Yawn, Wikileaks, we already knew about FinFisher. But these software binaries...

Latest Assange leakgasm includes full copies of spyware


WikiLeaks is making the controversial FinFisher commercial spyware tool available for download as part of the latest in a series of leaks that have put the operations of the controversial business under the microscope.

FinFisher, which was part of UK-based Gamma Group International until late 2013 before relocating to Germany, develops and sells computer intrusion systems, software exploits and remote monitoring systems that can be used to spy on people using desktops and smartphones.

Multiple platforms (Windows, Mac and Linux) and smartphone OSes (Android, BlackBerry and, yes, iOS) are supported by malware used by police and intelligence agencies around the world to spy on political dissidents, journalists and others.

FinFisher Relay and FinSpy Proxy are the components of the FinFisher suite designed to collect data from infected victims and deliver it to surveillance operators, respectively. WikiLeaks has published both alongside previously unreleased copies of the FinFisher FinSpy PC spyware for Windows. This software is designed to be surreptitiously installed on a Windows computer before being used to silently intercept files and communications, such as Skype calls, emails, video and audio.

A copy of the code for FinSpy Master, which is used to control data collection, has also been published by Julian Assange's whistleblowing site.

WikiLeaks argues that publishing the code will help security researchers to track down more FinFisher control nodes.

Assange, WikiLeaker in chief, said: "FinFisher continues to operate brazenly from Germany selling weaponised surveillance malware to some of the most abusive regimes in the world. The Merkel government pretends to be concerned about privacy, but its actions speak otherwise. Why does the Merkel government continue to protect FinFisher? This full data release will help the technical community build tools to protect people from FinFisher including by tracking down its command and control centers."

Privacy and human rights activists, including WikiLeaks and Citizen Lab, have been documenting FinFisher's business and technology since 2011.

WikiLeaks latest leaks include copies of the vendor's invoices and support tickets, which unmask the names of many of its clients and how much they've paid for the controversial technology. Among the largest customers is Mongolia, which has been recently selected as new chair of the Freedom Online Coalition.

Other notable customers in the list include ‪Bahrain, where use of FinFisher‬ has been linked to the blackmail and imprisonment of human rights activists. Lawyers in the Middle Eastern kingdom also have governments and police forces in Western countries also make the client list: among them are Australia (NSW Police), Belgium, the Netherlands, Singapore, Hungary and Italy.

FinFisher's sales peg out at least €50m ($64.7m), according to WikiLeaks.

WikiLeaks' latest release organises documents obtained after an anonymous hacker, who goes by the handle of PhineasFisher, broke into the corporate network of the controversial firm and swiped its customer support database as well as brochures and other marketing collateral and documents back in August. All the whistleblowing site is doing here is cataloguing and indexing previously exposed information on FinFisher's clients rather than releasing anything new, as WikiLeaks itself explains. ®

Similar topics

Broader topics


Other stories you might like

  • Stolen university credentials up for sale by Russian crooks, FBI warns
    Forget dark-web souks, thousands of these are already being traded on public bazaars

    Russian crooks are selling network credentials and virtual private network access for a "multitude" of US universities and colleges on criminal marketplaces, according to the FBI.

    According to a warning issued on Thursday, these stolen credentials sell for thousands of dollars on both dark web and public internet forums, and could lead to subsequent cyberattacks against individual employees or the schools themselves.

    "The exposure of usernames and passwords can lead to brute force credential stuffing computer network attacks, whereby attackers attempt logins across various internet sites or exploit them for subsequent cyber attacks as criminal actors take advantage of users recycling the same credentials across multiple accounts, internet sites, and services," the Feds' alert [PDF] said.

    Continue reading
  • Big Tech loves talking up privacy – while trying to kill privacy legislation
    Study claims Amazon, Apple, Google, Meta, Microsoft work to derail data rules

    Amazon, Apple, Google, Meta, and Microsoft often support privacy in public statements, but behind the scenes they've been working through some common organizations to weaken or kill privacy legislation in US states.

    That's according to a report this week from news non-profit The Markup, which said the corporations hire lobbyists from the same few groups and law firms to defang or drown state privacy bills.

    The report examined 31 states when state legislatures were considering privacy legislation and identified 445 lobbyists and lobbying firms working on behalf of Amazon, Apple, Google, Meta, and Microsoft, along with industry groups like TechNet and the State Privacy and Security Coalition.

    Continue reading
  • SEC probes Musk for not properly disclosing Twitter stake
    Meanwhile, social network's board rejects resignation of one its directors

    America's financial watchdog is investigating whether Elon Musk adequately disclosed his purchase of Twitter shares last month, just as his bid to take over the social media company hangs in the balance. 

    A letter [PDF] from the SEC addressed to the tech billionaire said he "[did] not appear" to have filed the proper form detailing his 9.2 percent stake in Twitter "required 10 days from the date of acquisition," and asked him to provide more information. Musk's shares made him one of Twitter's largest shareholders. The letter is dated April 4, and was shared this week by the regulator.

    Musk quickly moved to try and buy the whole company outright in a deal initially worth over $44 billion. Musk sold a chunk of his shares in Tesla worth $8.4 billion and bagged another $7.14 billion from investors to help finance the $21 billion he promised to put forward for the deal. The remaining $25.5 billion bill was secured via debt financing by Morgan Stanley, Bank of America, Barclays, and others. But the takeover is not going smoothly.

    Continue reading

Biting the hand that feeds IT © 1998–2022