Showing posts sorted by date for query spyware phone. Sort by relevance Show all posts
Showing posts sorted by date for query spyware phone. Sort by relevance Show all posts

Monday, May 21, 2018

"Secure" Cell Phone Spyware Springs a Leak

At least one server used by an app for parents to monitor their teenagers' phone activity has leaked tens of thousands of accounts of both parents and children.

The mobile app, TeenSafe, bills itself as a "secure" monitoring app for iOS and Android, which lets parents view their child's text messages and location, monitor who they're calling and when, access their web browsing history, and find out which apps they have installed.

Although teen monitoring apps are controversial and privacy-invasive, the company says it doesn't require parents to obtain the consent of their children. more

Monday, March 5, 2018

Court Admits Husband's Illegal Bugging into Evidence

Turkey - A top appeals court decided that evidence collected through illegal bugging could not be used by itself to prove guilt but could be used in conjunction with other evidence in a 2015 case where a man in the Aegean province of Aydın believed his wife was cheating on him and installed a bugging application onto her cell phone.

The application turned the cell phone into a recording device. The recordings showed the woman really was cheating on him with a colleague from work. The man immediately filed for divorce, demanding compensation from his wife and the custody of their child. more


An app that can help determine if an Android phone is infected with spyware.

Saturday, November 25, 2017

EU: Spying Technology Export Control

EU lawmakers overwhelmingly backed plans on Thursday to control exports of devices to intercept mobile phone calls, hack computers or circumvent passwords that could be used by foreign states to suppress political opponents or activists...

The EU has felt that spyware or malware and telecom of Internet surveillance technologies are increasingly threatening security and human rights and proposed a modernization of its export control system to cover cyber-surveillance. more

Meanwhile, on Alibaba.

Saturday, November 18, 2017

Wiretapper's "Suicide" Revisited for Foul Play

An appeals court prosecutor in Athens has asked to see the case file concerning the death of a telecoms engineer in 2005 shortly before the outbreak of a scandal involving the wiretapping of Greece’s political leadership...

The decision to revisit the case came after the European Court of Human Rights (ECHR) deemed on Thursday that Greece had failed to fully investigate the circumstances surrounding the death of former Vodafone employee Costas Tsalikidis, 38, who was found hanged in his apartment.

The investigating prosecutor at the time, Ioannis Diotis, had ruled out foul play, concluding that Tsalikidis had committed suicide.

Tsalikidis’s death occurred the day after the spyware planted in Vodafone’s network was removed...

The spyware diverted phone conversations made by Vodafone’s subscribers to 14 “shadow” pay-as-you-go mobile phones, allowing calls to be monitored. more sing-a-long

Monday, July 17, 2017

Shark Tanked

UK - A former champion boxer has been jailed after bugging his ex-girlfriend's phone during a campaign to 'control' her.

Ronnie 'The Shark' Clark installed spyware on a phone he bought former partner Rebecca Graham and sent her menacing messages, a court heard.

The 32-year-old was jailed for nine months at Teesside Crown Court after he was convicted of the new offence of 'controlling or coercive behaviour'...

He used the phone software to monitor who she was exchanging messages with and threatened to kill a man she was in touch with, The Dundee Courier reported.

A family member of Clark's also messaged Miss Graham telling her 'you know what he's capable of' and 'he's not scared of killing people'. more

Saturday, July 1, 2017

Where Smartphones Became Spyware Piñatas

A spying scandal in Mexico widened after it was confirmed by experts that several of the country’s top opposition leaders — along with journalists and human rights advocates — were targeted by high-tech spyware exclusively sold to governments.

The Internet watchdog group Citizen Lab exposed the scandal (in June) in a report that showed that spyware known as Pegasus had been used in recent years to infiltrate the cellphones of 12 prominent journalists and rights activists, all of whom had been critical of the Mexican government...

The victims received messages with links to the malware, which, when activated, allows outsiders to remotely access a phone’s data as well as activate its camera and microphone. more

Tuesday, April 18, 2017

The 'Stalkerware' Surveillance Market, Where Ordinary People Tap Each Other's Phones

John* tapped out a simple text message to his wife in January 2016. "I love you," it read.

But this wasn't the only message she saw. Unbeknownst to John, his wife had bugged his smart phone. She was spying on John, eavesdropping on all of his texts and multimedia messages, and tracking his every move through the device's GPS...

