ISPs may be involved in FinFisher spyware campaign

data-protection-and-cyber-1024x767.jpg

New surveillance campaigns utilizing the infamous spyware known as FinFisher are in the wild, and there are signs of major ISP involvement in some of the campaigns, warns ESET in a media alert.

FinFisher, also known also as FinSpy, is sold to governments and their agencies worldwide. Besides featuring technical improvements.

FinFisher has vast spying capabilities, such as live surveillance through webcams and microphones, keylogging, and exfiltration of files. What sets FinFisher apart from other surveillance tools, however, are controversies around its deployments. FinFisher is marketed as a law enforcement tool and is believed to have been used also by oppressive regimes.

ESET discovered these latest FinFisher variants in seven countries, but declined to name thee countries so as not to put anyone in danger.

FinFisher campaigns are known to have used various infection mechanisms, including spear phishing, manual installations with physical access to devices, 0-day exploits, and so-called watering hole attacks – poisoning websites the targets are expected to visit.

What’s new – and most troubling – about the new campaigns in terms of distribution is the attackers’ use of a man-in-the-middle attack with the “man” in the middle most likely operating at the ISP level. ESET said it has seen this vector being used in two of the countries targeted by the latest FinFisher spyware.

It would be technically possible for the “man” in these man-in-the-middle attacks to be situated at various positions along the route from the target’s computer to the legitimate server, such as in compromised Wi-Fi hotspots.

But the geographical dispersion of ESET’s detections of latest FinFisher variants suggests the MitM attack is happening at a higher level – an ISP being the most probable option.

This assumption is supported by a number of facts: First, according to leaked internal materials that have been published by WikiLeaks, the FinFisher maker offered a solution called “FinFly ISP” to be deployed on ISP networks with capabilities matching those necessary for performing such a MitM attack.

Second, the infection technique (using the HTTP 307 redirect) is implemented in the very same way in both of the affected countries, which is very unlikely unless it was developed and/or provided by the same source.

Third, all affected targets within a country are using the same ISP. Finally, the very same redirection method and format have been used for internet content filtering by internet service providers in at least one of the affected countries.

The deployment of the ISP-level MitM attack technique mentioned in the leaked documents has never been revealed – until now. If confirmed, these FinFisher campaigns would represent a sophisticated and stealthy surveillance project unprecedented in its combination of methods and reach.

In terms of attack methodology, when the user – the target of surveillance – is about to download one of several popular and legitimate applications, they are redirected to a version of that application infected with FinFisher.

The applications we have seen being misused to spread FinFisher are WhatsApp, Skype, Avast, WinRAR, VLC Player and some others.

The attack starts with the user searching for one of the affected applications on legitimate websites. After the user clicks on the download link, their browser is served a modified link and thus redirected to a trojanized installation package hosted on the attacker’s server. When downloaded and executed, it installs not only the intended legitimate application, but also the FinFisher spyware bundled with it.

The redirection is achieved by the legitimate download link being replaced by a malicious one. The malicious link is delivered to the user’s browser via an HTTP 307 Temporary Redirect status response code indicating that the requested content has been temporarily moved to a new URL. The whole redirection process occurs without the user’s knowledge and is invisible to the naked eye.


About Retail News Asia

Retail News Asia is committed to providing local and global retailers with the latest news from the Asian retail market on a daily basis.

We have resources for everyone from independently owned business owners to online-only retailers and major chains expanding their reach throughout the Asian market. Retail News is “the news source” with over 50 weekly posts and 13,6 million readers.


CONTACT US

CALL US ANYTIME

Most read



Retail updates

Stay up to date of the lates updates and retail news from Asia.








X