{"id":25980,"date":"2014-09-16T05:43:23","date_gmt":"2014-09-16T09:43:23","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25980"},"modified":"2014-09-16T05:43:23","modified_gmt":"2014-09-16T09:43:23","slug":"yawn-wikileaks-we-already-knew-about-finfisher-but-these-software-binaries","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/wikileaks\/yawn-wikileaks-we-already-knew-about-finfisher-but-these-software-binaries.php","title":{"rendered":"Yawn, Wikileaks, we already knew about FinFisher. But these software binaries&#8230;"},"content":{"rendered":"<p><p>        Providing a secure and efficient Helpdesk  <\/p>\n<p>    WikiLeaks is making the controversial FinFisher commercial    spyware tool available for download as part of the latest in a series    of leaks that have put the operations of the controversial    business under the microscope.  <\/p>\n<p>    FinFisher, which was part of UK-based Gamma Group International    until late 2013 before relocating to Germany, develops and    sells computer intrusion systems, software exploits and remote    monitoring systems that can be used to spy on people using    desktops and smartphones.  <\/p>\n<p>    Multiple platforms (Windows, Mac and Linux) and smartphone OSes    (Android, BlackBerry and, yes, iOS) are supported by malware    used by police and intelligence agencies around the world to    spy on political dissidents, journalists and others.  <\/p>\n<p>    FinFisher Relay and FinSpy Proxy are the components of the    FinFisher suite designed to collect data from infected victims    and deliver it to surveillance operators, respectively.    WikiLeaks has published both alongside previously unreleased    copies of the FinFisher FinSpy PC spyware for Windows. This    software is designed to be surreptitiously installed on a    Windows computer before being used to silently intercept files    and communications, such as Skype calls, emails, video and    audio.  <\/p>\n<p>    A copy of the code for FinSpy Master, which is used to control    data collection, has also been published by Julian Assange's    whistleblowing site.  <\/p>\n<p>    WikiLeaks argues that publishing the code will help security    researchers to track down more FinFisher control nodes.  <\/p>\n<p>    Assange, WikiLeaker in chief, said: \"FinFisher continues to    operate brazenly from Germany selling weaponised surveillance    malware to some of the most abusive regimes in the world. The    Merkel government pretends to be concerned about privacy, but    its actions speak otherwise. Why does the Merkel government    continue to protect FinFisher? This full data release will help    the technical community build tools to protect people from    FinFisher including by tracking down its command and control    centers.\"  <\/p>\n<p>    Privacy and human rights activists, including WikiLeaks and    Citizen Lab, have been documenting FinFisher's business and    technology since 2011.  <\/p>\n<p>    WikiLeaks latest leaks include copies of the vendor's invoices    and support tickets, which unmask the names of many of its    clients and how much they've paid for the controversial    technology. Among the largest customers is Mongolia, which has    been recently selected as     new chair of the Freedom Online Coalition.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2014\/09\/15\/wikileaks_leaks_finfisher_docs_binaries\" title=\"Yawn, Wikileaks, we already knew about FinFisher. But these software binaries...\">Yawn, Wikileaks, we already knew about FinFisher. But these software binaries...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Providing a secure and efficient Helpdesk WikiLeaks is making the controversial FinFisher commercial spyware tool available for download as part of the latest in a series of leaks that have put the operations of the controversial business under the microscope. FinFisher, which was part of UK-based Gamma Group International until late 2013 before relocating to Germany, develops and sells computer intrusion systems, software exploits and remote monitoring systems that can be used to spy on people using desktops and smartphones. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[],"class_list":["post-25980","post","type-post","status-publish","format-standard","hentry","category-wikileaks"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25980"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25980"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25980\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}