John is just one of tens of thousands of individuals around the world who are unwitting targets of powerful, relatively cheap spyware that anyone can buy. Ordinary people—lawyers, teachers, construction workers, parents, jealous lovers—have bought malware to monitor mobile phones or computers, according to a large cache of hacked files from Retina-X and FlexiSpy, another spyware company.

The breaches highlight how consumer surveillance technology, which shares some of the same capabilities and sometimes even the same code as spy software used by governments, has established itself with the everyday consumer. more

Wednesday, February 22, 2017

Flexi Morality - Expanded Cell Phone Spyware Laws Introduced

On three occasions this week, I asked a FlexiSpy salesperson a simple question: If I wanted to, could I use their spyware to snoop on my wife's cellphone without her knowing? The answer each time was yes. 

When asked if it was legal, they responded with a canned disclaimer explaining it was necessary to get the permission of the target. But what if I didn't want my wife to know? They could help me anyway...

Detect phone warming caused by spyware. (for clients only)
Even though I started each conversation telling the FlexiSpy salesperson I was a FORBES reporter, they were happy to offer suggestions about how one could install the app without permission of the target. One said I could "sneak to get her phone" and then install, a process that FlexiSpy would guide me through. He sought to allay any fears about getting caught, noting there was no icon and it would operate silently...

Meanwhile, lawmakers are seeking to expand laws that punish unwarranted, secret surveillance. Last week, Senators Ron Wyden, Jason Chaffetz and John Conyers introduced The Geolocation Privacy and Surveillance (GPS) Act. Specifically, it creates criminal penalties for "surreptitiously using an electronic device to track a person's movements that parallel the penalties that exist for illegal wiretapping." more  other cell phone spy gadgets

Monday, December 19, 2016

Reality Spyware Documentary - Find My Phone

What happens to a smartphone after it's stolen? That was the question that a film student in Amsterdam had in mind when he produced a short documentary about a smartphone thief and their stolen goods. On the surface, it might not sound like the most avant-garde idea out there. But here's what made it interesting: the student procured material for his documentary by spying on the thief using a bugged smartphone.

The student, a certain Anthony van der Meer, intentionally had a phone of his stolen – one that he loaded with software called "Cerberus."

As The Next Web reported, the software gave him access to the device location, its features, and its contents – all of which he could retrieve when he wanted. The software also allowed him to make use of the phone's camera and microphone so he could spy on the thief.


For 2 weeks, that's exactly what der Meer did. He spied on the thief, tracking his moves, which resulted in the documentary posted above called Find My Phone – almost the namesake of the Apple app "Find My iPhone" used to find one's phone or disable it after being stolen. more

Excellent work, Anthony! ~Kevin

Friday, November 18, 2016

China Secretly Spying on Android Devices

According to Cybersecurity firm Kryptowire, some Android phones, including those from American phone manufacturer BLU, are being preinstalled with software that monitors where users go, who they call, and what they text. The information is then sent back to Chinese servers.

A software dedicated to spying on users is the trojan horse hidden inside some phones manufactured in China. Kryptowire, a Cybersecurity consulting firm, has released a report stating that such malware is being used to gather sensitive information such as GPS locations, text messages, etc. to send back to Chinese servers every 72 hours.

The piece of code has been lurking inside the Android operative system. As such, the program managed to conceal itself from the user’s perspective.

Tom Karygiannis from Kryptowire revealed that the malicious program was created by the Chinese company Adups, with the sole purpose of spying, stating that it isn’t the result of an error. Karygiannis said that the malware’s goal may be is to perform state espionage or to merely to sell advertising data....

Adups has over 700 million active users, and a market share exceeding 70% across 200+ countries and regions. 

The company’s software is used in phones, cars, and other devices. American phone manufacturer, BLU Products, said that 120,000 of its phones had been affected, promptly stating that it had released an update to remove Adups’ spyware. more

Thursday, November 17, 2016

Tune into PI's Declassified! Thursday, 9 am Pacific, Noon Eastern

Is Your Cell Phone Bugging You?
Do you want to know how to protect your cell phone privacy or detect spyware on your smartphone? Are there warning signs that your phone is infected with spyware? Are there applications available to prevent your phone from being tapped or to catch the spy red-handed? Kevin D. Murray is an expert on mobile phone electronic surveillance and eavesdropping detection, known as technical surveillance countermeasures. He is also the author of Is My Cell Phone Bugged? Tune in to hear Kevin Murray discuss detecting mobile phone spyware, and tips to protect your most private conversations.
Link to show

Friday, July 15, 2016

How a YouTube Video Could Infect Your Phone with Spyware

Researchers from Georgetown University and the University of California, Berkeley say cybercriminals could use hidden voice commands via popular YouTube videos to infect Androids and iPhones with malware.


Micah Sherr, a computer science department professor at Georgetown, says the research was inspired by the proliferation of voice-controlled systems. "Amazon Echo was coming out when we started this work," Sherr notes.

Since then, Google has launched Google Home, a similar always-listening device, and electronic devices lost in a messy bedroom can now be recovered by speaking “Okay Google” or “Hey Siri.”

The new research shows how keeping such devices on always-listen mode could lead to a cyberattack. Sherr says a cybercriminal could attempt to plant malware on the device using a hidden voice command. more

Thursday, June 23, 2016

Godless Android Malware - Secretly Roots Phone, Installs Programs

Android users beware: a new type of malware has been found in legitimate-looking apps that can “root” your phone and secretly install unwanted programs.

The malware, dubbed Godless, has been found lurking on app stores including Google Play, and it targets devices running Android 5.1 (Lollipop) and earlier, which accounts for more than 90 percent of Android devices, Trend Micro said Tuesday in a blog post.

Godless hides inside an app and uses exploits to try to root the OS on your phone. This basically creates admin access to a device, allowing unauthorized apps to be installed.

Godless contains various exploits to ensure it can root a device, and it can even install spyware, Trend Micro said...

Trend recommends you buy some mobile security software. more

My solution. ~Kevin

Tuesday, May 10, 2016

US Government Study of Spyware - Possible Precursor to New Laws

Why GAO Did This Study
Smartphone tracking apps exist that allow a person to not only surreptitiously track another person’s smartphone location information, but also surreptitiously intercept the smartphone’s communications—such as texts, e-mails, and phone calls. This type of monitoring—without a person’s knowledge or consent—can present serious safety and privacy risks...

The federal government has undertaken educational, enforcement, and legislative efforts to protect individuals from the use of surreptitious tracking apps, but stakeholders differed over whether current federal laws need to be strengthened to combat stalking. Educational efforts by the Department of Justice (DOJ) have included funding for the Stalking Resource Center, which trains law enforcement officers, victim service professionals, policymakers, and researchers on the use of technology in stalking. With regard to enforcement, DOJ has prosecuted a manufacturer and an individual under the federal wiretap statute for the manufacture or use of a surreptitious tracking app.

Some stakeholders believed the federal wiretap statute should be amended to explicitly include the interception of location data and DOJ has proposed amending the statute to allow for the forfeiture of proceeds from the sale of smartphone tracking apps and to make the sale of such apps a predicate offense for money laundering. Stakeholders differed in their opinions on the applicability and strengths of the relevant federal laws and the need for legislative action. Some industry stakeholders were concerned that legislative actions could be overly broad and harm legitimate uses of tracking apps. However, stakeholders generally agreed that location data can be highly personal information and are deserving of privacy protections. more full study

Thursday, October 29, 2015

Crackdown on Users of DroidJack Spyware

Law enforcement officials in almost half a dozen European countries have searched the homes of people suspected of having used software to spy on mobile phone users...

In Germany, prosecutors searched the homes of 13 people on Tuesday, they said, adding raids had also taken place in Britain, France, Belgium and Switzerland. They did not have further information on the raids in other countries.

The suspects in Germany, aged between 19 and 51, are believed to have bought and used smartphone software DroidJack, which allows surveillance of phones that use Google's Android...

The software allows users to monitor a smartphone's data traffic, eavesdrop on phone conversations or hijack a phone's camera without its owner noticing. It can also be used to spy on smartphone users as they access online banking systems. more

Wednesday, September 16, 2015

Android Apps Get Graded for Privacy - What's App on Your Phone?

A team of researchers from Carnegie Mellon University have assigned privacy grades to Android apps based on some techniques they to analyze to their privacy-related behaviors. Learn more here or browse their analyzed apps.

Grades are assigned using a privacy model that they built. This privacy model measures the gap between people's expectations of an app's behavior and the app's actual behavior.

For example, according to studies they conducted, most people don't expect games like Cut the Rope to use location data, but many of them actually do. This kind of surprise is represented in their privacy model as a penalty to an app’s overall privacy grade. In contrast, most people do expect apps like Google Maps to use location data. This lack of surprise is represented in their privacy model as a small or no penalty. more

Concerned about Android spyware, click here.

Thursday, September 3, 2015

26 Mobile Phone Models Contain Pre-Installed Spyware

What's in you pocket?
Over 190.3 million people in the US own smartphones, but many do not know exactly what a mobile device can disclose to third parties about its owner. Mobile malware is spiking, and is all too often pre-installed on a user’s device.

Following its findings in 2014 that the Star N9500 smartphone was embedded with extensive espionage functions, G DATA security experts have continued the investigation and found that over 26 models from some well-known manufacturers including Huawei, Lenovo and Xiaomi, have pre-installed spyware in the firmware.

However, unlike the Star devices, the researchers suspect middlemen to be behind this, modifying the device software to steal user data and inject their own advertising to earn money.

"Over the past year we have seen a significant increase in devices that are equipped with firmware-level spyware and malware out of the box which can take a wide range of unwanted and unknown actions including accessing the Internet, read and send text messages, install apps, access contact lists, obtain location data and more—all which can do detrimental damage,” said Christian Geschkat, G DATA mobile solutions product manager.

Further, the G DATA Q2 2015 Mobile Malware Report shows that there will be over two million new malware apps by the end of the year. more


Wednesday, July 15, 2015

iPhones Can be Infected with SpyWare Without Jailbreaking... and what you can do about it.

via lookout.com
The security world exploded with the news that Hacking Team, a vendor of Italian spyware — software that captures Skype, message, location, social media, audio, visual, and more data, and is marketed as “stealth” and “untraceable” — was hacked…
 
When it comes to iOS, public reports to-date have claimed that the Hacking Team spyware can only infect jailbroken iOS devices… this is not the case.

While Apple does an admirable job protecting users from most malicious software, the fact is that non-jailbroken devices can be infected with Hacking Team’s spyware too…

For its part, Apple created security warnings to inform users before they install apps from outside the App Store. The challenge, however, is that recent research states that people are getting increasingly conditioned to ignore these security warnings.

Here’s what the warning looks like when Hacking Team’s fake Newsstand app is installed on a non-jailbroken iPhone:

pasted image 0


Once a user clicks “trust,” the app is fully functional on the non-jailbroken iPhone…

So what can you do about it? 
First off, don’t freak out. Chances are, you do not have Hacking Team’s surveillanceware on your device. To check for this specific instance of Hacking Team’s surveillanceware you can:

Check iOS Settings for any apps with an empty name.
Screen Shot 2015-07-10 at 12.06.17 PM
  • Check iOS Settings -> General -> Keyboard -> Keyboards to make sure that only keyboards you have installed are set up on your device.
Screen Shot 2015-07-10 at 12.06.47 PM
And, here are some general tips for staying safe:
  • Keep a passcode on your phone. A lot of spyware sold on the market requires that the attacker have physical access to the target device to install the software. Putting a passcode on your phone makes it that much harder for them.
  • Don’t download apps from third party marketplaces or links online. Spyware is also distributed through these means. Only download from official and vetted marketplaces such as the Apple App Store and Google Play.
  • Don’t jailbreak your device unless you really know what you’re doing. Because jailbroken iOS devices are inherently less protected, they are more vulnerable to attack when security protection measures aren’t properly enabled.
  • Download a security app that can stop attacks before they do harm. Lookout does this, but if you’re not a Lookout user, ask your security provider if they detect Hacking Team and other forms of spyware.

Sunday, June 14, 2015

This Week's Questions from the Media

Q. How did you come to be in PI?
A. A long time ago, I interviewed Jackie Mason for my college radio station and phrased a similar question to him. He stopped me and said, "don't ask how, ask why, that's what's interesting." I never forgot it.

With that in mind... The short story is I had a high school interest in radio-electronics. During college, I took a summer job in law enforcement which involved surveillance electronics. Really interesting! I switched majors from mass media to criminal justice. I obtained employment as a private investigator with Pinkertons Inc. (where I got to use surveillance equipment and concoct custom surveillance solutions). I advanced to become the director of their commercial investigations department in NJ, and then director of their electronic countermeasures department worldwide. In 1978, I opened my own firm specializing in electronic countermeasures (aka Technical Surveillance Countermeasures or TSCM). "How," was just a pinball path of following my interests and being ready to take advantage of opportunities that came my way. "Why," because I am inquisitive, fascinated by technology, and most of all, I like helping people solve their problems.

