{"id":26047,"date":"2014-09-18T07:43:33","date_gmt":"2014-09-18T11:43:33","guid":{"rendered":"http:\/\/www.opensource.im\/?p=26047"},"modified":"2014-09-18T07:43:33","modified_gmt":"2014-09-18T11:43:33","slug":"wikileaks-outs-latest-finfisher-government-spyware-that-anti-virus-cant-spot","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/wikileaks\/wikileaks-outs-latest-finfisher-government-spyware-that-anti-virus-cant-spot.php","title":{"rendered":"Wikileaks outs latest FinFisher &#8216;government spyware&#8217; that anti-virus can&#8217;t spot"},"content":{"rendered":"<p><p>    John E. Dunn | Sept. 17, 2014  <\/p>\n<p>    Berates Germany for allowing makers to operate.  <\/p>\n<p>    Wikileaks has released what it claims    are previously unknown fourth-generation versions of the    controversial 'government'     FinFisher spyware, lambasting the German Government for    allowing it to be sold to \"some of the most abusive regimes in    the world.\"  <\/p>\n<p>    In a media announcement fronted with statements from Ecuadorian    embassy refugee and editor in chief Julian Assange himself,    Wikileaks offered the files for a number of the spyware's    components, including Relay 4.3, Proxy 2.1, and Master 2.1, and    zips containing 'weaponised' executables for the Windows FinSpy    client used to monitor events such as a Skype conversation.  <\/p>\n<p>    The organisation said its motivation for releasing the files    was to \"challenge the secrecy and the lack of accountability of    the surveillance industry,\" a reference to the fact that this    malware is legally used by a wide variety of governments,    including repressive ones.  <\/p>\n<p>    \"FinFisher continues to operate brazenly from Germany selling    weaponised surveillance malware to some of the most abusive    regimes in the world,\" wrote Assange.  <\/p>\n<p>    \"The Merkel government pretends to be concerned about privacy,    but its actions speak otherwise. Why does the Merkel government    continue to protect FinFisher? This full data release will help    the technical community build tools to protect people from    FinFisher including by tracking down its command and control    centers.\"  <\/p>\n<p>    Releasing files of malware looks more like a publicity stunt    than a major help to the security industry, although it's    unlikely that many or even any of them would have detected it.    That said, even if they now do, the makers of FinFisher can    simply produce a new iteration if they haven't already done so.  <\/p>\n<p>    Also released by Wikileaks is a bundle of    mostly old and known documents, including cheap-looking    Videos, dull brochures and support details. However, one    eye-catching one is a spreadsheet from April 2014 laid out like    a perverse antivirus test where almost every single product    fails on almost every single count. For these anti-testers, a    failure happens when a program detects FinFisher.  <\/p>\n<p>    This stands to underline how easy it now is to get past more or    less any antivirus program going as long as the malware is new    enough or the antivirus older. It is in fairness a tough job    for security firms. FinFisher isn't like conventional malware    in that it is directed against tiny numbers of people spread    across the globe. Spotting malware this rare is a task.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the rest here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.computerworld.com.sg\/tech\/industries\/wikileaks-outs-latest-finfisher-government-spyware-that-anti-virus-cant-spot\" title=\"Wikileaks outs latest FinFisher 'government spyware' that anti-virus can't spot\">Wikileaks outs latest FinFisher 'government spyware' that anti-virus can't spot<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> John E. Dunn | Sept. 17, 2014 Berates Germany for allowing makers to operate. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[],"class_list":["post-26047","post","type-post","status-publish","format-standard","hentry","category-wikileaks"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/26047"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=26047"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/26047\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=26047"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=26047"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=26047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}