The Citizen Lab has announced the publication of a detailed and collaborative research report written and coordinated by Morgan Marquis-Boire analyzing several samples believed to be mobile variants of the FinFisher Spy Kit targeting iPhone, Android, Blackberry, Windows Mobile and Symbian platforms.

In addition, the new report also provides details on the geographic locations of FinFisher command and control servers.

This release is a follow-up to a previous research brief, From Bahrain with Love: FinFisher’s Spy Kit Exposed?, that analyzed several pieces of malware targeting Bahraini dissidents, shared with us by Bloomberg News, and which were determined to be part of the FinFisher commercial surveillance kit.

Summary

This new report from Citizen Lab provides yet another window into the secretive but growing commercial market for computer network attack, exploitation, and targeted surveillance products and services, this time focusing on attacks that target the growing mobile and smartphone marketplace.

Among the capabilities of the Spy Kit samples analyzed are:

  • Recording of common communications like Voice Calls, SMS/MMS and Emails
  • Live surveillance through silent calls
  • File download (Contacts, Calendar, Pictures, Files)
  • Country tracing of target (GPS and Cell ID)
  • Full recording of all BlackBerry Messenger communications
  • Covert communications with headquarters

The report also analyzes the results of an ongoing scan for FinFisher command and control servers, and identifies potential servers in the following countries: Bahrain, Brunei, the Czech Republic, Ethiopia, Indonesia, Mongolia, Singapore, the Netherlands, Turkmenistan, and the United Arab Emirates.


 

For the full report, please click here.

For press inquiries, please contact info@citizenlab.org.