Q. What kind of services do you/company offer?
A. • TSCM; detecting electronic surveillance devices for business and government.
• Counterespionage consulting; providing advice to help detect and deter business espionage.
• Training; specialized training for keeping the workplace free from video voyeurism.
• Smartphone spyware detection and prevention; a book, an Android app, an iPhone app and a smartphone anti-spyware security kit.

Q. What is your day-to-day routine like?
A. There is nothing routine about my day except that every day is a work day. I'm not sure whether this is a factor of being in one's own business, or this particular business demands it. We are available to our clients 24/7, including holidays and weekends. Vacations are taken during slow periods, usually 7-10 days, once or twice a year. The days are divided into two types, office days and field days, when my team and I are conducting inspections for our clients. On office days the work includes: report writing, invoicing, marketing, servicing instrumentation, working on research projects for clients, bookkeeping, creation of books, training, apps, etc.

Q. How has technology affected your day to day, if at all, in recent months/years?
A. My business is heavily technology oriented. Technology change always affects what we do, how we do it, and what new countermeasures we need to develop to keep ahead-of-the-curve. People mistakenly believe that technology changes the things on which we focus. Wrong. It adds to them. All prior espionage techniques still work, and are still used. Spies just have more tricks in the black bag these days.

Q. What is the biggest misconception about being a PI?
A. (Laughter) Pretty much everything you see on TV and the movies. Having worked in all aspects of private investigations before settling into my specialization, I can generalize and say... "Private investigations has a very long flash to bang ratio." That is to say, any investigation involves long periods of quiet work before the last 5% of excitement. That being said, the extremely well-worth-the-wait excitement reward is an intense bit at the end. The greater reward is the satisfaction of having helped someone. That part lasts, and accumulates.

Q. Is there a particular issue facing your industry as a group that you’re concerned with right now?

A. Yes. Video voyeurism in the workplace is the hottest issue around right now. The problem started gaining logarithmic traction about 10-15 years ago. In the past year, the epidemic hit critical mass. I began receiving "what can we do" calls from my clients, similar to the flood of calls about cell phone spyware which prompted the book, app and security kit. At first, places like small businesses, private schools and country clubs called us in to conduct inspections. Once our larger clients began to call, it became obvious that sending us to check restrooms and changing rooms at all their locations (around the world in some cases) was impractical. The solution was to develop an on-line training course for their local security and facilities people.

Q. Why do you think video voyeurism reached critical mass in the last year?
A. Two factors...
1. Over the years, spy cameras have evolved from cheap low-resolution devices, to inexpensive, well-made, high-resolution devices.

2. Voyeurs have also evolved. The early video voyeurs targeted areas over which they had full control, e.g. their bedrooms, bathrooms. Emboldened by these successes, they began to include semi-controllable area targets, e.g. significant others' bedroom and bathrooms, and we also started to see media reports about landlords spying on their tenants.

Keep in mind, any media report about video voyeurism represents a failed (discovered) attack; the majority of video voyeurs are successful.

The next target expansion happened when these people began to coagulate on-line, swapping video files, war stories, and how-to tutorials on YouTube.

Now, emboldened by previous successes, camaraderie, better technology, and honed tradecraft, their hunting grounds expanded to business locations with public expectation-of-privacy areas – restrooms, changing rooms, locker rooms / showers, tanning salons, etc. Huge mistake.

In the past year or so, enough video voyeurs have been caught in corporate venues (Walmart, Starbucks, for example) to make this a legal "foreseeability" issue, with sexual harassment in the workplace implications. The dollar losses — employee morale, business goodwill, reputation and lawsuits — tipped the scales. Invading the corporate landscape was the final straw. With big money at stake, businesses beginning to fight back.

Thursday, May 14, 2015

mSpy - Cell Phone Spyware Company - Servers Hacked

via krebsonsecurity.com
mSpy, the makers of a dubious software-as-a-service product that claims to help more than two million people spy on the mobile devices of their kids and partners, appears to have been massively hacked.

Last week, a huge trove of data apparently stolen from the company's servers was posted on the Dark Web, exposing countless emails, text messages, payment and location data on an undetermined number of mSpy "users." more