NSO Group's Pegasus spyware.

accessnow EN 2023 Pegasus Armenia spyware NSO war
BouldSpy: Android Spyware Tied to Iranian Police Targets Minorities https://security.lookout.com/blog/iranian-spyware-bouldspy
02/05/2023 11:15:40
QRCode
archive.org
thumbnail

Researchers at the Lookout Threat Lab have discovered a new Android surveillance tied to the Law Enforcement Command of the Islamic Republic of Iran (FARAJA).

lookout EN 2023 BouldSpy Spyware Android FARAJA Iran
Apple’s high security mode blocked NSO spyware, researchers say | TechCrunch https://techcrunch.com/2023/04/18/apple-lockdown-mode-iphone-nso-pegasus/
19/04/2023 08:42:58
QRCode
archive.org
thumbnail

Apple has fixed the three exploits used to deploy the Pegasus spyware, which did not require any interaction from the target.

techcrunch EN 2023 apple citizen-lab ios iphone malware nso nso-group spyware LockdownMode
Triple Threat: NSO Group’s Pegasus Spyware Returns in 2022 with a Trio of iOS 15 and iOS 16 Zero-Click Exploit Chains https://citizenlab.ca/2023/04/nso-groups-pegasus-spyware-returns-in-2022/
18/04/2023 16:00:59
QRCode
archive.org
thumbnail

One widely publicized case of disappearances relevant to this case of spyware infection occurred in September 2015 when a group of 43 students at a teacher

citizenlab EN 2023 NSO Pegasus Spyware PWNYOURHOME FINDMYPWN
DEV-0196: QuaDream’s “KingsPawn” malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia https://www.microsoft.com/en-us/security/blog/2023/04/11/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia/
11/04/2023 18:37:46
QRCode
archive.org
thumbnail

Microsoft analyzes a threat group tracked as DEV-0196, the actor’s iOS malware “KingsPawn”, and their link to an Israel-based private sector offensive actor (PSOA) known as QuaDream, which reportedly sells a suite of exploits, malware, and infrastructure called REIGN, that’s designed to exfiltrate data from mobile devices.

microsoft EN 2023 QuaDream spyware spy IoCs DEV-0196 iOS calendar zero-click REIGN
Sweet QuaDreams: A First Look at Spyware Vendor QuaDream’s Exploits, Victims, and Customers - The Citizen Lab https://citizenlab.ca/2023/04/spyware-vendor-quadream-exploits-victims-customers/
11/04/2023 18:34:14
QRCode
archive.org
thumbnail

At least five civil society victims of QuaDream’s spyware and exploits were identified in North America, Central Asia, Southeast Asia, Europe, and the Middle East. Victims include journalists, political opposition figures, and an NGO worker. Traces of a suspected iOS 14 zero-click exploit used to deploy QuaDream’s spyware.

CitizenLab EN 2023 QuaDreams Spyware spyware spy iPhone calendar zero-click
Mercenary spyware hacked iPhone victims with rogue calendar invites, researchers say | TechCrunch https://techcrunch.com/2023/04/11/quadream-spyware-hacked-iphones-calendar-invites/
11/04/2023 18:32:54
QRCode
archive.org
thumbnail

Researchers found malware developed by QuaDream, a little-known government spyware maker, which was used against journalists and politicians.

techcrunch EN 2023 security apple cybersecurity hackers hacking ios iphone spyware zero-days
Spyware vendors use 0-days and n-days against popular platforms https://blog.google/threat-analysis-group/spyware-vendors-use-0-days-and-n-days-against-popular-platforms/
30/03/2023 22:29:01
QRCode
archive.org
thumbnail

Google’s Threat Analysis Group (TAG) tracks actors involved in information operations (IO), government backed attacks and financially motivated abuse. For years, TAG has been tracking the activities of commercial spyware vendors to protect users. Today, we actively track more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to government backed actors. These vendors are enabling the proliferation of dangerous hacking tools, arming governments that would not be able to develop these capabilities in-house. While use of surveillance technologies may be legal under national or international laws, they are often found to be used by governments to target dissidents, journalists, human rights workers and opposition party politicians.

GoogleTAG EN 2023 0-days Spyware Italy Malaysia Kazakhstan CVE-2022-42856 Webkit Samsung CVE-2022-4262 CVE-2023-0266
page 4 / 6
4734 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio