• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Critical Sudo bugs expose major Linux distros to local Root exploits

 | 

Google fined $314M for misusing idle Android users' data

 | 

A flaw in Catwatchful spyware exposed logins of +62,000 users

 | 

China-linked group Houken hit French organizations using zero-days

 | 

Cybercriminals Target Brazil: 248,725 Exposed in CIEE One Data Breach

 | 

Europol shuts down Archetyp Market, longest-running dark web drug marketplace

 | 

Kelly Benefits data breach has impacted 550,000 people, and the situation continues to worsen as the investigation progresses

 | 

Cisco removed the backdoor account from its Unified Communications Manager

 | 

U.S. Sanctions Russia's Aeza Group for aiding crooks with bulletproof hosting

 | 

Qantas confirms customer data breach amid Scattered Spider attacks

 | 

CVE-2025-6554 is the fourth Chrome zero-day patched by Google in 2025

 | 

U.S. CISA adds TeleMessage TM SGNL flaws to its Known Exploited Vulnerabilities catalog

 | 

A sophisticated cyberattack hit the International Criminal Court

 | 

Esse Health data breach impacted 263,000 individuals

 | 

Europol dismantles €460M crypto scam targeting 5,000 victims worldwide

 | 

CISA and U.S. Agencies warn of ongoing Iranian cyber threats to critical infrastructure

 | 

U.S. CISA adds Citrix NetScaler flaw to its Known Exploited Vulnerabilities catalog

 | 

Canada bans Hikvision over national security concerns

 | 

Denmark moves to protect personal identity from deepfakes with new copyright law

 | 

Ahold Delhaize data breach affected over 2.2 Million individuals

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Intelligence
  • Malware
  • Security
  • FinFisher found everywhere, more complexity and ready for mobile

FinFisher found everywhere, more complexity and ready for mobile

Pierluigi Paganini March 20, 2013

Many times we discussed about the fact that FinFisher was discovered in the wild, the use of popular spyware has been abused by governments and intelligence agencies all around the world. The spyware is for law enforcement and government use, but it seems to be  preferred for those regimes that desire to monitor representatives of the opposition.

FinFisher is considered powerful cyber espionage malware developed by Gamma Group that is able to secretly spy on target’s computers intercepting communications, recording every keystroke and taking the complete control of the host.

What is really concerning, as is obvious that both, is the fact that FinFisher is evolving, authors are improving its capabilities and in particular to ability to evade detection, security researchers discovered the agent at least in 25 countries across the globe, principally located in APAC. A group of researchers claimed that “the behavior of FinSpy servers began to change” to evade detection, tracks of the spyware were located in Australia, Bahrain, Bangladesh, India, Malaysia, Singapore, and Vietnam.

On July 2012 Bloomberg News reported that security experts, led by security researcher Morgan Marquis-Boire, identified instances of FinFisher during an investigation on malware e-mailed to Bahraini activists.

FinFisherBahrainiActivists

In the same period another team led by Claudio Guarnieri of Boston-based security company Rapid7 analyzed the instances of malware discovered in the wild revealing that instances of the FinFisher were detected also in Australia, U.S, Dubai, the Czech Republic, Indonesia, Latvia, Mongolia, Estonia, Qatar and Ethiopia.

Guarnieri clarified the discoveries don’t indicate that relative governments use Fisher, it is possible in fact that Gamma clients use the product in other nations. According the report published by Rapid7 “Analysis of the FinFisher Lawful Interception Malware“:

“They are simply the results of an active fingerprinting of a unique behavior associated with what is believed to be the FinFisher infrastructure,”

What really worried is the uncontrolled spread of these malware, evidence of a thriving market which nevertheless has many dark sides.

The UK Government, imposed restriction to Gamma Group to export the software outside the EU, the authorities requested to the security firm to apply more control for exports especially to those countries where human rights are daily violated.

On Friday 1st February various organizations engaged in defense of human rights such as the European Center for Constitutional and Human Rights, Privacy International, the Bahrain Center for Human Rights and Reporters without Borders filed formal complaints with the Organisation for Economic Cooperation and Development (OECD) against Gamma International and Trovicor companies for suspected complicity in serious human rights abuses in Bahrain.

The deploy of the surveillance software has caused abuses in Bahrain, the local authorities have used information gathered from intercepted phone and internet communications to catch political dissidents and activists and extort confessions using unjust detentions and tortures.

A team of researchers at Toronto University’s Munk School of Global Affairs tracked 36 new command and control servers, but is surprising is that 30 of total servers are new, in 19 countries. Gamma International has repeatedly denied any links to the spyware and servers revealed by Munk School researchers.

 

bluecoat_map_BATMAN2 copy

 

For those who are interested I suggest an interesting post that describes the results of a comprehensive global Internet scan for the command and control servers of FinFisher’s surveillance software, key findings provided by authors (Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri, and John Scott-Railton):

  • We have found command and control servers for FinSpy backdoors, part of Gamma International’s FinFisher “remote monitoring solution,” in a total of 25 countries: Australia, Bahrain, Bangladesh, Brunei, Canada, Czech Republic, Estonia, Ethiopia, Germany, India, Indonesia, Japan, Latvia, Malaysia, Mexico, Mongolia, Netherlands, Qatar, Serbia, Singapore, Turkmenistan, United Arab Emirates, United Kingdom, United States, Vietnam.
  • A FinSpy campaign in Ethiopia uses pictures of Ginbot 7, an Ethiopian opposition group, as bait to infect users. This continues the theme of FinSpy deployments with strong indications of politically-motivated targeting.
  • There is strong evidence of a Vietnamese FinSpy Mobile Campaign. We found an Android FinSpy Mobile sample in the wild with a command & control server in Vietnam that also exfiltrates text messages to a local phone number.
  • These findings call into question claims by Gamma International that previously reported servers were not part of their product line, and that previously discovered copies of their software were either stolen or demo copies.

The analysis of the specialists reveals a bleak picture, the use of malware spreads like wildfire and probably many servers are still unidentified due to evasion techniques implemented Gamma company.

Another factor of concerns is the specialization of FinSpy also for mobile, in Vietnam researchers isolates an instance that also implemented GPS tracking of victims and spying on conversations and SMS.

Once again it is confirmed that:

“Moreover, discovery of a FinSpy command and control server in a given country is not a sufficient indicator to conclude the use of FinFisher by that country’s law enforcement or intelligence agencies. In some cases, servers were found running on facilities provided by commercial hosting providers that could have been purchased by actors from any country.”

I conclude agreeing with authors of report that request an urgent policy debate about monitoring and surveillance software/architectures and related commercialization, the intolerable situation is under the eyes of all, many democratic countries also increased monitoring and surveillance activities in the name of homeland security … proceed in this direction can have dangerous consequences.

Pierluigi Paganini

(Security Affairs – Cyber FinFisher)


facebook linkedin twitter

cyber espionage FinFisher Gamma malware mobile spyware

you might also like

Pierluigi Paganini July 04, 2025
Critical Sudo bugs expose major Linux distros to local Root exploits
Read more
Pierluigi Paganini July 04, 2025
A flaw in Catwatchful spyware exposed logins of +62,000 users
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Critical Sudo bugs expose major Linux distros to local Root exploits

    Security / July 04, 2025

    Google fined $314M for misusing idle Android users' data

    Laws and regulations / July 04, 2025

    A flaw in Catwatchful spyware exposed logins of +62,000 users

    Malware / July 04, 2025

    China-linked group Houken hit French organizations using zero-days

    APT / July 03, 2025

    Cybercriminals Target Brazil: 248,725 Exposed in CIEE One Data Breach

    Data Breach / July 03, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT